Training Content:

 
Day Session Topics Covered
Day 1 Session 1 Advanced Reconnaissance & OSINT: Passive & Active Information Gathering 
Session 2 Subdomain Enumeration & Asset Discovery 
Day 2 Session 1 Dark Web Intelligence & Threat Actor Profiling 
Session 2 Exploiting Web & Network Vulnerabilities: Advanced SQL Injection & XSS 
Day 3 Session 1 SSRF, XXE & Business Logic Flaws 
Session 2 Internal Network Exploitation via VPN & Proxy Bypassing 
Day 4 Session 1 Windows & Active Directory Exploitation: SMB Relay, Kerberoasting, NTLM Attacks 
Session 2 Active Directory Privilege Escalation 
Day 5 Session 1 Pass-the-Hash, Golden Ticket & Lateral Movement 
Session 2 Linux & Cloud Penetration Testing: Exploiting Misconfigured Cloud Services 
Day6 Session 1 Privilege Escalation in Linux & Docker Environments 
Session 2 Pivoting, Tunneling & Evading Detection 
Day 7 Session 1 Advanced Exploitation Techniques: Buffer Overflow & RCE 
Session 2 EDR Evasion & Malware Development 
Day 8 Session 1 Introduction to Red Team vs. Blue Team Concepts 
Session 2 Developing Custom Exploits  
Day 9 Session 1 Red Team Attacks: Exploiting Vulnerabilities & Evading Detection 
Session 2 Capture the Flag (CTF) Introduction & Preparation 
Day 10 Session 1 CTF Red Team vs Blue Team Attack & Defense Strategies 
Session 2 Final Lab Review & Lessons Learned