Curriculum
9 Sections
116 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
3
1.1
How to book your live sessions
5 Minutes
1.2
Session Booking Panel
1.3
Student Panel
Overview
1
2.1
Course Overview
7 Minutes
Chapter 1: Comprehensive Pen Test Planning, Scoping, and Recon
19
3.1
Chapter Overview
3 Minutes
3.2
Defining Terms
27 Minutes
3.3
Types of Pen Tests
14 Minutes
3.4
Building an Infrastructure
15 Minutes
3.5
Linux for Pen Testers
16 Minutes
3.6
Lab 1.1: Linux for Pen Testers
39 Minutes
3.7
Overall Process
10 Minutes
3.8
Pre-Engagement
27 Minutes
3.9
Rules of Engagement
17 Minutes
3.10
Lab 1.2: Scope and RoE Role Play
20 Minutes
3.11
Reconnaissance Overview
28 Minutes
3.12
Organizational Recon
17 Minutes
3.13
Assignment: Lab 1.3: Organizational Reconnaissance
3 Days
3.14
Infrastructure Recon
32 Minutes
3.15
Lab 1.4: Infrastructure Reconnaissance
27 Minutes
3.16
User Recon
17 Minutes
3.17
Lab 1.5: User Reconnaissance
17 Minutes
3.18
Automated Recon with SpiderFoot
3 Minutes
3.19
Lab 1.6: Automated Recon with SpiderFoot
20 Minutes
Chapter 2: In-Depth Scanning and Initial Access
31
4.1
Chapter Overview
4 Minutes
4.2
Scanning Goals, Types, and Tips
11 Minutes
4.3
Port Scanning
10 Minutes
4.4
Nmap
10 Minutes
4.5
OS Fingerprinting and Version Scanning
6 Minutes
4.6
Nmap Scripting Engine (NSE)
6 Minutes
4.7
Lab 2.1: Nmap
35 Minutes
4.8
TryHackMe Bonus Lab: Nmap: The Basics
33 Minutes
4.9
TryHackMe Bonus Lab: Nmap Live Host Discovery
33 Minutes
4.10
TryHackMe Bonus Lab: Nmap Basic Port Scan
20 Minutes
4.11
TryHackMe Bonus Lab: Nmap Advanced Port Scans
31 Minutes
4.12
TryHackMe Bonus Lab: Nmap Post Port Scans
26 Minutes
4.13
Quiz: Nmap
60 Minutes
41 Questions
4.14
Masscan & EyeWitness
20 Minutes
4.15
Lab 2.2: Cloud Scanning
20 Minutes
4.16
Netcat for the Pen Tester
13 Minutes
4.17
Lab 2.3: Netcat’s Many Uses
26 Minutes
4.18
Vulnerability Scanning and Vulnerability Scanners
10 Minutes
4.19
TryHackMe Bonus Lab: Nessus
38 Minutes
4.20
TryHackMe Bonus Lab: OpenVAS
28 Minutes
4.21
Initial Access
11 Minutes
4.22
Password Guessing
32 Minutes
4.23
Lab 2.4: Password Guessing Attacks with Hydra
24 Minutes
4.24
Cloud Spotlight: Microsoft 365 Password Attacks
12 Minutes
4.25
Lab 2.5: Microsoft 365 Password Attacks
25 Minutes
4.26
Exploitation
9 Minutes
4.27
Exploit Categories
20 Minutes
4.28
Metasploit and Meterpreter
31 Minutes
4.29
Lab 2.6: Meterpreter
35 Minutes
4.30
Quiz: Scanning and Initial Access Rooms
2 Days
11 Questions
4.31
Assignment: Add your TryHackMe Profile Link
30 Minutes
Chapter 3: Assumed Breach, Post-Exploitation, and Passwords
29
5.1
Chapter Overview
4 Minutes
5.2
Assumed Breach
28 Minutes
5.3
Post-Exploitation
10 Minutes
5.4
Situational Awareness
5 Minutes
5.5
Linux Situational Awareness
7 Minutes
5.6
Windows Situational Awareness
13 Minutes
5.7
Seatbelt
4 Minutes
5.8
Lab 3.1: Seatbelt
12 Minutes
5.9
Privilege Escalation
10 Minutes
5.10
Linux Privilege Escalation
15 Minutes
5.11
Lab 3.2: Linux Privilege Escalation
36 Minutes
5.12
Assignment: Linux Privilege Escalation
3 Days
5.13
Windows Privilege Escalation
18 Minutes
5.14
Lab 3.3: Windows Privilege Escalation
10 Minutes
5.15
Assignment: Windows Privilege Escalation
3 Days
5.16
BloodHound
12 Minutes
5.17
Lab 3.4: BloodHound
19 Minutes
5.18
Quiz: BloodHound AD Enumeration
1 Day
3 Questions
5.19
Passwords and Credential Access
16 Minutes
5.20
Understanding Password Hashes
21 Minutes
5.21
Lab 3.5: MSF psexec, hashdumping, and Mimikatz
19 Minutes
5.22
Password Cracking
22 Minutes
5.23
Lab 3.6: John the Ripper
20 Minutes
5.24
Lab 3.7: Hashcat
23 Minutes
5.25
Quiz: Password Cracking
2 Hours
14 Questions
5.26
Sniffing and Cracking
9 Minutes
5.27
Responder
13 Minutes
5.28
Lab 3.8: Responder
20 Minutes
5.29
Quiz: Wonderland
3 Days
4 Questions
Chapter 4: Lateral Movement and Command and Control (C2)
17
6.1
Chapter Overview
4 Minutes
6.2
Pivoting and Lateral Movement
13 Minutes
6.3
LAB 4.1: Pivots
28 Minutes
6.4
Windows Lateral Movement
34 Minutes
6.5
LAB 4.2: Running Commands with SC and WMIC
30 Minutes
6.6
Impacket
8 Minutes
6.7
LAB 4.3: Impacket
19 Minutes
6.8
Pash-the-Hash
8 Minutes
6.9
LAB 4.4: Pass-the-Hash
22 Minutes
6.10
Command and Control (C2)
10 Minutes
6.11
Sliver
8 Minutes
6.12
LAB 4.5: Sliver
6 Minutes
6.13
PowerShell Empire
7 Minutes
6.14
LAB 4.6: Empire
25 Minutes
6.15
Evasion
34 Minutes
6.16
Application Control Bypass
12 Minutes
6.17
LAB 4.7: MSBuild
17 Minutes
Chapter 5: Domain Domination, Azure Annihilation, and Reporting
24
7.1
Chapter Overview
3 Minutes
7.2
Kerberos
18 Minutes
7.3
Kerberoast
10 Minutes
7.4
Lab 5.1: Kerberos
12 Minutes
7.5
Domain Dominance
22 Minutes
7.6
Lab 5.2: Domain Dominance
24 Minutes
7.7
More Kerberos Attacks
6 Minutes
7.8
Silver Ticket
5 Minutes
7.9
Lab 5.3: Silver Ticket
20 Minutes
7.10
Golden Ticket
6 Minutes
7.11
Lab 5.4: Golden Ticket
13 Minutes
7.12
Domain Privilege Escalation
6 Minutes
7.13
Quiz: Breaking Windows
3 Days
31 Questions
7.14
Azure Intro
10 Minutes
7.15
Azure AD
17 Minutes
7.16
Azure Recon
21 Minutes
7.17
OpenID
6 Minutes
7.18
Azure Infrastructure
7 Minutes
7.19
Running Commands on Azure
6 Minutes
7.20
ngrok
5 Minutes
7.21
Permissions on Azure
14 Minutes
7.22
Cloud Labs Walkthrough
14 Minutes
7.23
Reporting
35 Minutes
7.24
Pentest Report Sample
14 Minutes
Final Exam
1
8.1
Final Exam
1 Hour
50 Questions
Project: Dojuicer Penetration Test Assessment
3
9.1
Project Overview
5 Minutes
9.2
Project Rubric
20 Minutes
9.3
Project Details and Submission
14 Days
Enterprise Penetration Tester
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content