Attacking and Defending Active Directory
What about this course?
The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and administrators struggle to fill. Over the years, we have taught numerous professionals in real-world training on AD security and always found that there is a lack of quality material, which can take students from the basics of Active Directory security, and teach them how to attack and defend it. Attacking and Defending Active Directory is a beginner-friendly course designed for security professionals who would like to enhance their AD security knowledge and want to understand practical threats and attacks in a modern Active Directory environment. The course is based on our years of experience in making and breaking Windows and AD environments and teaching security professionals. We cover topics like AD enumeration, trusts mapping, domain privilege escalation, domain persistence, Kerberos-based attacks (Golden ticket, Silver ticket, and more), ACL issues, SQL server trusts, Defenses, and bypasses of defenses. <p> </p> <p><span style="font-size:18px"><span style="color:#e74c3c"><strong>IMPORTANT INFORMATION!</strong></span></span></p> <p><span style="color:#dddddd"><strong>As of January 15th 2023, Pentester Academy & INE no longer offers:</strong></span></p> <li><span style="color:#dddddd"><strong>Enterprise Security Labs (Active Directory/Red Team Labs & Courses)</strong></span></li> <li><span style="color:#dddddd"><strong>Active Directory/Azure Bootcamps and its associated certifications (CRTP/CRTE/PACES/LinuxAD/CARTP/CAWASP)</strong></span></li> <p><span style="color:#dddddd"><u><strong>Prior to April 18th 2023, all current subscribers will still be able to access this course, after which it will be no longer available.</strong></u></span></p>
Instructor for this course
Nikhil Mittal
InfoSec Researcher
This course is composed by the following modules
Course Introduction
Domain Enumeration Part 1
Domain Enumeration Part 2
Domain Enumeration Part 3
Domain Enumeration Part 4
Local Privilege Escalation Part 1
Local Privilege Escalation Part 2
Domain Enumeration BloodHound
Lateral Movement
Domain Persistence Part 1
Domain Persistence Part 2
Domain Persistence Part 3
Domain Persistence Part 4
Domain Persistence Part 5
Domain Privilege Escalation Kerberoast
Domain Privilege Escalation: Unconstrained Delegation
Domain Privilege Escalation: Constrained Delegation
Domain Privilege Escalation: DNSAdmins
Cross Forest Attacks
Forest Persistence DCShadow
Detection and Defense Part 1
Detection and Defense Part 2
Detection and Defense Part 3
Detection and Defense Part 4
Detection and Defense Part 5
Walkthrough Objective 1-4
Walkthrough Objective 5
Walkthrough Objective 6
Walkthrough Objective 7
Walkthrough Objective 8-11
Walkthrough Objective 12-13
Walkthrough Objective 14-16
Walkthrough Objective 17-18
Walkthrough Objective 19-20
Walkthrough Objective 21-22
Walkthrough Objective 23
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?