Curriculum
9 Sections
116 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
3
1.1
How to book your live sessions
5 Minutes
1.2
Session Booking Panel
1.3
Student Panel
Overview
1
2.1
Course Overview
7 Minutes
Chapter 1: Comprehensive Pen Test Planning, Scoping, and Recon
19
3.1
Chapter Overview
3 Minutes
3.2
Defining Terms
27 Minutes
3.3
Types of Pen Tests
14 Minutes
3.4
Building an Infrastructure
15 Minutes
3.5
Linux for Pen Testers
16 Minutes
3.6
Lab 1.1: Linux for Pen Testers
39 Minutes
3.7
Overall Process
10 Minutes
3.8
Pre-Engagement
27 Minutes
3.9
Rules of Engagement
17 Minutes
3.10
Lab 1.2: Scope and RoE Role Play
20 Minutes
3.11
Reconnaissance Overview
28 Minutes
3.12
Organizational Recon
17 Minutes
3.13
Assignment: Lab 1.3: Organizational Reconnaissance
3 Days
3.14
Infrastructure Recon
32 Minutes
3.15
Lab 1.4: Infrastructure Reconnaissance
27 Minutes
3.16
User Recon
17 Minutes
3.17
Lab 1.5: User Reconnaissance
17 Minutes
3.18
Automated Recon with SpiderFoot
3 Minutes
3.19
Lab 1.6: Automated Recon with SpiderFoot
20 Minutes
Chapter 2: In-Depth Scanning and Initial Access
31
4.1
Chapter Overview
4 Minutes
4.2
Scanning Goals, Types, and Tips
11 Minutes
4.3
Port Scanning
10 Minutes
4.4
Nmap
10 Minutes
4.5
OS Fingerprinting and Version Scanning
6 Minutes
4.6
Nmap Scripting Engine (NSE)
6 Minutes
4.7
Lab 2.1: Nmap
35 Minutes
4.8
TryHackMe Bonus Lab: Nmap: The Basics
33 Minutes
4.9
TryHackMe Bonus Lab: Nmap Live Host Discovery
33 Minutes
4.10
TryHackMe Bonus Lab: Nmap Basic Port Scan
20 Minutes
4.11
TryHackMe Bonus Lab: Nmap Advanced Port Scans
31 Minutes
4.12
TryHackMe Bonus Lab: Nmap Post Port Scans
26 Minutes
4.13
Quiz: Nmap
60 Minutes
41 Questions
4.14
Masscan & EyeWitness
20 Minutes
4.15
Lab 2.2: Cloud Scanning
20 Minutes
4.16
Netcat for the Pen Tester
13 Minutes
4.17
Lab 2.3: Netcat’s Many Uses
26 Minutes
4.18
Vulnerability Scanning and Vulnerability Scanners
10 Minutes
4.19
TryHackMe Bonus Lab: Nessus
38 Minutes
4.20
TryHackMe Bonus Lab: OpenVAS
28 Minutes
4.21
Initial Access
11 Minutes
4.22
Password Guessing
32 Minutes
4.23
Lab 2.4: Password Guessing Attacks with Hydra
24 Minutes
4.24
Cloud Spotlight: Microsoft 365 Password Attacks
12 Minutes
4.25
Lab 2.5: Microsoft 365 Password Attacks
25 Minutes
4.26
Exploitation
9 Minutes
4.27
Exploit Categories
20 Minutes
4.28
Metasploit and Meterpreter
31 Minutes
4.29
Lab 2.6: Meterpreter
35 Minutes
4.30
Quiz: Scanning and Initial Access Rooms
2 Days
11 Questions
4.31
Assignment: Add your TryHackMe Profile Link
30 Minutes
Chapter 3: Assumed Breach, Post-Exploitation, and Passwords
29
5.1
Chapter Overview
4 Minutes
5.2
Assumed Breach
28 Minutes
5.3
Post-Exploitation
10 Minutes
5.4
Situational Awareness
5 Minutes
5.5
Linux Situational Awareness
7 Minutes
5.6
Windows Situational Awareness
13 Minutes
5.7
Seatbelt
4 Minutes
5.8
Lab 3.1: Seatbelt
12 Minutes
5.9
Privilege Escalation
10 Minutes
5.10
Linux Privilege Escalation
15 Minutes
5.11
Lab 3.2: Linux Privilege Escalation
36 Minutes
5.12
Assignment: Linux Privilege Escalation
3 Days
5.13
Windows Privilege Escalation
18 Minutes
5.14
Lab 3.3: Windows Privilege Escalation
10 Minutes
5.15
Assignment: Windows Privilege Escalation
3 Days
5.16
BloodHound
12 Minutes
5.17
Lab 3.4: BloodHound
19 Minutes
5.18
Quiz: BloodHound AD Enumeration
1 Day
3 Questions
5.19
Passwords and Credential Access
16 Minutes
5.20
Understanding Password Hashes
21 Minutes
5.21
Lab 3.5: MSF psexec, hashdumping, and Mimikatz
19 Minutes
5.22
Password Cracking
22 Minutes
5.23
Lab 3.6: John the Ripper
20 Minutes
5.24
Lab 3.7: Hashcat
23 Minutes
5.25
Quiz: Password Cracking
2 Hours
14 Questions
5.26
Sniffing and Cracking
9 Minutes
5.27
Responder
13 Minutes
5.28
Lab 3.8: Responder
20 Minutes
5.29
Quiz: Wonderland
3 Days
4 Questions
Chapter 4: Lateral Movement and Command and Control (C2)
17
6.1
Chapter Overview
4 Minutes
6.2
Pivoting and Lateral Movement
13 Minutes
6.3
LAB 4.1: Pivots
28 Minutes
6.4
Windows Lateral Movement
34 Minutes
6.5
LAB 4.2: Running Commands with SC and WMIC
30 Minutes
6.6
Impacket
8 Minutes
6.7
LAB 4.3: Impacket
19 Minutes
6.8
Pash-the-Hash
8 Minutes
6.9
LAB 4.4: Pass-the-Hash
22 Minutes
6.10
Command and Control (C2)
10 Minutes
6.11
Sliver
8 Minutes
6.12
LAB 4.5: Sliver
6 Minutes
6.13
PowerShell Empire
7 Minutes
6.14
LAB 4.6: Empire
25 Minutes
6.15
Evasion
34 Minutes
6.16
Application Control Bypass
12 Minutes
6.17
LAB 4.7: MSBuild
17 Minutes
Chapter 5: Domain Domination, Azure Annihilation, and Reporting
24
7.1
Chapter Overview
3 Minutes
7.2
Kerberos
18 Minutes
7.3
Kerberoast
10 Minutes
7.4
Lab 5.1: Kerberos
12 Minutes
7.5
Domain Dominance
22 Minutes
7.6
Lab 5.2: Domain Dominance
24 Minutes
7.7
More Kerberos Attacks
6 Minutes
7.8
Silver Ticket
5 Minutes
7.9
Lab 5.3: Silver Ticket
20 Minutes
7.10
Golden Ticket
6 Minutes
7.11
Lab 5.4: Golden Ticket
13 Minutes
7.12
Domain Privilege Escalation
6 Minutes
7.13
Quiz: Breaking Windows
3 Days
31 Questions
7.14
Azure Intro
10 Minutes
7.15
Azure AD
17 Minutes
7.16
Azure Recon
21 Minutes
7.17
OpenID
6 Minutes
7.18
Azure Infrastructure
7 Minutes
7.19
Running Commands on Azure
6 Minutes
7.20
ngrok
5 Minutes
7.21
Permissions on Azure
14 Minutes
7.22
Cloud Labs Walkthrough
14 Minutes
7.23
Reporting
35 Minutes
7.24
Pentest Report Sample
14 Minutes
Final Exam
1
8.1
Final Exam
1 Hour
50 Questions
Project: Dojuicer Penetration Test Assessment
3
9.1
Project Overview
5 Minutes
9.2
Project Rubric
20 Minutes
9.3
Project Details and Submission
14 Days
Enterprise Penetration Tester
Search
Defining Terms
• Module Material:
Â
– Chapter 1 – Module 1 – Defining Terms.pdf ->
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content