Home / Course catalog / Certified Red Team Expert - A Complete Red Team Tr...

Hacking

Certified Red Team Expert - A Complete Red Team Training With Real World Attacks


Description
Welcome to the FIRST complete guide to Red Team Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!

The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.

After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.

Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!

We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.

Building out a Red Team at Enterprise Silicon Valley Scale

Skills to manage the Red Team as well as internal programs that can chance how the organization works

Networking

Windows Operating System

Linux Operating System

Operating System Internals (Memory, Stack, Heap, Kernels)

Programming (Assembly & Python)

Passive & Active Reconnaissance

Attack and Create Active Directory Infrastructure

Custom Exploitation

Post Exploitation

Breaking Jail Shells

Abusing a Compromise to Lead to large scale attacks

Password Cracking

Build out a sophisticated in home lab

Building a Personal Security Brand

Building a Portfolio

Job Hunting the Silicon Valley Way

Smashing the Job Interview

These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.

Don't wait! Take your career to the next level with the RedTeam Blueprint. 

Continue To Order: https://ethicalhackersacademy.com/collec...

Content
  • Welcome! Who Is This Guy?!
  • Course Introduction
  • Student Only Facebook Group
  • The 3 Teams
  • Module Overview - The 3 Teams
  • The Red Team
  • The Blue Team
  • The Purple Team
  • Penetration Testing Process
  • Module Overview - Penetration Testing Process
  • Penetration Testing Methodology
  • Metrics & Why They Are Important
  • Metrics Excel
  • Routine Assessments Part 1 - What Are Routine Assessments?
  • Routine Assessments Part 2 - Yearly Assessments
  • Routine Assessments Part 3 - Quarterly Assessments?
  • Routine Assessments Part 4- Monthly Assessments?
  • Routine Assessments Part 5 - Constant Assessments?
  • Routine Assessments Part 6 - Building an Assessment Plan
  • Assessment Template
  • Building & Working with an Enterprise Budget
  • Budget Sample
  • Budget Template
  • Specialties?!
  • The CIA Triangle
  • The Windows Operating System
  • Installing & Using VirtualBox for Lab Virtualization
  • Installing & Using VirtualBox for Lab Virtualization Links
  • Windows at a Glance
  • Windows at a Glance Links
  • The Windows File System
  • The Windows File System Links
  • Windows Logs
  • Windows Internals
  • Windows Internals - UAC
  • Windows Internals - UAC Links
  • Windows Internals - Permissions
  • Windows Internals - Alternate Data Streams
  • Windows Internals - Alternate Data Streams Links
  • Windows Internals - API Calls
  • Windows Internals - API Calls Links
  • Windows Internals - The SID
  • Windows Internals - Tokens
  • Windows Internals - Named Pipes
  • Windows Internals - Named Pipes Links
  • Windows Internals - PE Files & DLLs
  • Windows Internals - PE Files & DLLs Links
  • Windows Command Line
  • Windows Command Line - Accessing the Command Line
  • Windows Command Line - Navigation
  • Windows Command Line - Working with Files and Directories
  • Windows Command Line - Working with Pipes
  • Windows Command Line - Standard I/O/E
  • Windows Command Line - Managing Windows
  • The Linux Operating System
  • Where is the GUI?!
  • Where is the GUI?! Links
  • The Linux File System
  • The Linux File System Links
  • Linux Command Line - Navigation
  • Linux Command Line - Working with Files and Directories
  • Linux Command Line - Standard I/O/E Recap
  • Linux Command Line - Working with Data
  • Linux Command Line - Working with File Permissions
  • Linux Command Line - Man Pages
  • Linux Command Line - Base64
  • Linux Command Line - Hex
  • Linux Command Line - Network Connections Recap
  • Linux Processes
  • Linux Processes Links
  • What are INodes?
  • Working with Open Files
  • Symbolic Links
  • The ID's
  • Linux Pipes
  • Linux Run Levels
  • Linux Logs
  • Operating System Internals
  • The Kernel
  • One Ring to Rule Them All
  • What is a CPU?
  • The CPU Registers
  • The CPU Flags
  • The CPU Flags Links
  • What is Memory & How does it work?
  • The Stack
  • The Heap
  • Extra information on Memory
  • Debuggers
  • Debuggers Links
  • Taking a look at ASLR
  • A Quick Word About AntiVirus
  • Active Directory
  • What is Active Directory
  • Basic Windows Server Configuration
  • Install AD DS
  • The AD Tree
  • OU's and their Permissions
  • Managing Users and Groups
  • Adding Machine to the Domain
  • Adding Machine to the Domain Links
  • Setting up Group Policies
  • Cached Credentials
  • Kerberos
  • What is Kerberos?
  • Kerberos Realms
  • Kerberos Realms
  • The Ticket Granting Server
  • Data Manipulation
  • What is Encryption
  • Symmetric Encryption
  • Asymmetric Encryption
  • RSA Encryption
  • RSA Encryption Links
  • AES Encryption
  • AES Encryption Links
  • What is Hashing?
  • MD5 Hashing
  • MD5 Hashing Links
  • SHA Hashing
  • SHA Hashing Links
  • What is Encoding?
  • Base64 Encoding
  • Base64 Encoding Links
  • Hex Encoding
  • Hex Encoding Links
  • URL Encoding
  • URL Encoding Links
  • What is Compression?
  • Lossless vs Lossy Compression
  • LZ77 & LZ78 Compression Algorithms
  • LZ77 & LZ78 Compression Algorithms Links
  • Data Manipulation - Hands On
  • Networking
  • What is Networking?
  • The OSI Model
  • TCP/IP
  • UDP
  • The Switch
  • Routers & Gateways
  • What is a Protocol?
  • ICMP
  • DNS
  • DHCP
  • ARP
  • What is an IDS
  • What is an IPS
  • What is HA?
  • Proxys
  • The DMZ
  • Quick Talk on Databases
  • Quick Talk on Databases Links
  • VPNs
  • What is a VPN?
  • What is IPSEC?
  • What is IKE?
  • Firewalls
  • What is a Firewall?
  • Packet Filtering Firewalls
  • Stateful Inspecting Firewalls
  • Web Application Firewalls
  • Configuring PFSense Firewalls
  • Installing PFSense
  • Installing PFSense Links
  • The Firewall UI
  • Configuring a DMZ
  • Configuring a VPN
  • Backup & Logging
  • PFsense Hands On
  • Program Theory
  • What is a Compiler?
  • What is a Linker?
  • Python Course
  • Why Python?
  • Installing Python
  • Installing Python Links
  • Hello World
  • Python Hello World Source Code
  • Variables
  • Python Variables Source Code
  • Type Casting
  • Python Type Casting Source Code
  • Operators
  • Python Operators Source Code
  • If/Else
  • Python IF/Else Source Code
  • Loops
  • Python Loops Source Code
  • The Dictionary
  • Python Dictionary Source Code
  • Lists
  • Python List Source Code
  • Tuples
  • Python Tuples Source Code
  • Modules
  • Python Modules Source Code
  • Classes
  • Python Classes Source Code
  • Inheritance
  • Python Inheritance Source Code
  • Configuration Files
  • Python Configuration Files Source Code
  • Logging
  • Python Logging Source Code
  • Error Handling
  • Python Error Handling Source Code
  • Sockets
  • Python Sockets Source Code
  • Threading
  • Python Threading Source Code
  • Python Hands On
  • Assembly Course
  • Why Assembly?
  • Hello World
  • ASM Hello World Source Code
  • Variables
  • ASM Variables Source Code
  • Saving States
  • ASM Saving States Source Code
  • Arithmetic
  • ASM Arithmetic Source Code
  • Loops
  • ASM Loops Source Code
  • Logic Control
  • ASM Logic Control Source Code
  • Reading Files
  • ASM Reading Files Source Code
  • Writing Files
  • ASM Writing Files Source Code
  • Op Code
  • Bit Operators
  • Assembly Hands On
  • Scope Identification
  • Goal & Scope Identification
  • Stability Considerations
  • Briefing Stake Holders
  • Prepping
  • Assessment Document Template
  • Scope Identification Hands On
  • Reconnaissance
  • What is Reconnaissance?
  • Installing Kali
  • Installing Kali Links
  • Passive Recon - Google
  • Passive Recon - Google Links
  • Passive Recon - Shodan
  • Passive Recon - Shodan Links
  • Passive Recon - Whois
  • Passive Recon - Whois Links
  • Passive Recon - Netcraft
  • Passive Recon - Netcraft Links
  • Passive Recon - Job Posting
  • Active Recon - Port Scanning
  • Active Recon - DNS
  • Active Recon - Nikto
  • Active Recon - Dirb
  • Active Recon - Sparta
  • Active Recon - Working with NC
  • Active Recon - Working with NC Links
  • Active Recon - Banner Grabbing
  • Active Recon - Vulnerability Scanners
  • Active Recon - Vulnerability Scanners Links
  • Active Recon - Browsing
  • Active Recon - Manual vs Automated
  • Reconnaissance Hands On
  • Exploitation
  • Finding Exploits
  • Finding Exploits Links
  • Misconfigurations
  • Looking for 0 days
  • Metasploit - What is Metasploit?
  • Metasploit - Exploits and Payloads
  • Metasploit - The Meterpreter
  • Metasploit - Adding an Exploit to Metasploit
  • Metasploit - MSFVenom
  • Metasploit - Hands On
  • The OWASP Top 10
  • The OWASP Top 10 Links
  • SQL Injection & SQLMap
  • SQL Injection & SQLMap Links
  • XSS
  • Insecure Direct Object Reference
  • Insecure Direct Object Reference Source Code
  • Local File Inclusion
  • Remote File Inclusion
  • The Authenticated Unauthenticated Pages
  • Broken Authentication and Session Management
  • Faulty Redirects
  • Post Exploitation
  • Stabilizing Shells
  • Breaking Out Of The Jail Shell
  • What is Persistence?
  • Windows Persistence
  • Linux Persistence
  • What is Privilege Escalation?
  • OS Version
  • Common Configuration Issues
  • Common Configuration Issues Links
  • File Permissions
  • File Permissions Links
  • MySQL
  • Sudo
  • Relative Path Sudo Binary
  • Unquoted Service Path
  • Service Misconfigurations
  • Service Misconfigurations Links
  • LinuxPrivChecker
  • LinuxPrivChecker Links
  • Im Root Now What?
  • Pulling Hashes
  • Pass The Hash
  • SSH Keys
  • Checking Logs
  • Duel Homed Machines
  • Network Traffic
  • ARP Poisoning
  • Web Servers
  • Account Directory Attacks
  • Password Spraying
  • Password Spraying Source Code
  • SSH Tunneling
  • Pivoting
  • Password Cracking
  • What is Password Cracking?
  • John The Ripper
  • John The Ripper Links
  • Hashcat
  • Rainbow Tables
  • Password Cracking Hands On
  • Covering Your Tracks
  • Why Cover Your Tracks?
  • Clearing Windows Logs
  • Clearing Linux Logs
  • Quick Talk on Logging
  • Clearing Command History
  • Persistent Backdoors
  • The Clean Up
  • Covering Your Tracks Hands On
  • Reporting
  • The Format
  • Report Template
  • The Audience
  • Business Risks on Findings
  • Remediation Options
  • Working With The Blue Team
  • Attacking Active Directory (Realistic Scenario)
  • Reconnaissance
  • Exploitation
  • Post Exploitation
  • Finding New Access
  • Moving Up In The World!
  • Getting Domain Admin
  • Job Hunting
  • The Resume
  • Resume Template
  • Professional Email
  • Certifications
  • Personal Brand
  • Searching for the Job
  • Analyzing the Job Post
  • Applying for the Job
  • The Future Company
  • Salary Requirements
  • The Interview Process - The Screening Call
  • The Interview Process - Prepping for the Technical Interviews
  • The Interview Process - The Technical Screening Interview
  • The Interview Process - Prepping for the On Site Final Interview
  • The Interview Process - The Onsite
  • The Interview Process - The Offer
  • Congratulations!
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever