The RedTeam Blueprint - A Unique Guide To Ethical Hacking
4.2 (866 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
36,298 students enrolled

The RedTeam Blueprint - A Unique Guide To Ethical Hacking

Learn what it really takes to be an Ethical Hacker for Silicon Valley Companies. The TRUE Blueprint to Ethical Hacking.
4.2 (866 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
36,298 students enrolled
Created by Brandon Dennis
Last updated 5/2020
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 30.5 hours on-demand video
  • 133 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • 300+ HD Videos
  • 180+ Hands on Exercises
  • 400+ Topics
  • 30+ Hours of Content
  • How a Red Team Works at a Silicon Valley Company
  • Building out your own Red Team at a large organization
  • High Level and Low Level Crash Course on Windows Operating System Internals
  • High Level and Low Level Crash Course on Linux Operating System Internals
  • How the Kernel, Memory and the CPU work
  • Beginner to Intermediate Networking
  • How compiled programs work
  • Full Guide to Python Programming
  • Full Guide to Assembly Programing and Manual Shellcode Generation
  • How Penetration Tests Actually Work and their Methodologies
  • How and What Kerberos is
  • Building, Managing and Attacking an Enterprise Active Directory Infrastructure
  • The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale
  • Building out Finding Reports and designing them for the right audience
  • Being able to speak to Executives and Leadership at large organizations
  • Passive and Active Reconnaissance tools and Techniques
  • Real World Up to Date Exploitation Techniques
  • Post Exploitation Techniques
  • Custom Fix of Public Exploit Code
  • The ability to creatively deploy persistence and backdoor binaries
  • Living of the Land and Moving Laterally across the network
  • Password Cracking
  • Full Guide on Job Hunting in Silicon Valley
Requirements
  • Basic I.T Knowledge
  • Any Machine with at least 4GB of Memory (RAM)
  • No Prior Security or Ethical Hacking Skills
Description

Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!

The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.


After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.


Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!

We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.

  • Building out a Red Team at Enterprise Silicon Valley Scale

  • Skills to manage the Red Team as well as internal programs that can chance how the organization works

  • Networking

  • Windows Operating System

  • Linux Operating System

  • Operating System Internals (Memory, Stack, Heap, Kernels)

  • Programming (Assembly & Python)

  • Passive & Active Reconnaissance

  • Attack and Create Active Directory Infrastructure

  • Custom Exploitation

  • Post Exploitation

  • Breaking Jail Shells

  • Abusing a Compromise to Lead to large scale attacks

  • Password Cracking

  • Build out a sophisticated in home lab

  • Building a Personal Security Brand

  • Building a Portfolio

  • Job Hunting the Silicon Valley Way

  • Smashing the Job Interview


These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.


Don't wait! Take your career to the next level with the RedTeam Blueprint. 

Who this course is for:
  • Anyone Curious about Ethical Hacking, Penetration Testing or Red Teaming
  • Anyone who wants to learn the full skillset truly required to land the job
  • Anyone who wants to learn how professional hackers work and target real organizations from a real hacker
  • Anyone who wants to make a career move into Ethical Hacking from another field
Course content
Expand all 268 lectures 30:21:08
+ Welcome! Who Is This Guy?!
1 lecture 01:16

Welcome!

Follow Me on Twitter: @brandondHTE
Subscribe Youtube: https://bit.ly/358UEJW

Preview 01:16
+ The 3 Teams
4 lectures 23:41

You will have a base understanding of what these 3 Core Teams are.

Preview 01:27

You will have a solid understanding of what a Red Team is, how its used and where it fits into an organization.

Preview 08:48

You will have a solid understanding of what a Blue Team is, how its used and where it fits into an organization.

The Blue Team
05:46

You will have a solid understanding of what a Purple Team is, how its used and where it fits into an organization.

The Purple Team
07:40
+ Penetration Testing Process
12 lectures 01:22:31

Students will learn how to build out an internal Red Team at scale. Along with this a current and industry used Penetration Methodology that will outline the rest of the course.

Module Overview - Penetration Testing Process
03:39

You will learn a new industry Penetration Testing Methodology used at Silicon Valley Companies.

Penetration Testing Methodology
08:11

You will learn what Metrics are, how they are used and how to build them yourself!

Metrics & Why They Are Important
12:05

You will have a solid understanding of what assessments are in a Red Team and start brain storming on different types.

Routine Assessments Part 1 - What Are Routine Assessments?
04:25

Now that we have covered what assessments are you will learn how and why Yearly assessments are done.

Routine Assessments Part 2 - Yearly Assessments
05:28

Now that we have covered what Yearly assessments are you will learn how and why Quarterly assessments are done.

Routine Assessments Part 3 - Quarterly Assessments?
09:17

Now that we have covered what Quarterly assessments are you will learn how and why Monthly assessments are done.

Routine Assessments Part 4- Monthly Assessments?
04:31

Now that we have covered what Monthly assessments are you will learn how and why Constant assessments are done.

Routine Assessments Part 5 - Constant Assessments?
08:12

With a good understanding of the different types of assessments that are possible and their frequency I now task you with building your own for a Red Team! You will learn in this video how to build out your own.

Routine Assessments Part 6 - Building an Assessment Plan
07:21

Working with a budget and being able to build one speaks volumes about you as a professional. This is a key component to truly landing the job.

Building & Working with an Enterprise Budget
12:15

It's important to understand your specialty in the field of Ethical Hacking. This will help with job hunting as well as the interview process.

Specialties?!
03:58

The CIA Triangle is commonly used in a large section of I.T. For Security it is paramount to understand why it is in place and what each step means.

The CIA Triangle
03:09
+ The Windows Operating System
18 lectures 03:03:30

Learn how to build a virtualization environment that will be utilized throughout the rest of the course.

Installing & Using VirtualBox for Lab Virtualization
10:41

Knowing your way around Windows is required for an attacker. A lot of enterprise companies still utilize Windows environments.

Windows at a Glance
22:20

You will learn how the current Windows File System works and some intimate details about it.

The Windows File System
11:42

Knowing where and how Windows logs it's events is a core skill to any Ethical Hacker.

Windows Logs
10:50

User Account Control or UAC is going to get in your way as an Ethical Hacker. You need to get a good grasp on this topic and how its implemented to understand how to beat it!

Windows Internals - UAC
08:38

Learning to abuse Windows? Permissions is where its at. This is by far the most commonly misconfigured element of Windows environments!

Windows Internals - Permissions
16:45

Alternate Data Streams or ADS is a great way to hide data but also can be used in some sneaky and creative ways.

Windows Internals - Alternate Data Streams
08:44

API Calls in Windows can be complicated at first but once you understand what they do and how things get much easier. When looking at Windows based Privilege Escalation exploits you tend to see API Calls used and it makes reading and understanding them far easier!

Windows Internals - API Calls
12:35

The SID for Windows is a unique number for users/groups. Being able to quickly identify a user based on it's SID allows you to see a lower level of Windows.

Windows Internals - The SID
06:11

Windows Tokens are one of my favorite concepts. You can abuse these in SO MANY ways. Token Impersonation is a key concept for any Ethical Hacker!

Windows Internals - Tokens
07:49

Windows Named Pipes are used by most applications in Windows. They have their own vulnerabilities and understand what they are and how they work can allow someone to be very "creative".

Windows Internals - Named Pipes
06:01

Here we take a look and how a PE and DLL file is structured and some of the components of each. This forms a base for knowledge to be gained in future modules.

Windows Internals - PE Files & DLLs
16:08

Learning the Windows Command Line is a required skill for any hacker. You won't find yourself with a GUI very often and knowing how to move around, manage the machine and do what you need to without it is a hard requirement!

Windows Command Line - Accessing the Command Line
04:56

Learn about navigation in the Windows Command Line world!

Windows Command Line - Navigation
07:04

Learn to work with files and directories in Windows Command Line.

Windows Command Line - Working with Files and Directories
07:31

As we learned about Named Pipes now we can use them in actions to see what we can do with them.

Windows Command Line - Working with Pipes
09:32

The Standard Input Output an Error are used throughout all Operating Systems. They are commonly used the same way in most OS's. This is a useful skill to make working on the Command Line far easier.

Windows Command Line - Standard I/O/E
03:56

You never know when you need to make a configuration setting, add a rouge service or learn more about the system. Know how to manage Windows without the GUI!

Windows Command Line - Managing Windows
12:07
+ The Linux Operating System
19 lectures 01:50:22

We take our first look at Linux and figure out where the GUI went!

Where is the GUI?!
03:50

Before we dive into Linux its important to understand how the file system in laid out and that EVERYTHING is a FILE!

The Linux File System
05:39

Since most of your time as an attacker is spent in a Terminal or Command Line its paramount to know how to navigate. This is fairly similar to Windows.

Linux Command Line - Navigation
04:27

Since everything is a file, that includes directories, we need to know how to work with them!

Linux Command Line - Working with Files and Directories
08:42

Very similar to Windows Standard I/O/E we will do a quick recap on the subject in Linux.

Linux Command Line - Standard I/O/E Recap
03:48

How that we understand how to work with files we need to learn how to work with data itself. We go over how to manipulate data to our will!

Linux Command Line - Working with Data
13:32

Same with Windows Permission we must learn the Linux side of the fence. There are a lot of vulnerabilities that rely on configuration issues with permissions. Understanding this will provide you a greater insight on how things work and how they can be abused.

Linux Command Line - Working with File Permissions
09:39

Man pages are the Linux Users quick look up replacement of Google Searching. These can provide very critical bits of information that are specific to a system without looking through countless white papers.

Linux Command Line - Man Pages
03:39

Being able to use and manipulate base64 is useful for not only encoding larger normally unreadable data but for getting binaries/data on and off machines!

Linux Command Line - Base64
02:56

Very similar to base64 use cases but has its uses elsewhere in other applications! Its important to understand how to quickly get and resolve hex/base64 data.

Linux Command Line - Hex
06:26

We quickly recap how to grab network connections in Linux as we did with Windows. Remember in Linux everything is a file!

Linux Command Line - Network Connections Recap
03:58

Learn about how Linux processes work and the types you will run into.

Linux Processes
13:00

INodes are an integral part of the Linux File System. They can be used in a lot of useful ways!

What are INodes?
04:30

Since everything is a file dealing with Open Files is just as important! You will learn how to manage Open Files on Linux.

Working with Open Files
06:38

Abusing Symbolic Links is very fun but you need to know how to use them first!

Symbolic Links
05:49

Linux uses ID's just like Windows uses SID's. You will need to understand these as well when attacking a Linux Machine.

The ID's
02:58

Similar to Windows Pipes Linux has their own! These are very useful for working with data.

Linux Pipes
03:19

We go over the Run Levels of Linux and what each of them mean. They each have their own attack vector.

Linux Run Levels
03:49

Logging is a big topic on Linux machines. A lot of organizations will build their own logs and sometimes provide juicy information!

Linux Logs
03:43
+ Operating System Internals
12 lectures 01:01:30

Here you will learn about the Linux Kernel and how it works.

The Kernel
11:10

Inside of the Kernel we have different ring levels. Each of these levels provide different privileges. With understanding this it helps work on exploit development and how attacks affect the Kernel.

One Ring to Rule Them All
05:40

We take a quick break from low level stuff to see how a CPU itself works.

What is a CPU?
02:40

When looking at the CPU there is a base component called Registers. These will be required in our Assembly section of the course so be sure to watch this!

The CPU Registers
09:16

Flags are similar to registers and are just as required for the Assembly course!

The CPU Flags
02:08

We take our first look at how memory works on computers. This can be a deep topic so rewatch if needed.

What is Memory & How does it work?
03:35

We take a stab at tackling the Stack! If you are wanting to learn Buffer Overflows or Exploit Development this is essential.

The Stack
05:46

While Similar to the Stack The Heap helps out a different part of the process!

The Heap
03:23

Here we provide some extra context on memory and the CPU!

Extra information on Memory
04:06

In this video we take our knowledge of memory and the CPU and dive into a debugger!

Debuggers
05:10

We look at Address Space Layout Randomization or ASLR and how it works in Windows.

Taking a look at ASLR
03:22

We quickly talk about AnitVIrus and some issues facing an Ethical Hacker.

A Quick Word About AntiVirus
05:14
+ Active Directory
9 lectures 01:04:05

Active Directory is a very common infrastructure at larger organizations. To best attack this type of infrastructure you should know how it works and be able to configure it yourself.

What is Active Directory
05:39

We hit the base configurations for a Windows Server for our needs.

Basic Windows Server Configuration
07:01

We look at actually installing Active Directory on our specified Windows Server and how to configure it.

Install AD DS
09:08

Understanding the Active Directory Tree is just as important as configuring Active Directory itself. An attacker will commonly find themselves investigating the Tree for issues.

The AD Tree
09:41

Along with the Tree itself there are leaves or OU's. Theses contain all of the data and objects. You will have a good grasp on how and why things are setup the way they are.

OU's and their Permissions
06:31

We take a look at managing users and groups. This includes delegation of permissions and setting up help desk users.

Managing Users and Groups
05:00

We take our first look at extending the AD Infrastructure with another machine. This is a key step in configuration of a home lab.

Adding Machine to the Domain
06:59

Group Policies is what makes AD so useful. This is commonly the place that is abused from an attacker perspective.

Setting up Group Policies
11:32

We see how cached credentials can be dangerous.

Cached Credentials
02:34
+ Kerberos
4 lectures 15:42

We take our first look at Kerberos and see how it works and where it fits into a Red Team's attack vectors.

What is Kerberos?
03:41

We talk about the first section of Kerberos and how Realms are handled by the service.

Kerberos Realms
01:41

The next step of Kerberos is the Authentication Server. Understanding this is required for Kerberos.

The Authentication Server
03:32

We take a final look at Kerberos with the TGS. This is what is commonly abused by Ethical Hackers in the real world.

The Ticket Granting Server
06:48
+ Data Manipulation
16 lectures 49:42

We take a look encryption and see how it works and how its used.

What is Encryption
03:24

We take a look Symmetric Encryption and see how it works and how its used.

Symmetric Encryption
03:39

We take a look Asymmetric Encryption and see how it works and how its used.

Asymmetric Encryption
05:02

We learn about RSA Encryption and where its use cases are.

RSA Encryption
02:07

We learn about AES Encryption and where its use cases are.

AES Encryption
01:42

We take a quick look at what Hashing is and how it is used.

What is Hashing?
03:06

We see how MD5 works and where its vulnerable as well as its uses cases.

MD5 Hashing
02:34

Learning SHA is important. This is a commonly used algorithm for a large amount fo protocols and services! 

SHA Hashing
04:28

Encoding is used everywhere! We take a look at what it is and how it works!

What is Encoding?
02:08

Base64 encoding is commonly used in Web Applications. It also has a few uses for Ethical Hackers as well!

Base64 Encoding
04:06

Like Base64 this has its used to Ethical Hackers as well. Hex encoding is normally used internally to applications.

Hex Encoding
04:24

While exclusively used with Web Browsers URL Encoding is critical to understand when attacking any type of web application.

URL Encoding
02:53

In this video we take a look at what compression is and where it is used.

What is Compression?
03:04

We look at 2 common type of compression and when they should be used.

Lossless vs Lossy Compression
03:08

Now that we understand the compression types we will look at the 2 common algorithms that are used today.

LZ77 & LZ78 Compression Algorithms
02:03

We start with a hands on exercises for different types of data manipulation

Data Manipulation - Hands On
01:54
+ Networking
17 lectures 01:25:40

We take a look at what Networking is and where it is used.

What is Networking?
08:16

The OSI Model is a core concept for troubleshooting and understanding networks.

The OSI Model
05:20

We take our first look at what TCP/IP is and how it is used in networks.

TCP/IP
09:56

Following up TCP/IP we look at the other half at UDP.

UDP
02:38

We learn what a switch is, where its used and how it works.

The Switch
04:07

We learn what a Router & Gateway is, where its used and how it works.

Routers & Gateways
06:08

Now that we have a solid understanding on Networking and TCP/IP & UDP. We now look into what a protocol really is.

What is a Protocol?
01:27

Take a deep look at ICMP.

ICMP
06:00

DNS is not only critical for Networks but very useful for exfiltration to attackers.

DNS
08:12

DCHP is another core protocol for enterprise networks. Its critical to understand how this works from an attacker perspective.

DHCP
06:03
ARP
04:33

IDS's are common in todays infrastructure. It's paramount to understand how theses works and where they are placed.

What is an IDS
03:30

IPS's are common in todays infrastructure. It's paramount to understand how theses works and where they are placed.

What is an IPS
04:45

High Availability or HA is one of the most important skills when looking at networks as this can make or break a conversation.

What is HA?
04:35

Proxies can make your life as an attacker easier or much more difficult.

Proxys
03:17

Demilitarized Zones or DMZ can catch Hackers in a tough spot and being able to spot this is critical.

The DMZ
02:36

We talk quickly about databases and where they are used.

Quick Talk on Databases
04:17