The RedTeam Blueprint - A Unique Guide To Ethical Hacking
- Description
- Curriculum
- FAQ
- Reviews
Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!
The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company’s by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.
After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.
Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!
We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.
-
Building out a Red Team at Enterprise Silicon Valley Scale
-
Skills to manage the Red Team as well as internal programs that can chance how the organization works
-
Networking
-
Windows Operating System
-
Linux Operating System
-
Operating System Internals (Memory, Stack, Heap, Kernels)
-
Programming (Assembly & Python)
-
Passive & Active Reconnaissance
-
Attack and Create Active Directory Infrastructure
-
Custom Exploitation
-
Post Exploitation
-
Breaking Jail Shells
-
Abusing a Compromise to Lead to large scale attacks
-
Password Cracking
-
Build out a sophisticated in home lab
-
Building a Personal Security Brand
-
Building a Portfolio
-
Job Hunting the Silicon Valley Way
-
Smashing the Job Interview
These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.
Don’t wait! Take your career to the next level with the RedTeam Blueprint.
-
2Module Overview - The 3 TeamsVideo lesson
You will have a base understanding of what these 3 Core Teams are.
-
3The Red TeamVideo lesson
You will have a solid understanding of what a Red Team is, how its used and where it fits into an organization.
-
4The Blue TeamVideo lesson
You will have a solid understanding of what a Blue Team is, how its used and where it fits into an organization.
-
5The Purple TeamVideo lesson
You will have a solid understanding of what a Purple Team is, how its used and where it fits into an organization.
-
6Module Overview - Penetration Testing ProcessVideo lesson
Students will learn how to build out an internal Red Team at scale. Along with this a current and industry used Penetration Methodology that will outline the rest of the course.
-
7Penetration Testing MethodologyVideo lesson
You will learn a new industry Penetration Testing Methodology used at Silicon Valley Companies.
-
8Metrics & Why They Are ImportantVideo lesson
You will learn what Metrics are, how they are used and how to build them yourself!
-
9Routine Assessments Part 1 - What Are Routine Assessments?Video lesson
You will have a solid understanding of what assessments are in a Red Team and start brain storming on different types.
-
10Routine Assessments Part 2 - Yearly AssessmentsVideo lesson
Now that we have covered what assessments are you will learn how and why Yearly assessments are done.
-
11Routine Assessments Part 3 - Quarterly Assessments?Video lesson
Now that we have covered what Yearly assessments are you will learn how and why Quarterly assessments are done.
-
12Routine Assessments Part 4- Monthly Assessments?Video lesson
Now that we have covered what Quarterly assessments are you will learn how and why Monthly assessments are done.
-
13Routine Assessments Part 5 - Constant Assessments?Video lesson
Now that we have covered what Monthly assessments are you will learn how and why Constant assessments are done.
-
14Routine Assessments Part 6 - Building an Assessment PlanVideo lesson
With a good understanding of the different types of assessments that are possible and their frequency I now task you with building your own for a Red Team! You will learn in this video how to build out your own.
-
15Building & Working with an Enterprise BudgetVideo lesson
Working with a budget and being able to build one speaks volumes about you as a professional. This is a key component to truly landing the job.
-
16Specialties?!Video lesson
It's important to understand your specialty in the field of Ethical Hacking. This will help with job hunting as well as the interview process.
-
17The CIA TriangleVideo lesson
The CIA Triangle is commonly used in a large section of I.T. For Security it is paramount to understand why it is in place and what each step means.
-
18Installing & Using VirtualBox for Lab VirtualizationVideo lesson
Learn how to build a virtualization environment that will be utilized throughout the rest of the course.
-
19Windows at a GlanceVideo lesson
Knowing your way around Windows is required for an attacker. A lot of enterprise companies still utilize Windows environments.
-
20The Windows File SystemVideo lesson
You will learn how the current Windows File System works and some intimate details about it.
-
21Windows LogsVideo lesson
Knowing where and how Windows logs it's events is a core skill to any Ethical Hacker.
-
22Windows Internals - UACVideo lesson
User Account Control or UAC is going to get in your way as an Ethical Hacker. You need to get a good grasp on this topic and how its implemented to understand how to beat it!
-
23Windows Internals - PermissionsVideo lesson
Learning to abuse Windows? Permissions is where its at. This is by far the most commonly misconfigured element of Windows environments!
-
24Windows Internals - Alternate Data StreamsVideo lesson
Alternate Data Streams or ADS is a great way to hide data but also can be used in some sneaky and creative ways.
-
25Windows Internals - API CallsVideo lesson
API Calls in Windows can be complicated at first but once you understand what they do and how things get much easier. When looking at Windows based Privilege Escalation exploits you tend to see API Calls used and it makes reading and understanding them far easier!
-
26Windows Internals - The SIDVideo lesson
The SID for Windows is a unique number for users/groups. Being able to quickly identify a user based on it's SID allows you to see a lower level of Windows.
-
27Windows Internals - TokensVideo lesson
Windows Tokens are one of my favorite concepts. You can abuse these in SO MANY ways. Token Impersonation is a key concept for any Ethical Hacker!
-
28Windows Internals - Named PipesVideo lesson
Windows Named Pipes are used by most applications in Windows. They have their own vulnerabilities and understand what they are and how they work can allow someone to be very "creative".
-
29Windows Internals - PE Files & DLLsVideo lesson
Here we take a look and how a PE and DLL file is structured and some of the components of each. This forms a base for knowledge to be gained in future modules.
-
30Windows Command Line - Accessing the Command LineVideo lesson
Learning the Windows Command Line is a required skill for any hacker. You won't find yourself with a GUI very often and knowing how to move around, manage the machine and do what you need to without it is a hard requirement!
-
31Windows Command Line - NavigationVideo lesson
Learn about navigation in the Windows Command Line world!
-
32Windows Command Line - Working with Files and DirectoriesVideo lesson
Learn to work with files and directories in Windows Command Line.
-
33Windows Command Line - Working with PipesVideo lesson
As we learned about Named Pipes now we can use them in actions to see what we can do with them.
-
34Windows Command Line - Standard I/O/EVideo lesson
The Standard Input Output an Error are used throughout all Operating Systems. They are commonly used the same way in most OS's. This is a useful skill to make working on the Command Line far easier.
-
35Windows Command Line - Managing WindowsVideo lesson
You never know when you need to make a configuration setting, add a rouge service or learn more about the system. Know how to manage Windows without the GUI!
-
36Where is the GUI?!Video lesson
We take our first look at Linux and figure out where the GUI went!
-
37The Linux File SystemVideo lesson
Before we dive into Linux its important to understand how the file system in laid out and that EVERYTHING is a FILE!
-
38Linux Command Line - NavigationVideo lesson
Since most of your time as an attacker is spent in a Terminal or Command Line its paramount to know how to navigate. This is fairly similar to Windows.
-
39Linux Command Line - Working with Files and DirectoriesVideo lesson
Since everything is a file, that includes directories, we need to know how to work with them!
-
40Linux Command Line - Standard I/O/E RecapVideo lesson
Very similar to Windows Standard I/O/E we will do a quick recap on the subject in Linux.
-
41Linux Command Line - Working with DataVideo lesson
How that we understand how to work with files we need to learn how to work with data itself. We go over how to manipulate data to our will!
-
42Linux Command Line - Working with File PermissionsVideo lesson
Same with Windows Permission we must learn the Linux side of the fence. There are a lot of vulnerabilities that rely on configuration issues with permissions. Understanding this will provide you a greater insight on how things work and how they can be abused.
-
43Linux Command Line - Man PagesVideo lesson
Man pages are the Linux Users quick look up replacement of Google Searching. These can provide very critical bits of information that are specific to a system without looking through countless white papers.
-
44Linux Command Line - Base64Video lesson
Being able to use and manipulate base64 is useful for not only encoding larger normally unreadable data but for getting binaries/data on and off machines!
-
45Linux Command Line - HexVideo lesson
Very similar to base64 use cases but has its uses elsewhere in other applications! Its important to understand how to quickly get and resolve hex/base64 data.
-
46Linux Command Line - Network Connections RecapVideo lesson
We quickly recap how to grab network connections in Linux as we did with Windows. Remember in Linux everything is a file!
-
47Linux ProcessesVideo lesson
Learn about how Linux processes work and the types you will run into.
-
48What are INodes?Video lesson
INodes are an integral part of the Linux File System. They can be used in a lot of useful ways!
-
49Working with Open FilesVideo lesson
Since everything is a file dealing with Open Files is just as important! You will learn how to manage Open Files on Linux.
-
50Symbolic LinksVideo lesson
Abusing Symbolic Links is very fun but you need to know how to use them first!
-
51The ID'sVideo lesson
Linux uses ID's just like Windows uses SID's. You will need to understand these as well when attacking a Linux Machine.
-
52Linux PipesVideo lesson
Similar to Windows Pipes Linux has their own! These are very useful for working with data.
-
53Linux Run LevelsVideo lesson
We go over the Run Levels of Linux and what each of them mean. They each have their own attack vector.
-
54Linux LogsVideo lesson
Logging is a big topic on Linux machines. A lot of organizations will build their own logs and sometimes provide juicy information!
-
55The KernelVideo lesson
Here you will learn about the Linux Kernel and how it works.
-
56One Ring to Rule Them AllVideo lesson
Inside of the Kernel we have different ring levels. Each of these levels provide different privileges. With understanding this it helps work on exploit development and how attacks affect the Kernel.
-
57What is a CPU?Video lesson
We take a quick break from low level stuff to see how a CPU itself works.
-
58The CPU RegistersVideo lesson
When looking at the CPU there is a base component called Registers. These will be required in our Assembly section of the course so be sure to watch this!
-
59The CPU FlagsVideo lesson
Flags are similar to registers and are just as required for the Assembly course!
-
60What is Memory & How does it work?Video lesson
We take our first look at how memory works on computers. This can be a deep topic so rewatch if needed.
-
61The StackVideo lesson
We take a stab at tackling the Stack! If you are wanting to learn Buffer Overflows or Exploit Development this is essential.
-
62The HeapVideo lesson
While Similar to the Stack The Heap helps out a different part of the process!
-
63Extra information on MemoryVideo lesson
Here we provide some extra context on memory and the CPU!
-
64DebuggersVideo lesson
In this video we take our knowledge of memory and the CPU and dive into a debugger!
-
65Taking a look at ASLRVideo lesson
We look at Address Space Layout Randomization or ASLR and how it works in Windows.
-
66A Quick Word About AntiVirusVideo lesson
We quickly talk about AnitVIrus and some issues facing an Ethical Hacker.
-
67What is Active DirectoryVideo lesson
Active Directory is a very common infrastructure at larger organizations. To best attack this type of infrastructure you should know how it works and be able to configure it yourself.
-
68Basic Windows Server ConfigurationVideo lesson
We hit the base configurations for a Windows Server for our needs.
-
69Install AD DSVideo lesson
We look at actually installing Active Directory on our specified Windows Server and how to configure it.
-
70The AD TreeVideo lesson
Understanding the Active Directory Tree is just as important as configuring Active Directory itself. An attacker will commonly find themselves investigating the Tree for issues.
-
71OU's and their PermissionsVideo lesson
Along with the Tree itself there are leaves or OU's. Theses contain all of the data and objects. You will have a good grasp on how and why things are setup the way they are.
-
72Managing Users and GroupsVideo lesson
We take a look at managing users and groups. This includes delegation of permissions and setting up help desk users.
-
73Adding Machine to the DomainVideo lesson
We take our first look at extending the AD Infrastructure with another machine. This is a key step in configuration of a home lab.
-
74Setting up Group PoliciesVideo lesson
Group Policies is what makes AD so useful. This is commonly the place that is abused from an attacker perspective.
-
75Cached CredentialsVideo lesson
We see how cached credentials can be dangerous.
-
76What is Kerberos?Video lesson
We take our first look at Kerberos and see how it works and where it fits into a Red Team's attack vectors.
-
77Kerberos RealmsVideo lesson
We talk about the first section of Kerberos and how Realms are handled by the service.
-
78The Authentication ServerVideo lesson
The next step of Kerberos is the Authentication Server. Understanding this is required for Kerberos.
-
79The Ticket Granting ServerVideo lesson
We take a final look at Kerberos with the TGS. This is what is commonly abused by Ethical Hackers in the real world.
External Links May Contain Affiliate Links read more