The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Created by Brandon Dennis, Last Updated 13-Aug-2020, Language:English
The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Learn what it really takes to be an Ethical Hacker for Silicon Valley Companies. The TRUE Blueprint to Ethical Hacking.
Created by Brandon Dennis, Last Updated 13-Aug-2020, Language:English
What Will I Get ?
- How a Red Team Works at a Silicon Valley Company
- Building out your own Red Team at a large organization
- High Level and Low Level Crash Course on Windows Operating System Internals
- High Level and Low Level Crash Course on Linux Operating System Internals
- How the Kernel, Memory and the CPU work
- Beginner to Intermediate Networking
- How compiled programs work
- Full Guide to Python Programming
- Full Guide to Assembly Programing and Manual Shellcode Generation
- How Penetration Tests Actually Work and their Methodologies
- How and What Kerberos is
- Building, Managing and Attacking an Enterprise Active Directory Infrastructure
- The ability to scope out a Ethical Hacking Assessment at Silicon Valley Scale
- Building out Finding Reports and designing them for the right audience
- Being able to speak to Executives and Leadership at large organizations
- Passive and Active Reconnaissance tools and Techniques
- Real World Up to Date Exploitation Techniques
- Post Exploitation Techniques
- Custom Fix of Public Exploit Code
- The ability to creatively deploy persistence and backdoor binaries
- Living of the Land and Moving Laterally across the network
- Password Cracking
- Full Guide on Job Hunting in Silicon Valley
Requirements
- Basic I.T Knowledge
- Any Machine with at least 4GB of Memory (RAM)
- No Prior Security or Ethical Hacking Skills Needed
Description
Welcome to the FIRST complete guide to Ethical Hacking! A lot of other Ethical Hacking or Security courses will just teach you how to hack or attack target systems. Learning just this aspect of Ethical Hacking WILL NOT GET YOU THE JOB IN THE REAL WORLD! The RedTeam Blueprint was designed and developed by Silicon Valley Hackers to actually land you the hacking job or penetration testing!
The reason the course was designed in this unique way is due to the real world Ethical Hacking Experience at Silicon Valley Company's by Brandon Dennis. With countless years of hiring Ethical Hackers, building out Security/Ethical Hacking Teams and developing new attack techniques Brandon is uniquely qualified to provide a full top to bottom course on what it REALLY takes to get into the field of Ethical Hacking.
After completing this course you will have not only a solid understanding of Ethical Hacking but also how Teams work at Enterprise Scale, working with Executives and smashing the Interview. This course has 8+ hours of hands on training as well as a realistically usable portfolio you can bring to job interviews.
Information Security is an ever growing field and with new jobs opening everyday but not enough professionals to fill them is creating a massive demand. With the RedTeam Blueprint you will be able to fill this gap! As a RedTeam Nation Student you will have the skills required to not only go into Ethical Hacking but into any field of Information Security available!
We teach not only the ethical hacking skills required but also the other 50%! Below are just some of the subjects you will learn.
- Building out a Red Team at Enterprise Silicon Valley Scale
- Skills to manage the Red Team as well as internal programs that can chance how the organization works
- Networking
- Windows Operating System
- Linux Operating System
- Operating System Internals (Memory, Stack, Heap, Kernels)
- Programming (Assembly & Python)
- Passive & Active Reconnaissance
- Attack and Create Active Directory Infrastructure
- Custom Exploitation
- Post Exploitation
- Breaking Jail Shells
- Abusing a Compromise to Lead to large scale attacks
- Password Cracking
- Build out a sophisticated in home lab
- Building a Personal Security Brand
- Building a Portfolio
- Job Hunting the Silicon Valley Way
- Smashing the Job Interview
These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course as well as access to our Private Student Only Facebook Group with access to the instructors.
Don't wait! Take your career to the next level with the RedTeam Blueprint.
Course Content
-
WELCOME! WHO IS THIS GUY?!
1 Lectures 00:01:15-
Course Introduction
00:01:15
-
-
THE 3 TEAMS
4 Lectures 00:23:40-
Module Overview - The 3 Teams
00:01:27 -
The Red Team
00:08:48 -
The Blue Team
00:05:45 -
The Purple Team
00:07:40
-
-
PENETRATION TESTING PROCESS
12 Lectures 01:22:30-
Module Overview - Penetration Testing Process
00:03:39 -
Penetration Testing Methodology
00:08:11 -
Metrics & Why They Are Important
00:12:05 -
Routine Assessments Part 1 - What Are Routine Assessments?
00:04:25 -
Routine Assessments Part 2 - Yearly Assessments
00:05:28 -
Routine Assessments Part 3 - Quarterly Assessments?
00:09:17 -
Routine Assessments Part 4- Monthly Assessments?
00:04:31 -
Routine Assessments Part 5 - Constant Assessments?
00:08:11 -
Routine Assessments Part 6 - Building an Assessment Plan
00:07:21 -
Building & Working with an Enterprise Budget
00:12:15 -
Specialties?!
00:03:58 -
The CIA Triangle
00:03:09
-
-
THE WINDOWS OPERATING SYSTEM
4 Lectures 00:55:33-
Installing & Using VirtualBox for Lab Virtualization
00:10:41 -
Windows at a Glance
00:22:20 -
The Windows File System
00:11:42 -
Windows Logs
00:10:50
-
-
WINDOWS INTERNALS
8 Lectures 01:22:51-
Windows Internals - UAC
00:08:38 -
Windows Internals - Permissions
00:16:45 -
Windows Internals - Alternate Data Streams
00:08:44 -
Windows Internals - API Calls
00:12:35 -
Windows Internals - The SID
00:06:11 -
Windows Internals - Tokens
00:07:49 -
Windows Internals - Named Pipes
00:06:01 -
Windows Internals - PE Files & DLLs
00:16:08
-
-
WINDOWS COMMAND LINE
5 Lectures 00:41:10-
Windows Command Line - Accessing the Command Line
00:04:56 -
Windows Command Line - Navigation
00:07:04 -
Windows Command Line - Working with Files and Directories
00:07:31 -
Windows Command Line - Standard I/O/E
00:09:32 -
Windows Command Line - Managing Windows
00:12:07
-
-
THE LINUX OPERATING SYSTEM
19 Lectures 01:43:11-
Where is the GUI?!
00:03:50 -
The Linux File System
00:05:39 -
Linux Command Line - Navigation
00:04:27 -
Linux Command Line - Working with Files and Directories
00:08:42 -
Linux Command Line - Standard I/O/E Recap
00:03:48 -
Linux Command Line - Working with Data
00:13:32 -
Linux Command Line - Working with File Permissions
00:09:39 -
Linux Command Line - Man Pages
00:03:39 -
Linux Command Line - Base64
00:02:56 -
Linux Command Line - Hex
00:06:26 -
Linux Command Line - Network Connections Recap
00:03:58 -
Linux Processes
00:05:49 -
What are INodes?
00:04:30 -
Working with Open Files
00:06:38 -
Symbolic Links
00:05:49 -
The ID's
00:02:58 -
Linux Pipes
00:03:19 -
Linux Run Levels
00:03:49 -
Linux Logs
00:03:43
-
-
OPERATING SYSTEM INTERNALS
12 Lectures 01:01:29-
The Kernel
00:11:10 -
One Ring to Rule Them All
00:05:40 -
What is a CPU?
00:02:40 -
The CPU Registers
00:09:16 -
The CPU Flags
00:02:08 -
What is Memory & How does it work?
00:03:35 -
The Stack
00:05:46 -
The Heap
00:03:23 -
Extra information on Memory
00:04:06 -
Debuggers
00:05:10 -
Taking a look at ASLR
00:03:22 -
A Quick Word About AntiVirus
00:05:13
-
-
ACTIVE DIRECTORY
9 Lectures 01:04:05-
What is Active Directory
00:05:39 -
Basic Windows Server Configuration
00:07:01 -
Install AD DS
00:09:08 -
The AD Tree
00:09:41 -
OU's and their Permissions
00:06:31 -
Managing Users and Groups
00:05:00 -
Adding Machine to the Domain
00:06:59 -
Setting up Group Policies
00:11:32 -
Cached Credentials
00:02:34
-
-
KERBEROS
4 Lectures 00:15:42-
What is Kerberos?
00:03:41 -
Kerberos Realms
00:01:41 -
The Authentication Server
00:03:32 -
The Ticket Granting Server
00:06:48
-
-
DATA MANIPULATION
15 Lectures 00:47:59-
What is Encryption?
00:03:24 -
Symmetric Encryption
00:03:39 -
Asymmetric Encryption
00:05:02 -
RSA Encryption
00:02:07 -
What is Hashing?
00:03:06 -
MD5 Hashing
00:02:34 -
SHA Hashing
00:04:28 -
What is Encoding?
00:02:08 -
Base64 Encoding
00:04:06 -
Hex Encoding
00:04:24 -
URL Encoding
00:02:52 -
What is Compression?
00:03:04 -
Lossless vs Lossy Compression
00:03:08 -
LZ77 & LZ78 Compression Algorithms
00:02:03 -
Data Manipulation - Hands On
00:01:54
-
-
NETWORKING
17 Lectures 01:25:39-
What is Networking?
00:08:16 -
The OSI Model
00:05:20 -
TCP/IP
00:09:56 -
UDP
00:02:38 -
The Switch
00:04:07 -
Routers & Gateways
00:06:08 -
What is a Protocol?
00:01:26 -
ICMP
00:06:00 -
DNS
00:08:12 -
DHCP
00:06:03 -
ARP
00:04:33 -
What is an IDS
00:03:30 -
What is an IPS
00:04:45 -
What is HA?
00:04:35 -
Proxys
00:03:17 -
The DMZ
00:02:36 -
Quick Talk on Databases
00:04:17
-
-
VPNS
3 Lectures 00:17:34-
What is a VPN?
00:02:35 -
What is IPSEC?
00:08:31 -
What is IKE?
00:06:28
-
-
FIREWALLS
4 Lectures 00:09:52-
What is a Firewall?
00:04:02 -
Packet Filtering Firewalls
00:01:17 -
Stateful Inspecting Firewalls
00:02:33 -
Web Application Firewalls
00:02:00
-
-
CONFIGURING PFSENSE FIREWALLS
6 Lectures 00:38:21-
Installing PFSense
00:08:06 -
The Firewall UI
00:09:30 -
Configuring a DMZ
00:07:17 -
Configuring a VPN
00:06:38 -
Backup & Logging
00:04:39 -
PFsense Hands On
00:02:11
-
-
PROGRAM THEORY
2 Lectures 00:08:21-
What is a Compiler?
00:03:50 -
What is a Linker?
00:04:31
-
-
PYTHON COURSE
20 Lectures 02:29:35-
Why Python?
00:03:45 -
Installing Python
00:03:37 -
Hello World
00:06:46 -
Variables
00:07:41 -
Type Casting
00:04:55 -
Operators
00:04:41 -
If/Else
00:13:28 -
Loops
00:08:38 -
The Dictionary
00:09:42 -
Lists
00:10:20 -
Tuples
00:04:12 -
Modules
00:06:06 -
Classes
00:11:37 -
Inheritance
00:14:30 -
Configuration Files
00:05:00 -
Logging
00:06:50 -
Error Handling
00:06:58 -
Sockets
00:11:14 -
Threading
00:07:03 -
Python Hands On
00:02:32
-
-
ASSEMBLY COURSE
12 Lectures 01:40:23-
Why Assembly?
00:01:50 -
Hello World
00:16:04 -
Variables
00:06:23 -
Saving States
00:10:23 -
Arithmetic
00:20:49 -
Loops
00:04:50 -
Logic Control
00:10:36 -
Reading Files
00:11:42 -
Writing Files
00:06:28 -
Op Code
00:06:16 -
Bit Operators
00:03:37 -
Assembly Hands On
00:01:25
-
-
SCOPE IDENTIFICATION
5 Lectures 00:20:34-
Goal & Scope Identification
00:05:58 -
Stability Considerations
00:07:10 -
Briefing Stake Holders
00:02:21 -
Prepping
00:02:58 -
Scope Identification Hands On
00:02:07
-
-
RECONNAISSANCE
18 Lectures 02:13:40-
What is Reconnaissance?
00:03:49 -
Installing Kali
00:06:33 -
Passive Recon - Google
00:09:35 -
Passive Recon - Shodan
00:05:20 -
Passive Recon - Whois
00:06:48 -
Passive Recon - Netcraft
00:07:18 -
Passive Recon - Job Posting
00:07:27 -
Active Recon - Port Scanning
00:21:46 -
Active Recon - DNS
00:08:27 -
Active Recon - Nikto
00:06:12 -
Active Recon - Dirb
00:04:41 -
Active Recon - Sparta
00:08:24 -
Active Recon - Working with NC
00:13:11 -
Active Recon - Banner Grabbing
00:07:23 -
Active Recon - Vulnerability Scanners
00:04:49 -
Active Recon - Browsing
00:06:20 -
Active Recon - Manual vs Automated
00:04:04 -
Reconnaissance Hands On
00:01:33
-
-
EXPLOITATION
18 Lectures 02:51:23-
Finding Exploits
00:10:45 -
Misconfigurations
00:03:47 -
Looking for 0 days
00:04:18 -
Metasploit - What is Metasploit?
00:08:18 -
Metasploit - Exploits and Payloads
00:15:29 -
Metasploit - The Meterpreter
00:13:51 -
Metasploit - Adding an Exploit to Metasploit
00:10:12 -
Metasploit - MSFVenom
00:07:59 -
Metasploit - Hands On
00:03:00 -
The OWASP Top 10
00:07:46 -
SQL Injection & SQLMap
00:30:15 -
XSS
00:13:25 -
Insecure Direct Object Reference
00:05:37 -
Local File Inclusion
00:11:29 -
Remote File Inclusion
00:08:31 -
The Authenticated Unauthenticated Pages
00:05:13 -
Broken Authentication and Session Management
00:07:47 -
Faulty Redirects
00:03:41
-
-
POST EXPLOITATION
28 Lectures 03:49:48-
Stabilizing Shells
00:14:04 -
Breaking Out Of The Jail Shell
00:08:42 -
What is Persistence?
00:02:40 -
Windows Persistence
00:10:18 -
Linux Persistence
00:10:47 -
What is Privilege Escalation?
00:04:23 -
OS Version
00:10:55 -
Common Configuration Issues
00:12:12 -
File Permissions
00:15:08 -
MySQL
00:14:32 -
Sudo
00:09:37 -
Relative Path Sudo Binary
00:08:19 -
Unquoted Service Path
00:14:31 -
Service Misconfigurations
00:07:46 -
LinuxPrivChecker
00:07:33 -
Im Root Now What?
00:02:53 -
Pulling Hashes
00:09:33 -
Pass The Hash
00:04:40 -
SSH Keys
00:05:05 -
Checking Logs
00:01:58 -
Duel Homed Machines
00:02:00 -
Network Traffic
00:07:19 -
ARP Poisoning
00:07:08 -
Web Servers
00:02:20 -
Account Directory Attacks
00:03:53 -
Password Spraying
00:05:51 -
SSH Tunneling
00:12:15 -
Pivoting
00:13:26
-
-
PASSWORD CRACKING
5 Lectures 00:22:54-
What is Password Cracking?
00:04:43 -
John The Ripper
00:05:04 -
Hashcat
00:06:33 -
Rainbow Tables
00:05:12 -
Password Cracking Hands On
00:01:22
-
-
COVERING YOUR TRACKS
8 Lectures 00:34:59-
Why Cover Your Tracks?
00:04:24 -
Clearing Windows Logs
00:03:34 -
Clearing Linux Logs
00:06:07 -
Quick Talk on Logging
00:05:01 -
Clearing Command History
00:08:51 -
Persistent Backdoors
00:03:27 -
The Clean Up
00:02:46 -
Covering Your Tracks Hands On
00:00:49
-
-
REPORTING
5 Lectures 00:29:12-
The Format
00:14:15 -
The Audience
00:04:08 -
Business Risks on Findings
00:05:40 -
Remediation Options
00:03:03 -
Working With The Blue Team
00:02:06
-
-
ATTACKING ACTIVE DIRECTORY (REALISTIC SCENARIO)
6 Lectures 00:30:42-
Reconnaissance
00:03:18 -
Exploitation
00:04:17 -
Post Exploitation
00:03:41 -
Finding New Access
00:06:48 -
Moving Up In The World!
00:04:33 -
Getting Domain Admin
00:08:05
-
-
JOB HUNTING
16 Lectures 02:25:38-
The Resume
00:07:59 -
Professional Email
00:04:51 -
Certifications
00:12:25 -
Personal Brand
00:11:13 -
Searching for the Job
00:11:40 -
Analyzing the Job Post
00:22:13 -
Applying for the Job
00:04:30 -
The Future Company
00:08:37 -
Salary Requirements
00:12:16 -
The Interview Process - The Screening Call
00:08:00 -
The Interview Process - Prepping for the Technical Interviews
00:09:11 -
The Interview Process - The Technical Screening Interview
00:10:46 -
The Interview Process - Prepping for the On Site Final Interview
00:04:31 -
The Interview Process - The Onsite
00:05:55 -
The Interview Process - The Offer
00:11:10 -
Congratulations!
00:00:21
-

Brandon Dennis
CEO of RedTeam Nation
My name is Brandon Dennis. I have over 8+ years in experience with Ethical Hacking and Red Teaming. I have worked at everything from Silicon Valley Companies to smaller 10 man organizations. I spoken publicly, published 0 day exploits and open source countless projects on everything from Custom Windows Token Impersonation Toolkits to In Memory Bypasses.
I am currently and Ethical Hacker for a Silicon Valley company and CEO of RedTeam Nation. I develop all of my courses based on realistic goals of getting student where they need to go in their career.
Just learning Ethical Hacking is not enough in todays world so I take my courses to the next level. I go over not only what is required for the job at Silicon Valley company scale in terms of Ethical Hacking but also what is really required for the job and to pass the Interview itself!
All of my courses are hands on, freshly designed and provide the latest information in the world of Information Security. All of my courses are video based with everything students need from Beginner level to Advanced.