Curriculum
- 10 Sections
- 10 Lessons
- 60 Hours
Expand all sectionsCollapse all sections
- Attack Methodology Introduction1
- Windows Endpoint Introduction1
- Windows Server Side Attacks1
- Windows Client-Side Attacks1
- Windows Privilege Escalation1
- Windows Persistence1
- Linux Endpoint Introduction1
- Linux Server Side Attacks1
- Network Detections1
- Antivirus Alerts and Evasion1
Uncover the techniques attackers employ to compromise Windows servers – the backbone of many networks. Learn methods for exploiting critical services and vulnerabilities to gain elevated access.
Prev
Learn the techniques attackers use to stay hidden on compromised Windows systems. Explore file system persistence, registry modification, scheduled tasks, and other methods to maintain a foothold.
Next

