EXAM
Module 1: various stages of an attack life cycle
Course Introduction
Command & Control
External Reconnaissance
Initial Compromise
Host Reconnaissance
Host Persistence
Host Privilege Escalation
Domain Reconnaissance
Lateral Movement
Credentials & User Impersonation
Password Cracking Hints & Tips
Module 2: Active Directory abuse scenarios + Proxies and Port forwards
Session Passing
Pivoting
Data Protection API (DPAPI)
Kerberos
Group Policy
Discretionary Access Control Lists