Windows Red Teaming Course

Welcome to the Windows Red Teaming course! This engaging course equips you with the skills and knowledge needed to assess, secure, and defend Windows environments. Through hands-on exercises and real-world scenarios, you'll delve into offensive security techniques and master advanced penetration testing tactics tailored specifically for Windows Active Directory environments.

$199.00 $399.00 50% OFF

Windows Red Teaming Course

Course Overview

As cybersecurity is ever-evolving, keeping up with sophisticated adversaries requires an in-depth knowledge of their tactics, techniques and procedures (TTPs). Our comprehensive Windows Red Teaming course equips cybersecurity professionals with the knowledge and hands-on experience to emulate real-world attacks, identify vulnerabilities, and fortify defences within Active Directory (AD) environments.

This intensive course delves into the intricacies of AD, covering topics such as authentication mechanisms, enumeration techniques, and privilege escalation methods. Students will learn to exploit misconfigurations, leverage password attacks, and execute lateral movement strategies to gain a foothold within the targeted AD infrastructure.

Further, this course explores more advanced topics like Kerberos attacks, AD Certificate Services misconfigurations and trust relationships between domains. Participants will gain insights into credential dumping, post-exploitation techniques, and domain persistence mechanisms, enabling them to maintain access and evade detection.

Through hands-on labs and real-world scenarios, students will apply their knowledge to identify and exploit vulnerabilities, simulating adversaries' actions and honing their offensive security skills. Upon completion, they will be equipped with the expertise to conduct comprehensive red team operations, assess the security posture of AD environments, and implement effective countermeasures to mitigate risks.

Who Should take This Course

  • Penetration Testers seeking to enhance their skills in Windows-specific security assessments.
  • Security Engineers/Analysts involved in defending Windows environments, looking to understand offensive tactics.
  • IT Professionals responsible for managing Windows-based networks who want to understand potential attack vectors.
  • Aspiring professionals or those looking to transition into red teaming, with an interest in Windows exploitation techniques.

Course Curriculum


Windows Red Teaming Course

49 Learning Materials

Module 1: Course Introduction

Module 2: Introduction to Active Directory

Intro to Red Teaming

Video
8:36

Active Directory Architecture

Video
8:19

AD Authentication Mechanism

Video
14:14

PowerShell

Video
13:49

Note taking

Video
5:6

Module 3: Lab Setup

Active Directory Lab Setup

Video
8:00

Module 4: AD Enumeration

AD Enumeration

Video
12:55

Bloodhound

Video
16:37

Module 5: Password Attacks

Understanding Password Attacks

Video
3:5

Password in User Description

Video
3:32

Password Spraying

Video
11:8

Sensitive information in network shares

Video
7:58

Module 6: Relay Attacks

Introduction

Video
1:54

LLMNR Poisioning

Video
14:59

IPv6 Spoofing

Video
10:34

WebDAV

Video
11:21

Module 7: Misconfigured Permission

Understanding Permissions

Video
8:11

Exploiting Permissions

Video
22:22

Module 8: Group Policies

Understanding Group Policies

Video
6:2

Exploiting Group Policies

Video
9:48

Group Policy Preference Passwords

Video
4:29

Module 9: Lateral Movement

Local Admin Password Spray

Video
6:30

PsExec/WinRM

Video
13:4

Pass-the-hash & Over-pass-the-hash

Video
9:16

Module 10: Credential Dumping

Introduction

Video
12:58

Domain Cached Credentials (DCC)

Video
8:13

Module 11: Kerberos Attacks

Introduction to Kerberos Attacks

Video
3:7

Kerberoasting & ASREP Roast

Video
18:25

Understanding Kerberos Delegations

Video
12:22

Resource-Based Constratined Delegation

Video
10:57

Shadow Credentials

Video
10:15

Module 12: AD Certificates

Active Directory Certificate Services (ADCS)

Video
8:28

Misconfigured Certificate Templates

Video
19:57

Misconfigured Certificate Authority

Video
11:45

Module 13: MSSQL Trust Links

Understanding MSSQL Trust Links

Video
5:9

Exploiting MSSQL Trust Links

Video
8:15

Module 14: CVEs

Active Directory CVEs

Video
2:51

MS14-068 Checksum Validation

Video
7:25

ZeroLogon

Video
5:51

PrintNightmare

Video
4:21

samAccountName Spoofing

Video
4:8

Module 15: Post Exploitation

Credential Dumping

Video
9:15

Password Analysis

Video
7:11

Module 16: Domain Persistence

Domain Persistence

Video
2:49

Golden Ticket

Video
7:45

Silver Ticket

Video
6:35

Skeleton Key

Video
7:44

Module 17: Domain Trusts

Understanding Domain Trusts

Video
6:43

Exploiting Domain Trusts

Video
7:56

Module 18: Course Conclusion

Course Instructor

Shashi kant Prasad

Senior Security Consultant

Shashi Kant Prasad is an adept hardware security specialist at Redfox Security. He is an expert in chip-off techniques and firmware analysis. Shashi possesses a broad range of knowledge and expertise in penetration testing across various domains, including Cloud, Web Apps, Hardware, DevOps, and Red Teaming. He has also delivered training at various security conferences, sharing his expertise with peers and contributing to the advancement of cybersecurity knowledge within the community.

Key Takeaways from the Windows Red Teaming Course

  1. Students will gain in-depth knowledge of Active Directory (AD) infrastructure, authentication mechanisms, and advanced enumeration techniques to identify potential attack vectors and vulnerabilities within AD environments.
  2. Participants will develop expertise in executing sophisticated attacks, including password attacks, relay attacks, and exploiting misconfigurations in permissions, group policies, and Kerberos delegations, to gain unauthorized access and perform lateral movement.
  3. Master credential dumping techniques, post-exploitation strategies, and domain persistence mechanisms to maintain access and evade detection during red team operations.
  4. The course will explore advanced techniques, such as exploiting AD Certificate Services misconfigurations, leveraging SQL Server trust links, and abusing domain trust relationships for comprehensive red team assessments.
  5. Through practical labs and real-world scenarios, attendees will apply their knowledge by simulating adversarial tactics against AD infrastructures, honing their offensive security skills in a controlled environment.


FAQs

Are there any prerequisites to take up this course?

The Windows Red Teaming course is designed to be accessible to individuals with diverse backgrounds and skill levels. However, to ensure a productive learning experience, some prerequisites are recommended: a basic understanding of Windows operating systems and Active Directory concepts, familiarity with networking fundamentals and protocols, prior experience with scripting languages such as PowerShell or Python, exposure to penetration testing tools and techniques, and knowledge of cybersecurity concepts including the attack lifecycle and common vulnerabilities. While these prerequisites are recommended, the course content is structured to accommodate both experienced professionals and those with foundational cybersecurity knowledge. Participants with varying levels of expertise will benefit from the comprehensive curriculum and hands-on training approach.

Who should take this Course?

This Windows Red Teaming course is designed for red teamers, defenders, administrators, penetration testers, and developers who want to deepen their understanding and proficiency in offensive security within the Windows environment. Whether you're seeking to enhance your offensive capabilities, strengthen defensive strategies, or secure Windows-based systems, this course provides practical insights, tools, and techniques for effectively simulating real-world attacks and bolstering cybersecurity defenses.

Does this course provide practical examples?

Yes, practical examples are provided.

Featured Courses

Our courses are packed with rich, engaging content, including video lectures, practical exercises, and quizzes, ensuring you get a comprehensive learning experience. Don't wait—join Redfox Academy today and take the first step towards a successful career in cybersecurity!

Ready to Master the Art of Pentesting?

Choose our pentesting courses for:

Affordable Price

Unlock your potential with affordable upskilling! Our unbeatable course prices are your chance to level up without breaking the bank. Don't wait to enhance your skills – join us today and take the first step towards a brighter future!

Lifetime Access

Acquire lifetime access to our resources when you buy our courses. With recorded lectures, post-module activities, and walk-through labs, perfecting your understanding of the subject matter like a pro is just a click away. Gain knowledge today and unlock a lifetime of learning.

Certificate of Completion

Upon completing our course, you'll receive a certificate of completion to showcase your new skills. Add it to your resume or LinkedIn profile to stand out to potential employers. Let your accomplishments speak for themselves and take your career to the next level!

Hands-On Experience

Get hands-on experience with real-world scenarios and challenges, giving you practical skills that you can apply immediately in your career.

Expert Instructors

Learn from industry experts with years of experience in pentesting, who are passionate about sharing their knowledge and helping you succeed.

Flexible Learning

Whether you're a beginner or an experienced professional, our courses are designed to meet you where you are and help you reach your goals.

Get in Touch

Have a question, need assistance, or want to collaborate? We’re here to help!

Whether you're looking for cutting-edge cybersecurity solutions or expert training or want to learn more about our services, contact us today.

+91