[FreeCoursesOnline.Me] PentesterAcademy - Attacking And Defending Active Directory - Beginners Edition (CRTP)

Torrent Details


[FreeCoursesOnline.Me] PentesterAcademy - Attacking and Defending Active Directory - Beginners Edition (CRTP)

NAME
[FreeCoursesOnline.Me] PentesterAcademy - Attacking and Defending Active Directory - Beginners Edition (CRTP).torrent
CATEGORY
Other
INFOHASH
1c767b8193d77f144bfd64b5ca8d864c3a5f2d0f
SIZE
4.8 GB in 40 files
ADDED
Uploaded on 13-02-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Lynda and other Courses >>> https://freecoursesonline.me/
Forum for discussion >>> https://onehack.us/



PentesterAcademy - Attacking and Defending Active Directory: Beginner's Edition [FCO]

About

Build expertise in attacking and defending real-world enterprise Active Directory environments.

What You'll Learn

This is a 4-week beginner-friendly bootcamp, designed to teach security professionals how to identify and analyze threats in a modern Active Directory environment. The bootcamp will cover topics like Active Directory (AD) enumeration, trust mapping, domain privilege escalation, Kerberos based attacks, SQL server trusts, defenses and bypasses of defenses.

The bootcamp will teach you how to attack and defend Enterprise Active Directory environments and will give you an opportunity to become a Certified Red Team Professional.

Build Your Cybersecurity Credentials

- Become a Certified Red Team Professional (CRTP)
The CRTP is a major achievement for anyone who wants to show they have serious skills in attacking and defending real-world enterprise Active Directory environments. This certification on your CV prepares you for Red Team, Blue Team and pentesting roles in enterprises across the globe – more than 90% of Fortune 1000 companies use Active Directory.

- Bootcamp Completion Certificate
Attendees will also get a course completion certificate after completing Learning Objectives covered during the course.

Prerequisites

1. A basic understanding of Active Directory
2. The ability to use command line tools on Windows

Instructor(s)

Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes red teaming, active directory security, attack research, defense strategies and post exploitation research. He has 12+ years of experience in red teaming.

He specializes in assessing security risks at secure environments that require novel attack vectors and "out of the box" approach. He has worked extensively on Active Directory, Azure AD attacks, defense and bypassing detection mechanisms and Offensive PowerShell for red teaming. He is creator of multiple tools like Nishang, a post exploitation framework in PowerShell, Deploy-Deception a framework for deploying Active Directory deception and RACE toolkit for attacking Windows ACLs. In his spare time, Nikhil researches on new attack methodologies and updates his tools and frameworks.

Nikhil has held trainings and bootcamps for various corporate clients (in US, Europe and SE Asia), and at the world’s top information security conferences. He has spoken/trained at conferences like DEFCON, BlackHat, BruCON and more.

General Info:

Author(s): Nikhil Mittal
Language: English
Released: 2/2023
Videos Duration: 3h+
Course Source: https://bootcamps.pentesteracademy.com/course/ad-beginner-feb-22

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Websites you may like/1. Get Free Premium Accounts Daily On Our Discord Server!.txt1.3 KB
Labs/Labs Walkthrough/metadata/Objective-1.jpg96.5 KB
Labs/Labs Walkthrough/metadata/Objective-10.jpg109.5 KB
Labs/Labs Walkthrough/metadata/Objective-11.jpg73 KB
Labs/Labs Walkthrough/metadata/Objective-12.jpg52.4 KB
Labs/Labs Walkthrough/metadata/Objective-2.jpg49.8 KB
Labs/Labs Walkthrough/metadata/Objective-3.jpg84.3 KB
Labs/Labs Walkthrough/metadata/Objective-4.jpg115.3 KB
Labs/Labs Walkthrough/metadata/Objective-5.jpg129.6 KB
Labs/Labs Walkthrough/metadata/Objective-6.jpg51.3 KB
Labs/Labs Walkthrough/metadata/Objective-7_Derivative.jpg40.2 KB
Labs/Labs Walkthrough/metadata/Objective-7_Jenkins.jpg77 KB
Labs/Labs Walkthrough/metadata/Objective-8.jpg79.3 KB
Labs/Labs Walkthrough/metadata/Objective-9.jpg118.8 KB
Labs/Labs Walkthrough/Objective-1.mp4150.5 MB
Labs/Labs Walkthrough/Objective-10.mp4141.2 MB
Labs/Labs Walkthrough/Objective-11.mp4187.7 MB
Labs/Labs Walkthrough/Objective-12.mp4176.3 MB
Labs/Labs Walkthrough/Objective-2.mp483.6 MB
Labs/Labs Walkthrough/Objective-3.mp475.6 MB
Labs/Labs Walkthrough/Objective-4.mp4104.7 MB
Labs/Labs Walkthrough/Objective-5.mp4310.1 MB
Labs/Labs Walkthrough/Objective-6.mp4193.1 MB
Labs/Labs Walkthrough/Objective-7_Derivative.mp4309.7 MB
Labs/Labs Walkthrough/Objective-7_Jenkins.mp4151.2 MB
Labs/Labs Walkthrough/Objective-8.mp4155.6 MB
Labs/Labs Walkthrough/Objective-9.mp4161.7 MB
Labs/Tools.zip838.7 MB
Module 1 - Active Directory Enumeration and Local Privilege Escalation/1. Introduction to Active Directory, Enumeration and Local Privilege Escalation.mp4373.9 MB
Module 1 - Active Directory Enumeration and Local Privilege Escalation/metadata/1. Introduction to Active Directory, Enumeration and Local Privilege Escalation.jpg126.3 KB
Module 2 - Lateral Movement, Domain Privilege Escalation and Persistence/Lateral Movement, Domain Privilege Escalation and Persistence.mp4357.9 MB
Module 2 - Lateral Movement, Domain Privilege Escalation and Persistence/metadata/Lateral Movement, Domain Privilege Escalation and Persistence.jpg151 KB
Module 3 - Domain Persistence, Dominance and Escalation to Enterprise Admins/Domain Persistence, Dominance and Escalation to Enterprise Admins.mp4544.7 MB
Module 3 - Domain Persistence, Dominance and Escalation to Enterprise Admins/metadata/Domain Persistence, Dominance and Escalation to Enterprise Admins.jpg139.8 KB
Module 4 - Defenses – Monitoring, Architecture Changes, Bypassing Advanced Threat Analytics and Deception/Defenses, Monitoring and Bypassing Defenses.mp4564.5 MB
Module 4 - Defenses – Monitoring, Architecture Changes, Bypassing Advanced Threat Analytics and Deception/metadata/Defenses, Monitoring and Bypassing Defenses.jpg142.5 KB
PDF/Attacking and Defending Active Directory - Beginner's Edition Bootcamp.pdf5.8 MB
PDF/Attacking and Defending Active Directory - Lab Manual.pdf2 MB
PDF/Attacking and Defending Active Directory - Slide Notes.pdf47.2 MB
PDF/BootCamp_Attacking_and_Defending_ActiveDirectory - Syllabus.pdf537.5 KB

Alternative Torrents for 'FreeCoursesOnline.Me PentesterAcademy Attacking and Defending Active Directory Beginners Edition CRTP'.

There are no alternative torrents found.