Learning Object 1️Learning Object 2️Learning Object 3️Learning Object 4️Learning Object 5️Learning Object 6️Learning Object 7️Learning Object 8️Learning Object 9️Learning Object 1️0️Learning Object 1️1️Learning Object 1️2️Learning Object 1️3️Learning Object 1️4️Learning Object 1️5️Learning Object 1️6️Learning Object 1️7️Learning Object 1️8️Learning Object 1️9️Learning Object 2️0️Learning Object 2️1️Learning Object 2️2️Learning Object 2️3️
Learning Object 1️
Learning Object 2️
Learning Object 3️
Learning Object 4️
Learning Object 5️
Learning Object 6️
Learning Object 7️
Learning Object 8️
Learning Object 9️
Learning Object 1️0️
Learning Object 1️1️
Learning Object 1️2️
Learning Object 1️3️
Learning Object 1️4️
Learning Object 1️5️
Learning Object 1️6️
Learning Object 1️7️
Learning Object 1️8️
Learning Object 1️9️
Learning Object 2️0️
Learning Object 2️1️
Learning Object 2️2️
Learning Object 2️3️
Schedule time to start it (I recommend watching the course once, then watching it again and doing the labs in parallel)
Consult the lab manual: LabManualV1.5.pdf or follow the guide at this link
The target AD environment regards a financial services called 'moneycorp', with:
fully patched Win Server 2022 machines with Windows Defender
Win Server 2016 Forest functional level
Multiple forest and m ultiple domains
The Lab Environment.png
The Lab Environment_Attack_Paths.png
ACL_Mindmap.png
Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!❗
Last updated 8 months ago