top of page

Related Courses

Redteam Blueprint A Unique Guide To Ethical Hacking Video Training Course & PDF

Redteam Blueprint A Unique Guide To Ethical Hacking Video Training Course & PDF Guides

 

Duration : 30.5 Hours

 

Size: 20.4 GB ( PART DOWNLOAD)

 

# Welcome Who Is This Guy

 

001 Introduction

 

1. The 3 Teams

 

002 Module Overview - The 3 Teams

002 The-3-Teams.pptx

003 The Red Team

003 The-Red-Team.pptx

004 The Blue Team

004 The-Blue-Team.pptx

005 The Purple Team

005 The-Purple-Team.pptx

 

2. Penetration Testing Process

006 Module Overview - Penetration Testing Process

006 Penetration-Testing-Process-Module-Overview.pptx

007 Penetration Testing Methodology

007 Penetration-Testing-Methodology.pptx

008 Metrics  Why They Are Important

008 Metrics.xlsx

009 Routine Assessments Part 1 - What Are Routine Assessments

009 What-Are-Routine-Assessments.pptx

010 Routine Assessments Part 2 - Yearly Assessments

010 Yearly-Assessments.pptx

011 Quarterly-Assessments.pptx

011 Routine Assessments Part 3 - Quarterly Assessments

012 Monthly-Assessments.pptx

012 Routine Assessments Part 4- Monthly Assessments

013 Constant-Assessments.pptx

013 Routine Assessments Part 5 - Constant Assessments

014 Assessment-Template.xlsx

014 Routine Assessments Part 6 - Building an Assessment Plan

015 Budget-Sample.xlsx

015 Budget-Template.xlsx

015 Building  Working with an Enterprise Budget

016 Specialties

016 Specialties.pptx

017 CIA-Triangle.pptx

017 The CIA Triangle

 

3. The Windows Operating System

 

018 Installing  Using VirtualBox for Lab Virtualization

019 Windows at a Glance

020 The Windows File System

020 The-Windows-File-System.pptx

021 Windows Logs

022 Windows Internals - UAC

022 Windows-UAC.pptx

023 Windows Internals - Permissions

024 Windows Internals - Alternate Data Streams

025 API-Calls.pptx

025 Windows Internals - API Calls

026 SID.pptx

026 Windows Internals - The SID

027 Tokens.pptx

027 Windows Internals - Tokens

028 Windows Internals - Named Pipes

028 Windows-Pipes.pptx

029 PE-Files-and-DLLs.pptx

029 Windows Internals - PE Files  DLLs

030 Windows Command Line - Accessing the Command Line

031 Windows Command Line - Navigation

032 Windows Command Line - Working with Files and Directories

033 Windows Command Line - Working with Pipes

034 Windows Command Line - Standard IOE

035 Windows Command Line - Managing Windows

external-assets-links.txt

 

4. The Linux Operating System

 

036 The-GUI.pptx

036 Where is the GUI

037 The Linux File System

037 The-Linux-File-System.pptx

038 Linux Command Line - Navigation

039 Linux Command Line - Working with Files and Directories

040 Linux Command Line - Standard IOE Recap

041 Linux Command Line - Working with Data

042 Linux Command Line - Working with File Permissions

042 Linux-File-Permissions.pptx

043 Linux Command Line - Man Pages

044 Linux Command Line - Base64

045 Linux Command Line - Hex

046 Linux Command Line - Network Connections Recap

047 Linux Processes

047 Processes.pptx

048 Inodes.pptx

048 What are INodes

049 Open-FIles.pptx

049 Working with Open Files

050 Symbolic Links

050 Symbolic-Links.pptx

051 The IDs

052 Linux Pipes

053 Linux Run Levels

053 Run-Levels.pptx

054 Linux Logs

external-assets-links.txt

 

 

5. Operating System Internals

 

055 The Kernel

055 The-Kernel.pptx

056 One Ring to Rule Them All

056 One-Ring-to-Rule-Them-All.pptx

057 What is a CPU

057 What-is-a-CPU.pptx

058 Registers.pptx

058 The CPU Registers

059 Flags.pptx

059 The CPU Flags

060 Memory.pptx

060 What is Memory  How does it work

061 The Stack

061 The-Stack.pptx

062 The Heap

062 The-Heap.pptx

063 Extra information on Memory

063 More-on-Memory.pptx

064 Debugger.pptx

064 Debuggers

065 ASLR.pptx

065 Taking a look at ASLR

066 A Quick Word About AntiVirus

066 AntiVirus.pptx

external-assets-links.txt

 

 

6. Active Directory

 

067 What is Active Directory

067 What-is-Active-Directory.pptx

068 Basic Windows Server Configuration

069 Install AD DS

070 The AD Tree

071 OUs and their Permissions

072 Managing Users and Groups

073 Adding Machine to the Domain

074 Setting up Group Policies

075 Cached Credentials

external-assets-links.txt

 

7. Kerberos

 

076 What is Kerberos

076 What-is-Kerberos.pptx

077 Kerberos Realms

077 Kerberos-Realm.pptx

078 The Authentication Server

078 The-Authentication-Sever.pptx

079 The Ticket Granting Server

079 The-Ticket-Granting-Server.pptx

 

8. Data Manipulation

 

080 What is Encryption

080 What-is-Encryption.pptx

081 Symmetric Encryption

081 Symmetric-Encryption.pptx

082 Asymmetric Encryption

082 Asymmetric-Encryption.pptx

083 RSA Encryption

083 RSA.pptx

084 AES Encryption

084 AES.pptx

085 What is Hashing

085 What-is-Hashing.pptx

086 MD5 Hashing

086 MD5.pptx

087 SHA Hashing

087 SHA.pptx

088 What is Encoding

088 What-is-Encoding.pptx

089 Base64 Encoding

089 Base64.pptx

090 Hex Encoding

090 Hex.pptx

091 URL Encoding

091 URL.pptx

092 What is Compression

092 What-is-Compression.pptx

093 Lossless vs Lossy Compression

093 Lossless-vs-Lossy.pptx

094 LZ77  LZ78 Compression Algorithms

094 LZ77-and-LZ78.pptx

095 Data Manipulation - Hands On

095 Data-Manipulation-Hands-On.pptx

external-assets-links.txt

 

9. Networking

 

096 What is Networking

096 What-is-Networking.pptx

097 OSI-Model.pptx

097 The OSI Model

098 TCPIP

098 TCPIP.pptx

099 UDP

099 UDP.pptx

100 The Switch

100 The-Switch.pptx

101 Routers  Gateways

101 Routers-and-Gateways.pptx

102 What is a Protocol

102 What-is-a-Protocol.pptx

103 ICMP

103 ICMP.pptx

104 DNS

104 DNS.pptx

105 DHCP

105 DHCP.pptx

106 ARP

106 ARP.pptx

107 What is an IDS

107 What-is-an-IDS.pptx

108 What is an IPS

108 What-is-an-IPS.pptx

109 What is HA

109 What-is-HA.pptx

110 Proxys

110 Proxys.pptx

111 DMZ.pptx

111 The DMZ

112 Quick Talk on Databases

112 Quick-Talk-on-Databases.pptx

external-assets-links.txt

 

10. VPN's

 

113 What is a VPN

113 What-is-a-VPN.pptx

114 What is IPSEC

114 What-is-a-IPSEC.pptx

115 What is IKE

115 What-is-a-IKE.pptx

 

11. Firewalls

 

116 What is a Firewall

116 What-is-a-Firewall.pptx

117 Packet Filtering Firewalls

117 Packet-Filtering-Firewalls.pptx

118 Stateful Inspecting Firewalls

118 Stateful-Inspection-Firewalls.pptx

119 Web Application Firewalls

119 Web-Application-Firewalls.pptx

 

12. Building a Firewall

 

 

 

 

Redteam Blueprint A Unique Guide To Ethical Hacking Video Training Course & PDF

SKU: EXT2021-0113
$8.00Price
  • You can Instant Download a PDF file After successful payment , 

    This PDF File Contains Course Download links.

    You can Download This Course immediately from click that Links.

bottom of page