برچسب: Pentest

Most enterprise networks today are managed using Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure. Certified Red Team Expert (CRTE) course and lab is designed to provide a platform for security professionals to understand, analyze and practice threats and attacks against a modern Windows network infrastructure.

ادامه مطلب

The Certified Red Team Professional (CRTP) is a beginner-friendly, hands-on certification offered by Altered Security. It focuses on teaching security professionals how to assess and enhance the security of Enterprise Active Directory environments. The course covers topics such as Active Directory enumeration, trust mapping, domain privilege escalation, Kerberos-based attacks, SQL server trusts, and defense bypass techniques. Participants can choose between an on-demand course with flexible self-paced learning or an instructor-led bootcamp spanning four weeks. Both options provide access to a lab environment featuring updated Server 2022 machines, comprehensive video courses, lab manuals, and a certification exam attempt. The CRTP certification is valid for three years, with a free renewal process available to keep up with evolving technologies and skills.

ادامه مطلب

Identity plays a crucial role in security of an enterprise environment. Certainly, Identity is the new security perimeter. In an enterprise environment, Identity is usually managed by Active Directory or by Azure AD in case of a Hybrid Identity. An often-overlooked part of enterprise infrastructure is Active Directory Certificate Services (AD CS). AD CS is a Windows Server Role that implements Public Key Infrastructure and can be used for user authentication, machine authentication, document signing, email signing, file encryption and so much more. This makes AD CS a crucial part of Identity Management.

ادامه مطلب

This course is focused on learning by doing. We are going to teach you how penetration testing works, by actually practicing the techniques and methods used by bug bounty hunters today. We will start off by creating our virtual hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and having our computers set up for penetrations testing.

ادامه مطلب
Building on the foundation of Bug Bounty V1, this course dives deeper into advanced vulnerability exploitation. It focuses on specific threats such as SQL Injection, HTML Injection, Clickjacking, and Server-Side Request Forgery (SSRF). Participants will engage in hands-on simulations and become proficient with specialized tools for these vulnerabilities.
ادامه مطلب

Bug Bounty V1 course offers a comprehensive introduction to identifying and responsibly exploiting application vulnerabilities. It covers Web Application Architecture fundamentals and the critical OWASP Top 10. Participants will learn to distinguish Bug Bounty Hunting from Penetration Testing, engage in hands-on simulations, and master essential tools like Burp Suite.

ادامه مطلب