The RedTeam Blueprint - A Unique Guide To Ethical Hacking

  • Course provided by Udemy
  • Study type: Online
  • Starts: Anytime
  • Price: See latest price on Udemy
Udemy

Course Description

Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!

The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.


After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.


Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!

We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.

  • Building out a Red Team at Enterprise Silicon Valley Scale

  • Skills to manage the Red Team as well as internal programs that can chance how the organization works

  • Networking

  • Windows Operating System

  • Linux Operating System

  • Operating System Internals (Memory, Stack, Heap, Kernels)

  • Programming (Assembly & Python)

  • Passive & Active Reconnaissance

  • Attack and Create Active Directory Infrastructure

  • Custom Exploitation

  • Post Exploitation

  • Breaking Jail Shells

  • Abusing a Compromise to Lead to large scale attacks

  • Password Cracking

  • Build out a sophisticated in home lab

  • Building a Personal Security Brand

  • Building a Portfolio

  • Job Hunting the Silicon Valley Way

  • Smashing the Job Interview


These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.


Don't wait! Take your career to the next level with the RedTeam Blueprint.

Who this course is for:

  • Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming
  • Anyone who wants to learn the full skillset truly required to land the job
  • Anyone who wants to learn how professional hackers work and target real organizations from a real hacker
  • Anyone who wants to make a career move into Ethical Hacking from another field

Expected Outcomes

  1. 300+ HD Videos 180+ Hands on Exercises 400+ Topics 30+ Hours of Content How a Red Team Works at a Silicon Valley Company Building out your own Red Team at a large organization High Level and Low Level Crash Course on Windows Operating System Internals High Level and Low Level Crash Course on Linux Operating System Internals How the Kernel, Memory and the CPU work Beginner to Intermediate Networking How compiled programs work Full Guide to Python Programming Full Guide to Assembly Programing and Manual Shellcode Generation How Penetration Tests Actually Work and their Methodologies How and What Kerberos is Building, Managing and Attacking an Enterprise Active Directory Infrastructure The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale Building out Finding Reports and designing them for the right audience Being able to speak to Executives and Leadership at large organizations Passive and Active Reconnaissance tools and Techniques Real World Up to Date Exploitation Techniques Post Exploitation Techniques Custom Fix of Public Exploit Code The ability to creatively deploy persistence and backdoor binaries Living of the Land and Moving Laterally across the network Password Cracking Full Guide on Job Hunting in Silicon Valley Show more Show less Curated for the Udemy Business collection Requirements Basic I.T Knowledge Any Machine with at least 4GB of Memory (RAM) No Prior Security or Ethical Hacking Skills Description Welcome to the FIRST complete guide to Ethical Hacking ! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD ! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing ! The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview . This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews . Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn. Building out a Red Team at Enterprise Silicon Valley Scal e Skills to manage the Red Team as well as internal programs that can chance how the organization works Networking Windows Operating System Linux Operating System Operating System Internals (Memory, Stack, Heap, Kernels) Programming (Assembly & Python) Passive & Active Reconnaissance Attack and Create Active Directory Infrastructure Custom Exploitation Post Exploitation Breaking Jail Shells Abusing a Compromise to Lead to large scale attacks Password Cracking Build out a sophisticated in home lab Building a Personal Security Brand Building a Portfolio Job Hunting the Silicon Valley Way Smashing the Job Interview These are only SOME of the topics covered in this course. Of course you will receive 24 hour suppor t via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors . Don't wait! Take your career to the next level with the RedTeam Blueprint. Who this course is for: Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming Anyone who wants to learn the full skillset truly required to land the job Anyone who wants to learn how professional hackers work and target real organizations from a real hacker Anyone who wants to make a career move into Ethical Hacking from another field Show more Show less Course content 25 sections • 268 lectures • 30h 21m total length Expand all sections Welcome! Who Is This Guy?! 1 lecture • 1min Introduction Preview 01:16 The 3 Teams 4 lectures • 24min Module Overview - The 3 Teams Preview 01:27 The Red Team Preview 08:48 The Blue Team 05:46 The Purple Team 07:40 Penetration Testing Process 12 lectures • 1hr 23min Module Overview - Penetration Testing Process 03:39 Penetration Testing Methodology 08:11 Metrics & Why They Are Important 12:05 Routine Assessments Part 1 - What Are Routine Assessments? 04:25 Routine Assessments Part 2 - Yearly Assessments 05:28 Routine Assessments Part 3 - Quarterly Assessments? 09:17 Routine Assessments Part 4- Monthly Assessments? 04:31 Routine Assessments Part 5 - Constant Assessments? 08:12 Routine Assessments Part 6 - Building an Assessment Plan 07:21 Building & Working with an Enterprise Budget 12:15 Specialties?! 03:58 The CIA Triangle 03:09 The Windows Operating System 18 lectures • 3hr 4min Installing & Using VirtualBox for Lab Virtualization 10:41 Windows at a Glance 22:20 The Windows File System 11:42 Windows Logs 10:50 Windows Internals - UAC 08:38 Windows Internals - Permissions 16:45 Windows Internals - Alternate Data Streams 08:44 Windows Internals - API Calls 12:35 Windows Internals - The SID 06:11 Windows Internals - Tokens 07:49 Windows Internals - Named Pipes 06:01 Windows Internals - PE Files & DLLs 16:08 Windows Command Line - Accessing the Command Line 04:56 Windows Command Line - Navigation 07:04 Windows Command Line - Working with Files and Directories 07:31 Windows Command Line - Working with Pipes 09:32 Windows Command Line - Standard I/O/E 03:56 Windows Command Line - Managing Windows 12:07 The Linux Operating System 19 lectures • 1hr 50min Where is the GUI?! 03:50 The Linux File System 05:39 Linux Command Line - Navigation 04:27 Linux Command Line - Working with Files and Directories 08:42 Linux Command Line - Standard I/O/E Recap 03:48 Linux Command Line - Working with Data 13:32 Linux Command Line - Working with File Permissions 09:39 Linux Command Line - Man Pages 03:39 Linux Command Line - Base64 02:56 Linux Command Line - Hex 06:26 Linux Command Line - Network Connections Recap 03:58 Linux Processes 13:00 What are INodes? 04:30 Working with Open Files 06:38 Symbolic Links 05:49 The ID's 02:58 Linux Pipes 03:19 Linux Run Levels 03:49 Linux Logs 03:43 Operating System Internals 12 lectures • 1hr 2min The Kernel 11:10 One Ring to Rule Them All 05:40 What is a CPU? 02:40 The CPU Registers 09:16 The CPU Flags 02:08 What is Memory & How does it work? 03:35 The Stack 05:46 The Heap 03:23 Extra information on Memory 04:06 Debuggers 05:10 Taking a look at ASLR 03:22 A Quick Word About AntiVirus 05:14 Active Directory 9 lectures • 1hr 4min What is Active Directory 05:39 Basic Windows Server Configuration 07:01 Install AD DS 09:08 The AD Tree 09:41 OU's and their Permissions 06:31 Managing Users and Groups 05:00 Adding Machine to the Domain 06:59 Setting up Group Policies 11:32 Cached Credentials 02:34 Kerberos 4 lectures • 16min What is Kerberos? 03:41 Kerberos Realms 01:41 The Authentication Server 03:32 The Ticket Granting Server 06:48 Data Manipulation 16 lectures • 50min What is Encryption 03:24 Symmetric Encryption 03:39 Asymmetric Encryption 05:02 RSA Encryption 02:07 AES Encryption 01:42 What is Hashing? 03:06 MD5 Hashing 02:34 SHA Hashing 04:28 What is Encoding? 02:08 Base64 Encoding 04:06 Hex Encoding 04:24 URL Encoding 02:53 What is Compression? 03:04 Lossless vs Lossy Compression 03:08 LZ77 & LZ78 Compression Algorithms 02:03 Data Manipulation - Hands On 01:54 Networking 17 lectures • 1hr 26min What is Networking? 08:16 The OSI Model 05:20 TCP/IP 09:56 UDP 02:38 The Switch 04:07 Routers & Gateways 06:08 What is a Protocol? 01:27 ICMP 06:00 DNS 08:12 DHCP 06:03 ARP 04:33 What is an IDS 03:30 What is an IPS 04:45 What is HA? 04:35 Proxys 03:17 The DMZ 02:36 Quick Talk on Databases 04:17 15 more sections Instructor Brandon Dennis Silicon Valley Hacker and Lead Instructor @ RedTeam Nation 4.5 Instructor Rating 1,189 Reviews 38,787 Students 2 Courses My name is Brandon Dennis. I have over 8+ years in experience with Ethical Hacking and Red Teaming. I have worked at everything from Silicon Valley Companies to smaller 10 man organizations. I spoken publicly, published 0 day exploits and open source countless projects on everything from Custom Windows Token Impersonation Toolkits to In Memory Bypasses. I am currently an Ethical Hacker for a Silicon Valley company and CEO of RedTeam Nation. I develop all of my courses based on realistic goals of getting student where they need to go in their career. Just learning Ethical Hacking is not enough in todays world so I take my courses to the next level. I go over not only what is required for the job at Silicon Valley company scale in terms of Ethical Hacking but also what is really required for the job and to pass the Interview itself! All of my courses are hands on, freshly designed and provide the latest information in the world of Information Security. All of my courses are video based with everything students need from Beginner level to Advanced. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677cdd05da1140bf',m:'3a47e64a796cce1c373c1a6525246824714fa79e-1627797808-1800-AcTVr0m4/TRM7ezj2X8zXPEzDl7Jd9zgWM+QUtf+6fyCLCQlgqyWROxgk1YY3pauXdtZG7nCWGjOFtvgdTF3B8IHtnxQEfT8oQd6N1l76DawQF+0HYFTPe7J9AoeThNSIKSiDFs5r+gyB9QqPe10/ss=',s:[0xab0acbcb71,0x4065a20d4d],}})();
  2. 180+ Hands on Exercises 400+ Topics 30+ Hours of Content How a Red Team Works at a Silicon Valley Company Building out your own Red Team at a large organization High Level and Low Level Crash Course on Windows Operating System Internals High Level and Low Level Crash Course on Linux Operating System Internals How the Kernel, Memory and the CPU work Beginner to Intermediate Networking How compiled programs work Full Guide to Python Programming Full Guide to Assembly Programing and Manual Shellcode Generation How Penetration Tests Actually Work and their Methodologies How and What Kerberos is Building, Managing and Attacking an Enterprise Active Directory Infrastructure The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale Building out Finding Reports and designing them for the right audience Being able to speak to Executives and Leadership at large organizations Passive and Active Reconnaissance tools and Techniques Real World Up to Date Exploitation Techniques Post Exploitation Techniques Custom Fix of Public Exploit Code The ability to creatively deploy persistence and backdoor binaries Living of the Land and Moving Laterally across the network Password Cracking Full Guide on Job Hunting in Silicon Valley Show more Show less Curated for the Udemy Business collection Requirements Basic I.T Knowledge Any Machine with at least 4GB of Memory (RAM) No Prior Security or Ethical Hacking Skills Description Welcome to the FIRST complete guide to Ethical Hacking ! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD ! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing ! The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview . This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews . Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn. Building out a Red Team at Enterprise Silicon Valley Scal e Skills to manage the Red Team as well as internal programs that can chance how the organization works Networking Windows Operating System Linux Operating System Operating System Internals (Memory, Stack, Heap, Kernels) Programming (Assembly & Python) Passive & Active Reconnaissance Attack and Create Active Directory Infrastructure Custom Exploitation Post Exploitation Breaking Jail Shells Abusing a Compromise to Lead to large scale attacks Password Cracking Build out a sophisticated in home lab Building a Personal Security Brand Building a Portfolio Job Hunting the Silicon Valley Way Smashing the Job Interview These are only SOME of the topics covered in this course. Of course you will receive 24 hour suppor t via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors . Don't wait! Take your career to the next level with the RedTeam Blueprint. Who this course is for: Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming Anyone who wants to learn the full skillset truly required to land the job Anyone who wants to learn how professional hackers work and target real organizations from a real hacker Anyone who wants to make a career move into Ethical Hacking from another field Show more Show less Course content 25 sections • 268 lectures • 30h 21m total length Expand all sections Welcome! Who Is This Guy?! 1 lecture • 1min Introduction Preview 01:16 The 3 Teams 4 lectures • 24min Module Overview - The 3 Teams Preview 01:27 The Red Team Preview 08:48 The Blue Team 05:46 The Purple Team 07:40 Penetration Testing Process 12 lectures • 1hr 23min Module Overview - Penetration Testing Process 03:39 Penetration Testing Methodology 08:11 Metrics & Why They Are Important 12:05 Routine Assessments Part 1 - What Are Routine Assessments? 04:25 Routine Assessments Part 2 - Yearly Assessments 05:28 Routine Assessments Part 3 - Quarterly Assessments? 09:17 Routine Assessments Part 4- Monthly Assessments? 04:31 Routine Assessments Part 5 - Constant Assessments? 08:12 Routine Assessments Part 6 - Building an Assessment Plan 07:21 Building & Working with an Enterprise Budget 12:15 Specialties?! 03:58 The CIA Triangle 03:09 The Windows Operating System 18 lectures • 3hr 4min Installing & Using VirtualBox for Lab Virtualization 10:41 Windows at a Glance 22:20 The Windows File System 11:42 Windows Logs 10:50 Windows Internals - UAC 08:38 Windows Internals - Permissions 16:45 Windows Internals - Alternate Data Streams 08:44 Windows Internals - API Calls 12:35 Windows Internals - The SID 06:11 Windows Internals - Tokens 07:49 Windows Internals - Named Pipes 06:01 Windows Internals - PE Files & DLLs 16:08 Windows Command Line - Accessing the Command Line 04:56 Windows Command Line - Navigation 07:04 Windows Command Line - Working with Files and Directories 07:31 Windows Command Line - Working with Pipes 09:32 Windows Command Line - Standard I/O/E 03:56 Windows Command Line - Managing Windows 12:07 The Linux Operating System 19 lectures • 1hr 50min Where is the GUI?! 03:50 The Linux File System 05:39 Linux Command Line - Navigation 04:27 Linux Command Line - Working with Files and Directories 08:42 Linux Command Line - Standard I/O/E Recap 03:48 Linux Command Line - Working with Data 13:32 Linux Command Line - Working with File Permissions 09:39 Linux Command Line - Man Pages 03:39 Linux Command Line - Base64 02:56 Linux Command Line - Hex 06:26 Linux Command Line - Network Connections Recap 03:58 Linux Processes 13:00 What are INodes? 04:30 Working with Open Files 06:38 Symbolic Links 05:49 The ID's 02:58 Linux Pipes 03:19 Linux Run Levels 03:49 Linux Logs 03:43 Operating System Internals 12 lectures • 1hr 2min The Kernel 11:10 One Ring to Rule Them All 05:40 What is a CPU? 02:40 The CPU Registers 09:16 The CPU Flags 02:08 What is Memory & How does it work? 03:35 The Stack 05:46 The Heap 03:23 Extra information on Memory 04:06 Debuggers 05:10 Taking a look at ASLR 03:22 A Quick Word About AntiVirus 05:14 Active Directory 9 lectures • 1hr 4min What is Active Directory 05:39 Basic Windows Server Configuration 07:01 Install AD DS 09:08 The AD Tree 09:41 OU's and their Permissions 06:31 Managing Users and Groups 05:00 Adding Machine to the Domain 06:59 Setting up Group Policies 11:32 Cached Credentials 02:34 Kerberos 4 lectures • 16min What is Kerberos? 03:41 Kerberos Realms 01:41 The Authentication Server 03:32 The Ticket Granting Server 06:48 Data Manipulation 16 lectures • 50min What is Encryption 03:24 Symmetric Encryption 03:39 Asymmetric Encryption 05:02 RSA Encryption 02:07 AES Encryption 01:42 What is Hashing? 03:06 MD5 Hashing 02:34 SHA Hashing 04:28 What is Encoding? 02:08 Base64 Encoding 04:06 Hex Encoding 04:24 URL Encoding 02:53 What is Compression? 03:04 Lossless vs Lossy Compression 03:08 LZ77 & LZ78 Compression Algorithms 02:03 Data Manipulation - Hands On 01:54 Networking 17 lectures • 1hr 26min What is Networking? 08:16 The OSI Model 05:20 TCP/IP 09:56 UDP 02:38 The Switch 04:07 Routers & Gateways 06:08 What is a Protocol? 01:27 ICMP 06:00 DNS 08:12 DHCP 06:03 ARP 04:33 What is an IDS 03:30 What is an IPS 04:45 What is HA? 04:35 Proxys 03:17 The DMZ 02:36 Quick Talk on Databases 04:17 15 more sections Instructor Brandon Dennis Silicon Valley Hacker and Lead Instructor @ RedTeam Nation 4.5 Instructor Rating 1,189 Reviews 38,787 Students 2 Courses My name is Brandon Dennis. I have over 8+ years in experience with Ethical Hacking and Red Teaming. I have worked at everything from Silicon Valley Companies to smaller 10 man organizations. I spoken publicly, published 0 day exploits and open source countless projects on everything from Custom Windows Token Impersonation Toolkits to In Memory Bypasses. I am currently an Ethical Hacker for a Silicon Valley company and CEO of RedTeam Nation. I develop all of my courses based on realistic goals of getting student where they need to go in their career. Just learning Ethical Hacking is not enough in todays world so I take my courses to the next level. I go over not only what is required for the job at Silicon Valley company scale in terms of Ethical Hacking but also what is really required for the job and to pass the Interview itself! All of my courses are hands on, freshly designed and provide the latest information in the world of Information Security. All of my courses are video based with everything students need from Beginner level to Advanced. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677cdd05da1140bf',m:'3a47e64a796cce1c373c1a6525246824714fa79e-1627797808-1800-AcTVr0m4/TRM7ezj2X8zXPEzDl7Jd9zgWM+QUtf+6fyCLCQlgqyWROxgk1YY3pauXdtZG7nCWGjOFtvgdTF3B8IHtnxQEfT8oQd6N1l76DawQF+0HYFTPe7J9AoeThNSIKSiDFs5r+gyB9QqPe10/ss=',s:[0xab0acbcb71,0x4065a20d4d],}})();
  3. 400+ Topics 30+ Hours of Content How a Red Team Works at a Silicon Valley Company Building out your own Red Team at a large organization High Level and Low Level Crash Course on Windows Operating System Internals High Level and Low Level Crash Course on Linux Operating System Internals How the Kernel, Memory and the CPU work Beginner to Intermediate Networking How compiled programs work Full Guide to Python Programming Full Guide to Assembly Programing and Manual Shellcode Generation How Penetration Tests Actually Work and their Methodologies How and What Kerberos is Building, Managing and Attacking an Enterprise Active Directory Infrastructure The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale Building out Finding Reports and designing them for the right audience Being able to speak to Executives and Leadership at large organizations Passive and Active Reconnaissance tools and Techniques Real World Up to Date Exploitation Techniques Post Exploitation Techniques Custom Fix of Public Exploit Code The ability to creatively deploy persistence and backdoor binaries Living of the Land and Moving Laterally across the network Password Cracking Full Guide on Job Hunting in Silicon Valley Show more Show less Curated for the Udemy Business collection Requirements Basic I.T Knowledge Any Machine with at least 4GB of Memory (RAM) No Prior Security or Ethical Hacking Skills Description Welcome to the FIRST complete guide to Ethical Hacking ! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD ! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing ! The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview . This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews . Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn. Building out a Red Team at Enterprise Silicon Valley Scal e Skills to manage the Red Team as well as internal programs that can chance how the organization works Networking Windows Operating System Linux Operating System Operating System Internals (Memory, Stack, Heap, Kernels) Programming (Assembly & Python) Passive & Active Reconnaissance Attack and Create Active Directory Infrastructure Custom Exploitation Post Exploitation Breaking Jail Shells Abusing a Compromise to Lead to large scale attacks Password Cracking Build out a sophisticated in home lab Building a Personal Security Brand Building a Portfolio Job Hunting the Silicon Valley Way Smashing the Job Interview These are only SOME of the topics covered in this course. Of course you will receive 24 hour suppor t via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors . Don't wait! Take your career to the next level with the RedTeam Blueprint. Who this course is for: Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming Anyone who wants to learn the full skillset truly required to land the job Anyone who wants to learn how professional hackers work and target real organizations from a real hacker Anyone who wants to make a career move into Ethical Hacking from another field Show more Show less Course content 25 sections • 268 lectures • 30h 21m total length Expand all sections Welcome! Who Is This Guy?! 1 lecture • 1min Introduction Preview 01:16 The 3 Teams 4 lectures • 24min Module Overview - The 3 Teams Preview 01:27 The Red Team Preview 08:48 The Blue Team 05:46 The Purple Team 07:40 Penetration Testing Process 12 lectures • 1hr 23min Module Overview - Penetration Testing Process 03:39 Penetration Testing Methodology 08:11 Metrics & Why They Are Important 12:05 Routine Assessments Part 1 - What Are Routine Assessments? 04:25 Routine Assessments Part 2 - Yearly Assessments 05:28 Routine Assessments Part 3 - Quarterly Assessments? 09:17 Routine Assessments Part 4- Monthly Assessments? 04:31 Routine Assessments Part 5 - Constant Assessments? 08:12 Routine Assessments Part 6 - Building an Assessment Plan 07:21 Building & Working with an Enterprise Budget 12:15 Specialties?! 03:58 The CIA Triangle 03:09 The Windows Operating System 18 lectures • 3hr 4min Installing & Using VirtualBox for Lab Virtualization 10:41 Windows at a Glance 22:20 The Windows File System 11:42 Windows Logs 10:50 Windows Internals - UAC 08:38 Windows Internals - Permissions 16:45 Windows Internals - Alternate Data Streams 08:44 Windows Internals - API Calls 12:35 Windows Internals - The SID 06:11 Windows Internals - Tokens 07:49 Windows Internals - Named Pipes 06:01 Windows Internals - PE Files & DLLs 16:08 Windows Command Line - Accessing the Command Line 04:56 Windows Command Line - Navigation 07:04 Windows Command Line - Working with Files and Directories 07:31 Windows Command Line - Working with Pipes 09:32 Windows Command Line - Standard I/O/E 03:56 Windows Command Line - Managing Windows 12:07 The Linux Operating System 19 lectures • 1hr 50min Where is the GUI?! 03:50 The Linux File System 05:39 Linux Command Line - Navigation 04:27 Linux Command Line - Working with Files and Directories 08:42 Linux Command Line - Standard I/O/E Recap 03:48 Linux Command Line - Working with Data 13:32 Linux Command Line - Working with File Permissions 09:39 Linux Command Line - Man Pages 03:39 Linux Command Line - Base64 02:56 Linux Command Line - Hex 06:26 Linux Command Line - Network Connections Recap 03:58 Linux Processes 13:00 What are INodes? 04:30 Working with Open Files 06:38 Symbolic Links 05:49 The ID's 02:58 Linux Pipes 03:19 Linux Run Levels 03:49 Linux Logs 03:43 Operating System Internals 12 lectures • 1hr 2min The Kernel 11:10 One Ring to Rule Them All 05:40 What is a CPU? 02:40 The CPU Registers 09:16 The CPU Flags 02:08 What is Memory & How does it work? 03:35 The Stack 05:46 The Heap 03:23 Extra information on Memory 04:06 Debuggers 05:10 Taking a look at ASLR 03:22 A Quick Word About AntiVirus 05:14 Active Directory 9 lectures • 1hr 4min What is Active Directory 05:39 Basic Windows Server Configuration 07:01 Install AD DS 09:08 The AD Tree 09:41 OU's and their Permissions 06:31 Managing Users and Groups 05:00 Adding Machine to the Domain 06:59 Setting up Group Policies 11:32 Cached Credentials 02:34 Kerberos 4 lectures • 16min What is Kerberos? 03:41 Kerberos Realms 01:41 The Authentication Server 03:32 The Ticket Granting Server 06:48 Data Manipulation 16 lectures • 50min What is Encryption 03:24 Symmetric Encryption 03:39 Asymmetric Encryption 05:02 RSA Encryption 02:07 AES Encryption 01:42 What is Hashing? 03:06 MD5 Hashing 02:34 SHA Hashing 04:28 What is Encoding? 02:08 Base64 Encoding 04:06 Hex Encoding 04:24 URL Encoding 02:53 What is Compression? 03:04 Lossless vs Lossy Compression 03:08 LZ77 & LZ78 Compression Algorithms 02:03 Data Manipulation - Hands On 01:54 Networking 17 lectures • 1hr 26min What is Networking? 08:16 The OSI Model 05:20 TCP/IP 09:56 UDP 02:38 The Switch 04:07 Routers & Gateways 06:08 What is a Protocol? 01:27 ICMP 06:00 DNS 08:12 DHCP 06:03 ARP 04:33 What is an IDS 03:30 What is an IPS 04:45 What is HA? 04:35 Proxys 03:17 The DMZ 02:36 Quick Talk on Databases 04:17 15 more sections Instructor Brandon Dennis Silicon Valley Hacker and Lead Instructor @ RedTeam Nation 4.5 Instructor Rating 1,189 Reviews 38,787 Students 2 Courses My name is Brandon Dennis. I have over 8+ years in experience with Ethical Hacking and Red Teaming. I have worked at everything from Silicon Valley Companies to smaller 10 man organizations. I spoken publicly, published 0 day exploits and open source countless projects on everything from Custom Windows Token Impersonation Toolkits to In Memory Bypasses. I am currently an Ethical Hacker for a Silicon Valley company and CEO of RedTeam Nation. I develop all of my courses based on realistic goals of getting student where they need to go in their career. Just learning Ethical Hacking is not enough in todays world so I take my courses to the next level. I go over not only what is required for the job at Silicon Valley company scale in terms of Ethical Hacking but also what is really required for the job and to pass the Interview itself! All of my courses are hands on, freshly designed and provide the latest information in the world of Information Security. All of my courses are video based with everything students need from Beginner level to Advanced. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677cdd05da1140bf',m:'3a47e64a796cce1c373c1a6525246824714fa79e-1627797808-1800-AcTVr0m4/TRM7ezj2X8zXPEzDl7Jd9zgWM+QUtf+6fyCLCQlgqyWROxgk1YY3pauXdtZG7nCWGjOFtvgdTF3B8IHtnxQEfT8oQd6N1l76DawQF+0HYFTPe7J9AoeThNSIKSiDFs5r+gyB9QqPe10/ss=',s:[0xab0acbcb71,0x4065a20d4d],}})();
  4. 30+ Hours of Content How a Red Team Works at a Silicon Valley Company Building out your own Red Team at a large organization High Level and Low Level Crash Course on Windows Operating System Internals High Level and Low Level Crash Course on Linux Operating System Internals How the Kernel, Memory and the CPU work Beginner to Intermediate Networking How compiled programs work Full Guide to Python Programming Full Guide to Assembly Programing and Manual Shellcode Generation How Penetration Tests Actually Work and their Methodologies How and What Kerberos is Building, Managing and Attacking an Enterprise Active Directory Infrastructure The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale Building out Finding Reports and designing them for the right audience Being able to speak to Executives and Leadership at large organizations Passive and Active Reconnaissance tools and Techniques Real World Up to Date Exploitation Techniques Post Exploitation Techniques Custom Fix of Public Exploit Code The ability to creatively deploy persistence and backdoor binaries Living of the Land and Moving Laterally across the network Password Cracking Full Guide on Job Hunting in Silicon Valley Show more Show less Curated for the Udemy Business collection Requirements Basic I.T Knowledge Any Machine with at least 4GB of Memory (RAM) No Prior Security or Ethical Hacking Skills Description Welcome to the FIRST complete guide to Ethical Hacking ! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD ! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing ! The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview . This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews . Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn. Building out a Red Team at Enterprise Silicon Valley Scal e Skills to manage the Red Team as well as internal programs that can chance how the organization works Networking Windows Operating System Linux Operating System Operating System Internals (Memory, Stack, Heap, Kernels) Programming (Assembly & Python) Passive & Active Reconnaissance Attack and Create Active Directory Infrastructure Custom Exploitation Post Exploitation Breaking Jail Shells Abusing a Compromise to Lead to large scale attacks Password Cracking Build out a sophisticated in home lab Building a Personal Security Brand Building a Portfolio Job Hunting the Silicon Valley Way Smashing the Job Interview These are only SOME of the topics covered in this course. Of course you will receive 24 hour suppor t via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors . Don't wait! Take your career to the next level with the RedTeam Blueprint. Who this course is for: Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming Anyone who wants to learn the full skillset truly required to land the job Anyone who wants to learn how professional hackers work and target real organizations from a real hacker Anyone who wants to make a career move into Ethical Hacking from another field Show more Show less Course content 25 sections • 268 lectures • 30h 21m total length Expand all sections Welcome! Who Is This Guy?! 1 lecture • 1min Introduction Preview 01:16 The 3 Teams 4 lectures • 24min Module Overview - The 3 Teams Preview 01:27 The Red Team Preview 08:48 The Blue Team 05:46 The Purple Team 07:40 Penetration Testing Process 12 lectures • 1hr 23min Module Overview - Penetration Testing Process 03:39 Penetration Testing Methodology 08:11 Metrics & Why They Are Important 12:05 Routine Assessments Part 1 - What Are Routine Assessments? 04:25 Routine Assessments Part 2 - Yearly Assessments 05:28 Routine Assessments Part 3 - Quarterly Assessments? 09:17 Routine Assessments Part 4- Monthly Assessments? 04:31 Routine Assessments Part 5 - Constant Assessments? 08:12 Routine Assessments Part 6 - Building an Assessment Plan 07:21 Building & Working with an Enterprise Budget 12:15 Specialties?! 03:58 The CIA Triangle 03:09 The Windows Operating System 18 lectures • 3hr 4min Installing & Using VirtualBox for Lab Virtualization 10:41 Windows at a Glance 22:20 The Windows File System 11:42 Windows Logs 10:50 Windows Internals - UAC 08:38 Windows Internals - Permissions 16:45 Windows Internals - Alternate Data Streams 08:44 Windows Internals - API Calls 12:35 Windows Internals - The SID 06:11 Windows Internals - Tokens 07:49 Windows Internals - Named Pipes 06:01 Windows Internals - PE Files & DLLs 16:08 Windows Command Line - Accessing the Command Line 04:56 Windows Command Line - Navigation 07:04 Windows Command Line - Working with Files and Directories 07:31 Windows Command Line - Working with Pipes 09:32 Windows Command Line - Standard I/O/E 03:56 Windows Command Line - Managing Windows 12:07 The Linux Operating System 19 lectures • 1hr 50min Where is the GUI?! 03:50 The Linux File System 05:39 Linux Command Line - Navigation 04:27 Linux Command Line - Working with Files and Directories 08:42 Linux Command Line - Standard I/O/E Recap 03:48 Linux Command Line - Working with Data 13:32 Linux Command Line - Working with File Permissions 09:39 Linux Command Line - Man Pages 03:39 Linux Command Line - Base64 02:56 Linux Command Line - Hex 06:26 Linux Command Line - Network Connections Recap 03:58 Linux Processes 13:00 What are INodes? 04:30 Working with Open Files 06:38 Symbolic Links 05:49 The ID's 02:58 Linux Pipes 03:19 Linux Run Levels 03:49 Linux Logs 03:43 Operating System Internals 12 lectures • 1hr 2min The Kernel 11:10 One Ring to Rule Them All 05:40 What is a CPU? 02:40 The CPU Registers 09:16 The CPU Flags 02:08 What is Memory & How does it work? 03:35 The Stack 05:46 The Heap 03:23 Extra information on Memory 04:06 Debuggers 05:10 Taking a look at ASLR 03:22 A Quick Word About AntiVirus 05:14 Active Directory 9 lectures • 1hr 4min What is Active Directory 05:39 Basic Windows Server Configuration 07:01 Install AD DS 09:08 The AD Tree 09:41 OU's and their Permissions 06:31 Managing Users and Groups 05:00 Adding Machine to the Domain 06:59 Setting up Group Policies 11:32 Cached Credentials 02:34 Kerberos 4 lectures • 16min What is Kerberos? 03:41 Kerberos Realms 01:41 The Authentication Server 03:32 The Ticket Granting Server 06:48 Data Manipulation 16 lectures • 50min What is Encryption 03:24 Symmetric Encryption 03:39 Asymmetric Encryption 05:02 RSA Encryption 02:07 AES Encryption 01:42 What is Hashing? 03:06 MD5 Hashing 02:34 SHA Hashing 04:28 What is Encoding? 02:08 Base64 Encoding 04:06 Hex Encoding 04:24 URL Encoding 02:53 What is Compression? 03:04 Lossless vs Lossy Compression 03:08 LZ77 & LZ78 Compression Algorithms 02:03 Data Manipulation - Hands On 01:54 Networking 17 lectures • 1hr 26min What is Networking? 08:16 The OSI Model 05:20 TCP/IP 09:56 UDP 02:38 The Switch 04:07 Routers & Gateways 06:08 What is a Protocol? 01:27 ICMP 06:00 DNS 08:12 DHCP 06:03 ARP 04:33 What is an IDS 03:30 What is an IPS 04:45 What is HA? 04:35 Proxys 03:17 The DMZ 02:36 Quick Talk on Databases 04:17 15 more sections Instructor Brandon Dennis Silicon Valley Hacker and Lead Instructor @ RedTeam Nation 4.5 Instructor Rating 1,189 Reviews 38,787 Students 2 Courses My name is Brandon Dennis. I have over 8+ years in experience with Ethical Hacking and Red Teaming. I have worked at everything from Silicon Valley Companies to smaller 10 man organizations. I spoken publicly, published 0 day exploits and open source countless projects on everything from Custom Windows Token Impersonation Toolkits to In Memory Bypasses. I am currently an Ethical Hacker for a Silicon Valley company and CEO of RedTeam Nation. I develop all of my courses based on realistic goals of getting student where they need to go in their career. Just learning Ethical Hacking is not enough in todays world so I take my courses to the next level. I go over not only what is required for the job at Silicon Valley company scale in terms of Ethical Hacking but also what is really required for the job and to pass the Interview itself! All of my courses are hands on, freshly designed and provide the latest information in the world of Information Security. All of my courses are video based with everything students need from Beginner level to Advanced. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677cdd05da1140bf',m:'3a47e64a796cce1c373c1a6525246824714fa79e-1627797808-1800-AcTVr0m4/TRM7ezj2X8zXPEzDl7Jd9zgWM+QUtf+6fyCLCQlgqyWROxgk1YY3pauXdtZG7nCWGjOFtvgdTF3B8IHtnxQEfT8oQd6N1l76DawQF+0HYFTPe7J9AoeThNSIKSiDFs5r+gyB9QqPe10/ss=',s:[0xab0acbcb71,0x4065a20d4d],}})();
  5. How a Red Team Works at a Silicon Valley Company Building out your own Red Team at a large organization High Level and Low Level Crash Course on Windows Operating System Internals High Level and Low Level Crash Course on Linux Operating System Internals How the Kernel, Memory and the CPU work Beginner to Intermediate Networking How compiled programs work Full Guide to Python Programming Full Guide to Assembly Programing and Manual Shellcode Generation How Penetration Tests Actually Work and their Methodologies How and What Kerberos is Building, Managing and Attacking an Enterprise Active Directory Infrastructure The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale Building out Finding Reports and designing them for the right audience Being able to speak to Executives and Leadership at large organizations Passive and Active Reconnaissance tools and Techniques Real World Up to Date Exploitation Techniques Post Exploitation Techniques Custom Fix of Public Exploit Code The ability to creatively deploy persistence and backdoor binaries Living of the Land and Moving Laterally across the network Password Cracking Full Guide on Job Hunting in Silicon Valley Show more Show less Curated for the Udemy Business collection Requirements Basic I.T Knowledge Any Machine with at least 4GB of Memory (RAM) No Prior Security or Ethical Hacking Skills Description Welcome to the FIRST complete guide to Ethical Hacking ! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD ! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing ! The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview . This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews . Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn. Building out a Red Team at Enterprise Silicon Valley Scal e Skills to manage the Red Team as well as internal programs that can chance how the organization works Networking Windows Operating System Linux Operating System Operating System Internals (Memory, Stack, Heap, Kernels) Programming (Assembly & Python) Passive & Active Reconnaissance Attack and Create Active Directory Infrastructure Custom Exploitation Post Exploitation Breaking Jail Shells Abusing a Compromise to Lead to large scale attacks Password Cracking Build out a sophisticated in home lab Building a Personal Security Brand Building a Portfolio Job Hunting the Silicon Valley Way Smashing the Job Interview These are only SOME of the topics covered in this course. Of course you will receive 24 hour suppor t via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors . Don't wait! Take your career to the next level with the RedTeam Blueprint. Who this course is for: Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming Anyone who wants to learn the full skillset truly required to land the job Anyone who wants to learn how professional hackers work and target real organizations from a real hacker Anyone who wants to make a career move into Ethical Hacking from another field Show more Show less Course content 25 sections • 268 lectures • 30h 21m total length Expand all sections Welcome! Who Is This Guy?! 1 lecture • 1min Introduction Preview 01:16 The 3 Teams 4 lectures • 24min Module Overview - The 3 Teams Preview 01:27 The Red Team Preview 08:48 The Blue Team 05:46 The Purple Team 07:40 Penetration Testing Process 12 lectures • 1hr 23min Module Overview - Penetration Testing Process 03:39 Penetration Testing Methodology 08:11 Metrics & Why They Are Important 12:05 Routine Assessments Part 1 - What Are Routine Assessments? 04:25 Routine Assessments Part 2 - Yearly Assessments 05:28 Routine Assessments Part 3 - Quarterly Assessments? 09:17 Routine Assessments Part 4- Monthly Assessments? 04:31 Routine Assessments Part 5 - Constant Assessments? 08:12 Routine Assessments Part 6 - Building an Assessment Plan 07:21 Building & Working with an Enterprise Budget 12:15 Specialties?! 03:58 The CIA Triangle 03:09 The Windows Operating System 18 lectures • 3hr 4min Installing & Using VirtualBox for Lab Virtualization 10:41 Windows at a Glance 22:20 The Windows File System 11:42 Windows Logs 10:50 Windows Internals - UAC 08:38 Windows Internals - Permissions 16:45 Windows Internals - Alternate Data Streams 08:44 Windows Internals - API Calls 12:35 Windows Internals - The SID 06:11 Windows Internals - Tokens 07:49 Windows Internals - Named Pipes 06:01 Windows Internals - PE Files & DLLs 16:08 Windows Command Line - Accessing the Command Line 04:56 Windows Command Line - Navigation 07:04 Windows Command Line - Working with Files and Directories 07:31 Windows Command Line - Working with Pipes 09:32 Windows Command Line - Standard I/O/E 03:56 Windows Command Line - Managing Windows 12:07 The Linux Operating System 19 lectures • 1hr 50min Where is the GUI?! 03:50 The Linux File System 05:39 Linux Command Line - Navigation 04:27 Linux Command Line - Working with Files and Directories 08:42 Linux Command Line - Standard I/O/E Recap 03:48 Linux Command Line - Working with Data 13:32 Linux Command Line - Working with File Permissions 09:39 Linux Command Line - Man Pages 03:39 Linux Command Line - Base64 02:56 Linux Command Line - Hex 06:26 Linux Command Line - Network Connections Recap 03:58 Linux Processes 13:00 What are INodes? 04:30 Working with Open Files 06:38 Symbolic Links 05:49 The ID's 02:58 Linux Pipes 03:19 Linux Run Levels 03:49 Linux Logs 03:43 Operating System Internals 12 lectures • 1hr 2min The Kernel 11:10 One Ring to Rule Them All 05:40 What is a CPU? 02:40 The CPU Registers 09:16 The CPU Flags 02:08 What is Memory & How does it work? 03:35 The Stack 05:46 The Heap 03:23 Extra information on Memory 04:06 Debuggers 05:10 Taking a look at ASLR 03:22 A Quick Word About AntiVirus 05:14 Active Directory 9 lectures • 1hr 4min What is Active Directory 05:39 Basic Windows Server Configuration 07:01 Install AD DS 09:08 The AD Tree 09:41 OU's and their Permissions 06:31 Managing Users and Groups 05:00 Adding Machine to the Domain 06:59 Setting up Group Policies 11:32 Cached Credentials 02:34 Kerberos 4 lectures • 16min What is Kerberos? 03:41 Kerberos Realms 01:41 The Authentication Server 03:32 The Ticket Granting Server 06:48 Data Manipulation 16 lectures • 50min What is Encryption 03:24 Symmetric Encryption 03:39 Asymmetric Encryption 05:02 RSA Encryption 02:07 AES Encryption 01:42 What is Hashing? 03:06 MD5 Hashing 02:34 SHA Hashing 04:28 What is Encoding? 02:08 Base64 Encoding 04:06 Hex Encoding 04:24 URL Encoding 02:53 What is Compression? 03:04 Lossless vs Lossy Compression 03:08 LZ77 & LZ78 Compression Algorithms 02:03 Data Manipulation - Hands On 01:54 Networking 17 lectures • 1hr 26min What is Networking? 08:16 The OSI Model 05:20 TCP/IP 09:56 UDP 02:38 The Switch 04:07 Routers & Gateways 06:08 What is a Protocol? 01:27 ICMP 06:00 DNS 08:12 DHCP 06:03 ARP 04:33 What is an IDS 03:30 What is an IPS 04:45 What is HA? 04:35 Proxys 03:17 The DMZ 02:36 Quick Talk on Databases 04:17 15 more sections Instructor Brandon Dennis Silicon Valley Hacker and Lead Instructor @ RedTeam Nation 4.5 Instructor Rating 1,189 Reviews 38,787 Students 2 Courses My name is Brandon Dennis. I have over 8+ years in experience with Ethical Hacking and Red Teaming. I have worked at everything from Silicon Valley Companies to smaller 10 man organizations. I spoken publicly, published 0 day exploits and open source countless projects on everything from Custom Windows Token Impersonation Toolkits to In Memory Bypasses. I am currently an Ethical Hacker for a Silicon Valley company and CEO of RedTeam Nation. I develop all of my courses based on realistic goals of getting student where they need to go in their career. Just learning Ethical Hacking is not enough in todays world so I take my courses to the next level. I go over not only what is required for the job at Silicon Valley company scale in terms of Ethical Hacking but also what is really required for the job and to pass the Interview itself! All of my courses are hands on, freshly designed and provide the latest information in the world of Information Security. All of my courses are video based with everything students need from Beginner level to Advanced. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677cdd05da1140bf',m:'3a47e64a796cce1c373c1a6525246824714fa79e-1627797808-1800-AcTVr0m4/TRM7ezj2X8zXPEzDl7Jd9zgWM+QUtf+6fyCLCQlgqyWROxgk1YY3pauXdtZG7nCWGjOFtvgdTF3B8IHtnxQEfT8oQd6N1l76DawQF+0HYFTPe7J9AoeThNSIKSiDFs5r+gyB9QqPe10/ss=',s:[0xab0acbcb71,0x4065a20d4d],}})();
  6. Building out your own Red Team at a large organization High Level and Low Level Crash Course on Windows Operating System Internals High Level and Low Level Crash Course on Linux Operating System Internals How the Kernel, Memory and the CPU work Beginner to Intermediate Networking How compiled programs work Full Guide to Python Programming Full Guide to Assembly Programing and Manual Shellcode Generation How Penetration Tests Actually Work and their Methodologies How and What Kerberos is Building, Managing and Attacking an Enterprise Active Directory Infrastructure The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale Building out Finding Reports and designing them for the right audience Being able to speak to Executives and Leadership at large organizations Passive and Active Reconnaissance tools and Techniques Real World Up to Date Exploitation Techniques Post Exploitation Techniques Custom Fix of Public Exploit Code The ability to creatively deploy persistence and backdoor binaries Living of the Land and Moving Laterally across the network Password Cracking Full Guide on Job Hunting in Silicon Valley Show more Show less Curated for the Udemy Business collection Requirements Basic I.T Knowledge Any Machine with at least 4GB of Memory (RAM) No Prior Security or Ethical Hacking Skills Description Welcome to the FIRST complete guide to Ethical Hacking ! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD ! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing ! The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking. After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview . This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews . Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available! We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn. Building out a Red Team at Enterprise Silicon Valley Scal e Skills to manage the Red Team as well as internal programs that can chance how the organization works Networking Windows Operating System Linux Operating System Operating System Internals (Memory, Stack, Heap, Kernels) Programming (Assembly & Python) Passive & Active Reconnaissance Attack and Create Active Directory Infrastructure Custom Exploitation Post Exploitation Breaking Jail Shells Abusing a Compromise to Lead to large scale attacks Password Cracking Build out a sophisticated in home lab Building a Personal Security Brand Building a Portfolio Job Hunting the Silicon Valley Way Smashing the Job Interview These are only SOME of the topics covered in this course. Of course you will receive 24 hour suppor t via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors . Don't wait! Take your career to the next level with the RedTeam Blueprint. Who this course is for: Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming Anyone who wants to learn the full skillset truly required to land the job Anyone who wants to learn how professional hackers work and target real organizations from a real hacker Anyone who wants to make a career move into Ethical Hacking from another field Show more Show less Course content 25 sections • 268 lectures • 30h 21m total length Expand all sections Welcome! Who Is This Guy?! 1 lecture • 1min Introduction Preview 01:16 The 3 Teams 4 lectures • 24min Module Overview - The 3 Teams Preview 01:27 The Red Team Preview 08:48 The Blue Team 05:46 The Purple Team 07:40 Penetration Testing Process 12 lectures • 1hr 23min Module Overview - Penetration Testing Process 03:39 Penetration Testing Methodology 08:11 Metrics & Why They Are Important 12:05 Routine Assessments Part 1 - What Are Routine Assessments? 04:25 Routine Assessments Part 2 - Yearly Assessments 05:28 Routine Assessments Part 3 - Quarterly Assessments? 09:17 Routine Assessments Part 4- Monthly Assessments? 04:31 Routine Assessments Part 5 - Constant Assessments? 08:12 Routine Assessments Part 6 - Building an Assessment Plan 07:21 Building & Working with an Enterprise Budget 12:15 Specialties?! 03:58 The CIA Triangle 03:09 The Windows Operating System 18 lectures • 3hr 4min Installing & Using VirtualBox for Lab Virtualization 10:41 Windows at a Glance 22:20 The Windows File System 11:42 Windows Logs 10:50 Windows Internals - UAC 08:38 Windows Internals - Permissions 16:45 Windows Internals - Alternate Data Streams 08:44 Windows Internals - API Calls 12:35 Windows Internals - The SID 06:11 Windows Internals - Tokens 07:49 Windows Internals - Named Pipes 06:01 Windows Internals - PE Files & DLLs 16:08 Windows Command Line - Accessing the Command Line 04:56 Windows Command Line - Navigation 07:04 Windows Command Line - Working with Files and Directories 07:31 Windows Command Line - Working with Pipes 09:32 Windows Command Line - Standard I/O/E 03:56 Windows Command Line - Managing Windows 12:07 The Linux Operating System 19 lectures • 1hr 50min Where is the GUI?! 03:50 The Linux File System 05:39 Linux Command Line - Navigation 04:27 Linux Command Line - Working with Files and Directories 08:42 Linux Command Line - Standard I/O/E Recap 03:48 Linux Command Line - Working with Data 13:32 Linux Command Line - Working with File Permissions 09:39 Linux Command Line - Man Pages 03:39 Linux Command Line - Base64 02:56 Linux Command Line - Hex 06:26 Linux Command Line - Network Connections Recap 03:58 Linux Processes 13:00 What are INodes? 04:30 Working with Open Files 06:38 Symbolic Links 05:49 The ID's 02:58 Linux Pipes 03:19 Linux Run Levels 03:49 Linux Logs 03:43 Operating System Internals 12 lectures • 1hr 2min The Kernel 11:10 One Ring to Rule Them All 05:40 What is a CPU? 02:40 The CPU Registers 09:16 The CPU Flags 02:08 What is Memory & How does it work? 03:35 The Stack 05:46 The Heap 03:23 Extra information on Memory 04:06 Debuggers 05:10 Taking a look at ASLR 03:22 A Quick Word About AntiVirus 05:14 Active Directory 9 lectures • 1hr 4min What is Active Directory 05:39 Basic Windows Server Configuration 07:01 Install AD DS 09:08 The AD Tree 09:41 OU's and their Permissions 06:31 Managing Users and Groups 05:00 Adding Machine to the Domain 06:59 Setting up Group Policies 11:32 Cached Credentials 02:34 Kerberos 4 lectures • 16min What is Kerberos? 03:41 Kerberos Realms 01:41 The Authentication Server 03:32 The Ticket Granting Server 06:48 Data Manipulation 16 lectures • 50min What is Encryption 03:24 Symmetric Encryption 03:39 Asymmetric Encryption 05:02 RSA Encryption 02:07 AES Encryption 01:42 What is Hashing? 03:06 MD5 Hashing 02:34 SHA Hashing 04:28 What is Encoding? 02:08 Base64 Encoding 04:06 Hex Encoding 04:24 URL Encoding 02:53 What is Compression? 03:04 Lossless vs Lossy Compression 03:08 LZ77 & LZ78 Compression Algorithms 02:03 Data Manipulation - Hands On 01:54 Networking 17 lectures • 1hr 26min What is Networking? 08:16 The OSI Model 05:20 TCP/IP 09:56 UDP 02:38 The Switch 04:07 Routers & Gateways 06:08 What is a Protocol? 01:27 ICMP 06:00 DNS 08:12 DHCP 06:03 ARP 04:33 What is an IDS 03:30 What is an IPS 04:45 What is HA? 04:35 Proxys 03:17 The DMZ 02:36 Quick Talk on Databases 04:17 15 more sections Instructor Brandon Dennis Silicon Valley Hacker and Lead Instructor @ RedTeam Nation 4.5 Instructor Rating 1,189 Reviews 38,787 Students 2 Courses My name is Brandon Dennis. I have over 8+ years in experience with Ethical Hacking and Red Teaming. I have worked at everything from Silicon Valley Companies to smaller 10 man organizations. I spoken publicly, published 0 day exploits and open source countless projects on everything from Custom Windows Token Impersonation Toolkits to In Memory Bypasses. I am currently an Ethical Hacker for a Silicon Valley company and CEO of RedTeam Nation. I develop all of my courses based on realistic goals of getting student where they need to go in their career. Just learning Ethical Hacking is not enough in todays world so I take my courses to the next level. I go over not only what is required for the job at Silicon Valley company scale in terms of Ethical Hacking but also what is really required for the job and to pass the Interview itself! All of my courses are hands on, freshly designed and provide the latest information in the world of Information Security. All of my courses are video based with everything students need from Beginner level to Advanced. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type =