The RedTeam Blueprint - A Unique Guide To Ethical Hacking
4.2 (866 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
36,298 students enrolled

The RedTeam Blueprint - A Unique Guide To Ethical Hacking

Learn what it really takes to be an Ethical Hacker for Silicon Valley Companies. The TRUE Blueprint to Ethical Hacking.
4.2 (866 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
36,298 students enrolled
Created by Brandon Dennis
Last updated 5/2020
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 30.5 hours on-demand video
  • 133 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • 300+ HD Videos
  • 180+ Hands on Exercises
  • 400+ Topics
  • 30+ Hours of Content
  • How a Red Team Works at a Silicon Valley Company
  • Building out your own Red Team at a large organization
  • High Level and Low Level Crash Course on Windows Operating System Internals
  • High Level and Low Level Crash Course on Linux Operating System Internals
  • How the Kernel, Memory and the CPU work
  • Beginner to Intermediate Networking
  • How compiled programs work
  • Full Guide to Python Programming
  • Full Guide to Assembly Programing and Manual Shellcode Generation
  • How Penetration Tests Actually Work and their Methodologies
  • How and What Kerberos is
  • Building, Managing and Attacking an Enterprise Active Directory Infrastructure
  • The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale
  • Building out Finding Reports and designing them for the right audience
  • Being able to speak to Executives and Leadership at large organizations
  • Passive and Active Reconnaissance tools and Techniques
  • Real World Up to Date Exploitation Techniques
  • Post Exploitation Techniques
  • Custom Fix of Public Exploit Code
  • The ability to creatively deploy persistence and backdoor binaries
  • Living of the Land and Moving Laterally across the network
  • Password Cracking
  • Full Guide on Job Hunting in Silicon Valley
  • Basic I.T Knowledge
  • Any Machine with at least 4GB of Memory (RAM)
  • No Prior Security or Ethical Hacking Skills

Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!

The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.

After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.

Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!

We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.

  • Building out a Red Team at Enterprise Silicon Valley Scale

  • Skills to manage the Red Team as well as internal programs that can chance how the organization works

  • Networking

  • Windows Operating System

  • Linux Operating System

  • Operating System Internals (Memory, Stack, Heap, Kernels)

  • Programming (Assembly & Python)

  • Passive & Active Reconnaissance

  • Attack and Create Active Directory Infrastructure

  • Custom Exploitation

  • Post Exploitation

  • Breaking Jail Shells

  • Abusing a Compromise to Lead to large scale attacks

  • Password Cracking

  • Build out a sophisticated in home lab

  • Building a Personal Security Brand

  • Building a Portfolio

  • Job Hunting the Silicon Valley Way

  • Smashing the Job Interview

These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.

Don't wait! Take your career to the next level with the RedTeam Blueprint. 

Who this course is for:
  • Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming
  • Anyone who wants to learn the full skillset truly required to land the job
  • Anyone who wants to learn how professional hackers work and target real organizations from a real hacker
  • Anyone who wants to make a career move into Ethical Hacking from another field
Course content
Expand all 268 lectures 30:21:08
+ Welcome! Who Is This Guy?!
1 lecture 01:16


Follow Me on Twitter: @brandondHTE
Subscribe Youtube:

Preview 01:16
+ The 3 Teams
4 lectures 23:41

You will have a base understanding of what these 3 Core Teams are.

Preview 01:27

You will have a solid understanding of what a Red Team is, how its used and where it fits into an organization.

Preview 08:48

You will have a solid understanding of what a Blue Team is, how its used and where it fits into an organization.

The Blue Team

You will have a solid understanding of what a Purple Team is, how its used and where it fits into an organization.

The Purple Team
+ Penetration Testing Process
12 lectures 01:22:31

Students will learn how to build out an internal Red Team at scale. Along with this a current and industry used Penetration Methodology that will outline the rest of the course.

Module Overview - Penetration Testing Process

You will learn a new industry Penetration Testing Methodology used at Silicon Valley Companies.

Penetration Testing Methodology

You will learn what Metrics are, how they are used and how to build them yourself!

Metrics & Why They Are Important

You will have a solid understanding of what assessments are in a Red Team and start brain storming on different types.

Routine Assessments Part 1 - What Are Routine Assessments?

Now that we have covered what assessments are you will learn how and why Yearly assessments are done.

Routine Assessments Part 2 - Yearly Assessments

Now that we have covered what Yearly assessments are you will learn how and why Quarterly assessments are done.

Routine Assessments Part 3 - Quarterly Assessments?

Now that we have covered what Quarterly assessments are you will learn how and why Monthly assessments are done.

Routine Assessments Part 4- Monthly Assessments?

Now that we have covered what Monthly assessments are you will learn how and why Constant assessments are done.

Routine Assessments Part 5 - Constant Assessments?

With a good understanding of the different types of assessments that are possible and their frequency I now task you with building your own for a Red Team! You will learn in this video how to build out your own.

Routine Assessments Part 6 - Building an Assessment Plan

Working with a budget and being able to build one speaks volumes about you as a professional. This is a key component to truly landing the job.

Building & Working with an Enterprise Budget

It's important to understand your specialty in the field of Ethical Hacking. This will help with job hunting as well as the interview process.


The CIA Triangle is commonly used in a large section of I.T. For Security it is paramount to understand why it is in place and what each step means.

The CIA Triangle
+ The Windows Operating System
18 lectures 03:03:30

Learn how to build a virtualization environment that will be utilized throughout the rest of the course.

Installing & Using VirtualBox for Lab Virtualization

Knowing your way around Windows is required for an attacker. A lot of enterprise companies still utilize Windows environments.

Windows at a Glance

You will learn how the current Windows File System works and some intimate details about it.

The Windows File System

Knowing where and how Windows logs it's events is a core skill to any Ethical Hacker.

Windows Logs

User Account Control or UAC is going to get in your way as an Ethical Hacker. You need to get a good grasp on this topic and how its implemented to understand how to beat it!

Windows Internals - UAC

Learning to abuse Windows? Permissions is where its at. This is by far the most commonly misconfigured element of Windows environments!

Windows Internals - Permissions

Alternate Data Streams or ADS is a great way to hide data but also can be used in some sneaky and creative ways.

Windows Internals - Alternate Data Streams

API Calls in Windows can be complicated at first but once you understand what they do and how things get much easier. When looking at Windows based Privilege Escalation exploits you tend to see API Calls used and it makes reading and understanding them far easier!

Windows Internals - API Calls

The SID for Windows is a unique number for users/groups. Being able to quickly identify a user based on it's SID allows you to see a lower level of Windows.

Windows Internals - The SID

Windows Tokens are one of my favorite concepts. You can abuse these in SO MANY ways. Token Impersonation is a key concept for any Ethical Hacker!

Windows Internals - Tokens

Windows Named Pipes are used by most applications in Windows. They have their own vulnerabilities and understand what they are and how they work can allow someone to be very "creative".

Windows Internals - Named Pipes

Here we take a look and how a PE and DLL file is structured and some of the components of each. This forms a base for knowledge to be gained in future modules.

Windows Internals - PE Files & DLLs

Learning the Windows Command Line is a required skill for any hacker. You won't find yourself with a GUI very often and knowing how to move around, manage the machine and do what you need to without it is a hard requirement!

Windows Command Line - Accessing the Command Line

Learn about navigation in the Windows Command Line world!

Windows Command Line - Navigation

Learn to work with files and directories in Windows Command Line.

Windows Command Line - Working with Files and Directories

As we learned about Named Pipes now we can use them in actions to see what we can do with them.

Windows Command Line - Working with Pipes

The Standard Input Output an Error are used throughout all Operating Systems. They are commonly used the same way in most OS's. This is a useful skill to make working on the Command Line far easier.

Windows Command Line - Standard I/O/E

You never know when you need to make a configuration setting, add a rouge service or learn more about the system. Know how to manage Windows without the GUI!

Windows Command Line - Managing Windows
+ The Linux Operating System
19 lectures 01:50:22

We take our first look at Linux and figure out where the GUI went!

Where is the GUI?!

Before we dive into Linux its important to understand how the file system in laid out and that EVERYTHING is a FILE!

The Linux File System

Since most of your time as an attacker is spent in a Terminal or Command Line its paramount to know how to navigate. This is fairly similar to Windows.

Linux Command Line - Navigation

Since everything is a file, that includes directories, we need to know how to work with them!

Linux Command Line - Working with Files and Directories

Very similar to Windows Standard I/O/E we will do a quick recap on the subject in Linux.

Linux Command Line - Standard I/O/E Recap

How that we understand how to work with files we need to learn how to work with data itself. We go over how to manipulate data to our will!

Linux Command Line - Working with Data

Same with Windows Permission we must learn the Linux side of the fence. There are a lot of vulnerabilities that rely on configuration issues with permissions. Understanding this will provide you a greater insight on how things work and how they can be abused.

Linux Command Line - Working with File Permissions

Man pages are the Linux Users quick look up replacement of Google Searching. These can provide very critical bits of information that are specific to a system without looking through countless white papers.

Linux Command Line - Man Pages

Being able to use and manipulate base64 is useful for not only encoding larger normally unreadable data but for getting binaries/data on and off machines!

Linux Command Line - Base64

Very similar to base64 use cases but has its uses elsewhere in other applications! Its important to understand how to quickly get and resolve hex/base64 data.

Linux Command Line - Hex

We quickly recap how to grab network connections in Linux as we did with Windows. Remember in Linux everything is a file!

Linux Command Line - Network Connections Recap

Learn about how Linux processes work and the types you will run into.

Linux Processes

INodes are an integral part of the Linux File System. They can be used in a lot of useful ways!

What are INodes?

Since everything is a file dealing with Open Files is just as important! You will learn how to manage Open Files on Linux.

Working with Open Files

Abusing Symbolic Links is very fun but you need to know how to use them first!

Symbolic Links

Linux uses ID's just like Windows uses SID's. You will need to understand these as well when attacking a Linux Machine.

The ID's

Similar to Windows Pipes Linux has their own! These are very useful for working with data.

Linux Pipes

We go over the Run Levels of Linux and what each of them mean. They each have their own attack vector.

Linux Run Levels

Logging is a big topic on Linux machines. A lot of organizations will build their own logs and sometimes provide juicy information!

Linux Logs
+ Operating System Internals
12 lectures 01:01:30

Here you will learn about the Linux Kernel and how it works.

The Kernel

Inside of the Kernel we have different ring levels. Each of these levels provide different privileges. With understanding this it helps work on exploit development and how attacks affect the Kernel.

One Ring to Rule Them All

We take a quick break from low level stuff to see how a CPU itself works.

What is a CPU?

When looking at the CPU there is a base component called Registers. These will be required in our Assembly section of the course so be sure to watch this!

The CPU Registers

Flags are similar to registers and are just as required for the Assembly course!

The CPU Flags

We take our first look at how memory works on computers. This can be a deep topic so rewatch if needed.

What is Memory & How does it work?

We take a stab at tackling the Stack! If you are wanting to learn Buffer Overflows or Exploit Development this is essential.

The Stack

While Similar to the Stack The Heap helps out a different part of the process!

The Heap

Here we provide some extra context on memory and the CPU!

Extra information on Memory

In this video we take our knowledge of memory and the CPU and dive into a debugger!


We look at Address Space Layout Randomization or ASLR and how it works in Windows.

Taking a look at ASLR

We quickly talk about AnitVIrus and some issues facing an Ethical Hacker.

A Quick Word About AntiVirus
+ Active Directory
9 lectures 01:04:05

Active Directory is a very common infrastructure at larger organizations. To best attack this type of infrastructure you should know how it works and be able to configure it yourself.

What is Active Directory

We hit the base configurations for a Windows Server for our needs.

Basic Windows Server Configuration

We look at actually installing Active Directory on our specified Windows Server and how to configure it.

Install AD DS

Understanding the Active Directory Tree is just as important as configuring Active Directory itself. An attacker will commonly find themselves investigating the Tree for issues.

The AD Tree

Along with the Tree itself there are leaves or OU's. Theses contain all of the data and objects. You will have a good grasp on how and why things are setup the way they are.

OU's and their Permissions

We take a look at managing users and groups. This includes delegation of permissions and setting up help desk users.

Managing Users and Groups

We take our first look at extending the AD Infrastructure with another machine. This is a key step in configuration of a home lab.

Adding Machine to the Domain

Group Policies is what makes AD so useful. This is commonly the place that is abused from an attacker perspective.

Setting up Group Policies

We see how cached credentials can be dangerous.

Cached Credentials
+ Kerberos
4 lectures 15:42

We take our first look at Kerberos and see how it works and where it fits into a Red Team's attack vectors.

What is Kerberos?

We talk about the first section of Kerberos and how Realms are handled by the service.

Kerberos Realms

The next step of Kerberos is the Authentication Server. Understanding this is required for Kerberos.

The Authentication Server

We take a final look at Kerberos with the TGS. This is what is commonly abused by Ethical Hackers in the real world.

The Ticket Granting Server
+ Data Manipulation
16 lectures 49:42

We take a look encryption and see how it works and how its used.

What is Encryption

We take a look Symmetric Encryption and see how it works and how its used.

Symmetric Encryption

We take a look Asymmetric Encryption and see how it works and how its used.

Asymmetric Encryption

We learn about RSA Encryption and where its use cases are.

RSA Encryption

We learn about AES Encryption and where its use cases are.

AES Encryption

We take a quick look at what Hashing is and how it is used.

What is Hashing?

We see how MD5 works and where its vulnerable as well as its uses cases.

MD5 Hashing

Learning SHA is important. This is a commonly used algorithm for a large amount fo protocols and services! 

SHA Hashing

Encoding is used everywhere! We take a look at what it is and how it works!

What is Encoding?

Base64 encoding is commonly used in Web Applications. It also has a few uses for Ethical Hackers as well!

Base64 Encoding

Like Base64 this has its used to Ethical Hackers as well. Hex encoding is normally used internally to applications.

Hex Encoding

While exclusively used with Web Browsers URL Encoding is critical to understand when attacking any type of web application.

URL Encoding

In this video we take a look at what compression is and where it is used.

What is Compression?

We look at 2 common type of compression and when they should be used.

Lossless vs Lossy Compression

Now that we understand the compression types we will look at the 2 common algorithms that are used today.

LZ77 & LZ78 Compression Algorithms

We start with a hands on exercises for different types of data manipulation

Data Manipulation - Hands On
+ Networking
17 lectures 01:25:40

We take a look at what Networking is and where it is used.

What is Networking?

The OSI Model is a core concept for troubleshooting and understanding networks.

The OSI Model

We take our first look at what TCP/IP is and how it is used in networks.


Following up TCP/IP we look at the other half at UDP.


We learn what a switch is, where its used and how it works.

The Switch

We learn what a Router & Gateway is, where its used and how it works.

Routers & Gateways

Now that we have a solid understanding on Networking and TCP/IP & UDP. We now look into what a protocol really is.

What is a Protocol?

Take a deep look at ICMP.


DNS is not only critical for Networks but very useful for exfiltration to attackers.


DCHP is another core protocol for enterprise networks. Its critical to understand how this works from an attacker perspective.


IDS's are common in todays infrastructure. It's paramount to understand how theses works and where they are placed.

What is an IDS

IPS's are common in todays infrastructure. It's paramount to understand how theses works and where they are placed.

What is an IPS

High Availability or HA is one of the most important skills when looking at networks as this can make or break a conversation.

What is HA?

Proxies can make your life as an attacker easier or much more difficult.


Demilitarized Zones or DMZ can catch Hackers in a tough spot and being able to spot this is critical.


We talk quickly about databases and where they are used.

Quick Talk on Databases