In this course you will learn to how to do a professional penetration test on a active directory domain. Before you start this course make sure you have done the beginners course on Windows server 2022.
https://cyberheaven.eu/courses/beginners-course-windows-server-2022/
Keep in mind the course is still in development so all feedback will be very valuable to the team!! feel free to leave feedback if you can. Also do not forget our join the discord to be part of the live development of this course: https://discord.gg/8Hqgydnmas
Curriculum
- 3 Sections
- 33 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Introduction to penetration testing11
- 2.1Lesson 1: Introduction10 Minutes
- 2.2Lesson 2: Documentation10 Minutes
- 2.3Lesson 3: Ethics5 Minutes
- 2.4Lesson 4: Responsible Vulnerability Disclosure5 Minutes
- 2.5Lesson 5: Reconnaissance10 Minutes
- 2.6Lesson 6: Network Enumeration60 Minutes
- 2.7Lesson 7: Initial Access and System Enumeration180 Minutes
- 2.8Lesson 8: Privilege Escalation180 Minutes
- 2.9Lesson 9: Obfuscation10 Minutes
- 2.10Lesson 10: Persistence5 Minutes
- 2.11Lesson 11: Post Exploitation5 Minutes
- Setup vulnerable active directory windows domain environment6
- The practical active directory penetration attack cycle16
- 4.0Lesson 18: Network Enumeration200 Minutes
- 4.1Lesson 19: User Enumeration30 Minutes
- 4.2Lesson 20: LLMNR Poisoning30 Minutes
- 4.3Lesson 21: Brute Forcing Initial Access10 Minutes
- 4.4Lesson 22: Kerberoasting30 Minutes
- 4.5Lesson 23: Command and Control using Metasploit30 Minutes
- 4.6Lesson 24: Gaining Access using Impacket30 Minutes
- 4.7Lesson 25: Domain Enumeration30 Minutes
- 4.8Lesson 26: Generating Payloads60 Minutes
- 4.9Lesson 27: Anti Virus Evasion60 Minutes
- 4.11Lesson 28: Credential dumping60 Minutes
- 4.12Lesson 29: Token Impersonation
- 4.13Lesson 30: Data Exfiltration
- 4.14Lesson 31: Man in the Middle Attack
- 4.15Lesson 32: The Clean Up – Not finished
- 4.16Extra resources for further studying – Not finished
Requirements
- Active Directory
- Powershell
- bash
Features
- Kerbroasting
- pass the hash
- enumeration
- exploitation
Target audiences
- Penetration testers
- Cyber security professionals
- Network administrators
- system administrators
52 Responses
Student of penetration
Like to enrole for this course
Enroll ad
I need this course and its on time for me
I am willing to enroll for the course.
I want to enroll for active directory penetration testing
A
Interested
I am interested in the active directory penetration testing course
I want to learn Active directory pentesting
Interested
Can’t wait to learn AD pentesting
Looking to learn AD Pen testing
Eagerly waiting
k
Hello
I would like to thank you for sharing this wonderful LAB
I want to learn Active Directory Penetration Testing
123
I am a person passionate about computer networks and cybersecurity, and
and cybersecurity, and always motivated to learn new technologies and expand my knowledge
and expand my knowledge in the challenging world of IT and i want to learn more .
Interested
Interested in program
no comment
Thank you
I’m working as a SOC analyst, i feel this course will help me.
I am interested to do this course
Ad attacks
Where can I find the Windows server 2022 course
Want to learn PT
Please confirm registration
Please include me into this session.
Thank you for creating these academy platform and sharing valuable trainings.
Let’s Go!!
Thankyou for create course training AD Pentest, im so happy to learn this course
Please I want to enroll
I’m interest
Good decision to sharing knowledge with us
As a Cyber Security Professional, I am interested to learn this course.
Interested
I want to enroll for this course.
I want to enrroll, please
Interested
Interested
I’m interested
Interested
Interested
Intersted
Done ✅
Want to enroll in this course
I would like to do this training
Done
Great !
Great!