![]() |
The Redteam Blueprint - A Unique Guide To Ethical Hacking - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: The Redteam Blueprint - A Unique Guide To Ethical Hacking (/Thread-The-Redteam-Blueprint-A-Unique-Guide-To-Ethical-Hacking) |
The Redteam Blueprint - A Unique Guide To Ethical Hacking - AD-TEAM - 08-29-2024 ![]() The Redteam Blueprint - A Unique Guide To Ethical Hacking Last updated 9/2021 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 10.49 GB | Duration: 30h 21m Learn what it really takes to be an Ethical Hacker for Silicon Valley Companies. The TRUE Blueprint to Ethical Hacking.
What you'll learn 300+ HD Videos 180+ Hands on Exercises 400+ Topics 30+ Hours of Content How a Red Team Works at a Silicon Valley Company Building out your own Red Team at a large organization High Level and Low Level Crash Course on Windows Operating System Internals High Level and Low Level Crash Course on Linux Operating System Internals How the Kernel, Memory and the CPU work Beginner to Intermediate Networking How compiled programs work Full Guide to Python Programming Full Guide to Assembly Programing and Manual Shellcode Generation How Penetration Tests Actually Work and their Methodologies How and What Kerberos is Building, Managing and Attacking an Enterprise Active Directory Infrastructure The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale Building out Finding Reports and designing them for the right audience Being able to speak to Executives and Leadership at large organizations Passive and Active Reconnaissance tools and Techniques Real World Up to Date Exploitation Techniques Post Exploitation Techniques Custom Fix of Public Exploit Code The ability to creatively deploy persistence and backdoor binaries Living of the Land and Moving Laterally across the network Password Cracking Full Guide on Job Hunting in Silicon Valley Requirements Basic I.T Knowledge Any Machine with at least 4GB of Memory (RAM) No Prior Security or Ethical Hacking Skills Description Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews. Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.Building out a Red Team at Enterprise Silicon Valley ScaleSkills to manage the Red Team as well as internal programs that can chance how the organization worksNetworkingWindows Operating SystemLinux Operating SystemOperating System Internals (Memory, Stack, Heap, Kernels)Programming (Assembly & Python)Passive & Active ReconnaissanceAttack and Create Active Directory Infrastructure Custom ExploitationPost Exploitation Breaking Jail ShellsAbusing a Compromise to Lead to large scale attacksPassword CrackingBuild out a sophisticated in home labBuilding a Personal Security BrandBuilding a PortfolioJob Hunting the Silicon Valley WaySmashing the Job InterviewThese are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors. Don't wait! Take your career to the next level with the RedTeam Blueprint. Overview Section 1: Welcome! Who Is This Guy?! Lecture 1 Introduction Section 2: The 3 Teams Lecture 2 Module Overview - The 3 Teams Lecture 3 The Red Team Lecture 4 The Blue Team Lecture 5 The Purple Team Section 3: Penetration Testing Process Lecture 6 Module Overview - Penetration Testing Process Lecture 7 Penetration Testing Methodology Lecture 8 Metrics & Why They Are Important Lecture 9 Routine Assessments Part 1 - What Are Routine Assessments? Lecture 10 Routine Assessments Part 2 - Yearly Assessments Lecture 11 Routine Assessments Part 3 - Quarterly Assessments? Lecture 12 Routine Assessments Part 4- Monthly Assessments? Lecture 13 Routine Assessments Part 5 - Constant Assessments? Lecture 14 Routine Assessments Part 6 - Building an Assessment Plan Lecture 15 Building & Working with an Enterprise Budget Lecture 16 Specialties?! Lecture 17 The CIA Triangle Section 4: The Windows Operating System Lecture 18 Installing & Using VirtualBox for Lab Virtualization Lecture 19 Windows at a Glance Lecture 20 The Windows File System Lecture 21 Windows Logs Lecture 22 Windows Internals - UAC Lecture 23 Windows Internals - Permissions Lecture 24 Windows Internals - Alternate Data Streams Lecture 25 Windows Internals - API Calls Lecture 26 Windows Internals - The SID Lecture 27 Windows Internals - Tokens Lecture 28 Windows Internals - Named Pipes Lecture 29 Windows Internals - PE Files & DLLs Lecture 30 Windows Command Line - Accessing the Command Line Lecture 31 Windows Command Line - Navigation Lecture 32 Windows Command Line - Working with Files and Directories Lecture 33 Windows Command Line - Working with Pipes Lecture 34 Windows Command Line - Standard I/O/E Lecture 35 Windows Command Line - Managing Windows Section 5: The Linux Operating System Lecture 36 Where is the GUI?! Lecture 37 The Linux File System Lecture 38 Linux Command Line - Navigation Lecture 39 Linux Command Line - Working with Files and Directories Lecture 40 Linux Command Line - Standard I/O/E Recap Lecture 41 Linux Command Line - Working with Data Lecture 42 Linux Command Line - Working with File Permissions Lecture 43 Linux Command Line - Man Pages Lecture 44 Linux Command Line - Base64 Lecture 45 Linux Command Line - Hex Lecture 46 Linux Command Line - Network Connections Recap Lecture 47 Linux Processes Lecture 48 What are INodes? Lecture 49 Working with Open Files Lecture 50 Symbolic Links Lecture 51 The ID's Lecture 52 Linux Pipes Lecture 53 Linux Run Levels Lecture 54 Linux Logs Section 6: Operating System Internals Lecture 55 The Kernel Lecture 56 One Ring to Rule Them All Lecture 57 What is a CPU? Lecture 58 The CPU Registers Lecture 59 The CPU Flags Lecture 60 What is Memory & How does it work? Lecture 61 The Stack Lecture 62 The Heap Lecture 63 Extra information on Memory Lecture 64 Debuggers Lecture 65 Taking a look at ASLR Lecture 66 A Quick Word About AntiVirus Section 7: Active Directory Lecture 67 What is Active Directory Lecture 68 Basic Windows Server Configuration Lecture 69 Install AD DS Lecture 70 The AD Tree Lecture 71 OU's and their Permissions Lecture 72 Managing Users and Groups Lecture 73 Adding Machine to the Domain Lecture 74 Setting up Group Policies Lecture 75 Cached Credentials Section 8: Kerberos Lecture 76 What is Kerberos? Lecture 77 Kerberos Realms Lecture 78 The Authentication Server Lecture 79 The Ticket Granting Server Section 9: Data Manipulation Lecture 80 What is Encryption Lecture 81 Symmetric Encryption Lecture 82 Asymmetric Encryption Lecture 83 RSA Encryption Lecture 84 AES Encryption Lecture 85 What is Hashing? Lecture 86 MD5 Hashing Lecture 87 SHA Hashing Lecture 88 What is Encoding? Lecture 89 Base64 Encoding Lecture 90 Hex Encoding Lecture 91 URL Encoding Lecture 92 What is Compression? Lecture 93 Lossless vs Lossy Compression Lecture 94 LZ77 & LZ78 Compression Algorithms Lecture 95 Data Manipulation - Hands On Section 10: Networking Lecture 96 What is Networking? Lecture 97 The OSI Model Lecture 98 TCP/IP Lecture 99 UDP Lecture 100 The Switch Lecture 101 Routers & Gateways Lecture 102 What is a Protocol? Lecture 103 ICMP Lecture 104 DNS Lecture 105 DHCP Lecture 106 ARP Lecture 107 What is an IDS Lecture 108 What is an IPS Lecture 109 What is HA? Lecture 110 Proxys Lecture 111 The DMZ Lecture 112 Quick Talk on Databases Section 11: VPNs Lecture 113 What is a VPN Lecture 114 What is IPSEC? Lecture 115 What is IKE? Section 12: Firewalls Lecture 116 What is a Firewall? Lecture 117 Packet Filtering Firewalls Lecture 118 Stateful Inspecting Firewalls Lecture 119 Web Application Firewalls Section 13: Configuring PFSense Firewalls Lecture 120 Installing PFSense Lecture 121 The Firewall UI Lecture 122 Configuring a DMZ Lecture 123 Configuring a VPN Lecture 124 Backup & Logging Lecture 125 PFsense Hands On Section 14: Program Theory Lecture 126 What is a Compiler? Lecture 127 What is a Linker? Section 15: Python Course Lecture 128 Why Python? Lecture 129 Installing Python Lecture 130 Hello World Lecture 131 Variables Lecture 132 Type Casting Lecture 133 Operators Lecture 134 If/Else Lecture 135 Loops Lecture 136 The Dictionary Lecture 137 Lists Lecture 138 Tuples Lecture 139 Modules Lecture 140 Classes Lecture 141 Inheritance Lecture 142 Configuration Files Lecture 143 Logging Lecture 144 Error Handling Lecture 145 Sockets Lecture 146 Threading Lecture 147 Python Hands On Section 16: Assembly Course Lecture 148 Why Assembly? Lecture 149 Hello World Lecture 150 Variables Lecture 151 Saving States Lecture 152 Arithmetic Lecture 153 Loops Lecture 154 Logic Control Lecture 155 Reading Files Lecture 156 Writing Files Lecture 157 Op Code Lecture 158 Bit Operators Lecture 159 Assembly Hands On Section 17: Scope Identification Lecture 160 Goal & Scope Identification Lecture 161 Stability Considerations Lecture 162 Briefing Stake Holders Lecture 163 Prepping Lecture 164 Scope Identification Hands On Section 18: Reconnaissance Lecture 165 What is Reconnaissance? Lecture 166 Installing Kali Lecture 167 Passive Recon - Google Lecture 168 Passive Recon - Shodan Lecture 169 Passive Recon - Whois Lecture 170 Passive Recon - Netcraft Lecture 171 Passive Recon - Job Posting Lecture 172 Active Recon - Port Scanning Lecture 173 Active Recon - DNS Lecture 174 Active Recon - Nikto Lecture 175 Active Recon - Dirb Lecture 176 Active Recon - Sparta Lecture 177 Active Recon - Working with NC Lecture 178 Active Recon - Banner Grabbing Lecture 179 Active Recon - Vulnerability Scanners Lecture 180 Active Recon - Browsing Lecture 181 Active Recon - Manual vs Automated Lecture 182 Reconnaissance Hands On Section 19: Exploitation Lecture 183 Finding Exploits Lecture 184 Misconfigurations Lecture 185 Looking for 0 days Lecture 186 Metasploit - What is Metasploit? Lecture 187 Metasploit - Exploits and Payloads Lecture 188 Metasploit - The Meterpreter Lecture 189 Metasploit - Adding an Exploit to Metasploit Lecture 190 Metasploit - MSFVenom Lecture 191 Metasploit - Hands On Lecture 192 The OWASP Top 10 Lecture 193 SQL Injection & SQLMap Lecture 194 XSS Lecture 195 Insecure Direct Object Reference Lecture 196 Local File Inclusion Lecture 197 Remote File Inclusion Lecture 198 The Authenticated Unauthenticated Pages Lecture 199 Broken Authentication and Session Management Lecture 200 Faulty Redirects Section 20: Post Exploitation Lecture 201 Stabilizing Shells Lecture 202 Breaking Out Of The Jail Shell Lecture 203 What is Persistence? Lecture 204 Windows Persistence Lecture 205 Linux Persistence Lecture 206 What is Privilege Escalation? Lecture 207 OS Version Lecture 208 Common Configuration Issues Lecture 209 File Permissions Lecture 210 MySQL Lecture 211 Sudo Lecture 212 Relative Path Sudo Binary Lecture 213 Unquoted Service Path Lecture 214 Service Misconfigurations Lecture 215 LinuxPrivChecker Lecture 216 Im Root Now What? Lecture 217 Pulling Hashes Lecture 218 Pass The Hash Lecture 219 SSH Keys Lecture 220 Checking Logs Lecture 221 Duel Homed Machines Lecture 222 Network Traffic Lecture 223 ARP Poisoning Lecture 224 Web Servers Lecture 225 Account Directory Attacks Lecture 226 Password Spraying Lecture 227 SSH Tunneling Lecture 228 Pivoting Section 21: Password Cracking Lecture 229 What is Password Cracking? Lecture 230 John The Ripper Lecture 231 Hashcat Lecture 232 Rainbow Tables Lecture 233 Password Cracking Hands On Section 22: Covering Your Tracks Lecture 234 Why Cover Your Tracks? Lecture 235 Clearing Windows Logs Lecture 236 Clearing Linux Logs Lecture 237 Quick Talk on Logging Lecture 238 Clearing Command History Lecture 239 Persistent Backdoors Lecture 240 The Clean Up Lecture 241 Covering Your Tracks Hands On Section 23: Reporting Lecture 242 The Format Lecture 243 The Audience Lecture 244 Business Risks on Findings Lecture 245 Remediation Options Lecture 246 Working With The Blue Team Section 24: Attacking Active Directory (Realistic Scenario) Lecture 247 Reconnaissance Lecture 248 Exploitation Lecture 249 Post Exploitation Lecture 250 Finding New Access Lecture 251 Moving Up In The World! Lecture 252 Getting Domain Admin Section 25: Job Hunting Lecture 253 The Resume Lecture 254 Professional Email Lecture 255 Certifications Lecture 256 Personal Brand Lecture 257 Searching for the Job Lecture 258 Analyzing the Job Post Lecture 259 Applying for the Job Lecture 260 The Future Company Lecture 261 Salary Requirements Lecture 262 The Interview Process - The Screening Call Lecture 263 The Interview Process - Prepping for the Technical Interviews Lecture 264 The Interview Process - The Technical Screening Interview Lecture 265 The Interview Process - Prepping for the On Site Final Interview Lecture 266 The Interview Process - The Onsite Lecture 267 The Interview Process - The Offer Lecture 268 Congratulations! Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming,Anyone who wants to learn the full skillset truly required to land the job,Anyone who wants to learn how professional hackers work and target real organizations from a real hacker,Anyone who wants to make a career move into Ethical Hacking from another field ![]() |