Redfox Cybersecurity Academy at Black Hat USA 2026
Social Media Icons
Social Media Icons

Masters in Ethical Hacking  (RCPT)

Master Web, API, AI, Windows & Cloud Pentesting - From Zero to Advanced

Become a Job-Ready Penetration Tester in 6 Months!

A 6-month hands-on program covering Web, API, AI, Windows Active Directory & Cloud pentesting - built for real-world offensive security roles.

✔️ Hands-on labs
✔️ Real-world attack scenarios
✔️ Industry-aligned certifications
✔️ Internship certification
✔️ Career & interview support included
✔️ Beginner friendly
✔️ No prior experience required
✔️ Mentor support included

Start Date: Fully self-paced, start anytime
Content Length: 100+ hours
Lab Duration: 6 months

⏳ Price increases soon
🔥 Lab seats limited

View Curriculum

Program Overview

The Masters in Ethical Hacking is Redfox Cybersecurity Academy’s flagship 6-month program designed to take you from beginner to advanced penetration tester. Structured across six intensive pentesting courses, practical labs, and proctored certification exams, this program ensures you gain hands-on experience along with industry-ready knowledge.

Graduates will earn the Redfox Certified Penetration Tester (RCPT) certificate - proof of their ability to conduct real-world penetration testing and red teaming engagements. This program is more than a course; it is a complete career pathway into ethical hacking and cybersecurity.

You Won’t Learn This Elsewhere

1. Web & API exploitation
2. AI & LLM pentesting
3. Active Directory attack chains
4. AWS pentesting
5. Real pentest reporting standards

Distinctive Benefits

1. Earn a recognized credential at every stage - CJEH, CJWPT, CWAPT, CAIPT, CWRT and CAPT.
2. Receive the prestigious Redfox Certified Penetration Tester (RCPT) along with a 6-month Internship Certification.
3. Certifications are internationally valid, strengthening your profile across borders.
4. Acquire practical skills designed to make you workplace-ready from day one.
5. 80% of our learners have secured positions in leading companies, including global Big 4 firms.

After This Program, You Will Be Able To

1. Conduct real-world penetration tests independently
2. Exploit modern web, API, AI, and Windows AD environments
3. Perform expert level AWS pentesting
4. Write professional pentest reports that clients actually understand
5. Clear interviews for pentester / red team roles

What You Will Learn?

1. Gain a solid foundation in ethical hacking concepts and industry-standard penetration testing methodologies.
2. Learn to identify and exploit web application vulnerabilities, including SQLi, XSS, CSRF, SSRF, and auth bypasses.
3. Advance into complex web exploitation techniques using multi-step attack chains and privilege escalation methods.
4. Perform comprehensive API pentesting on REST and GraphQL APIs, including logic flaws and access control issues.
5. Understand modern AI pentesting techniques such as prompt injection and security risks in LLM-based systems.
6. Master Windows & Active Directory exploitation techniques, including Kerberos attacks, NTLM relay, and more.
7. Gain hands-on experience in AWS penetration testing and real-world attack scenarios in cloud-native environments.
8. Develop professional penetration testing reporting skills to clearly document vulnerabilities and security risks.
9. Receive career guidance, including resume building, interview preparation, and real-world pentesting workflows.


The Redfox Certified Penetration Tester (RCPT) is a benchmark certification that validates practical expertise in penetration testing across Web, API, AI, Cloud (AWS) and Red Teaming. Also, earn a recognized credential at every stage by successfully clearing each exam - CJEH, CJWPT, CWAPT, CAIPT, CWRT and CAPT. These certifications are designed to align with modern attack vectors and enterprise security requirements, ensuring that candidates possess up-to-date knowledge and skills. Recognized by employers, the RCPT, along with other certifications ensure that certified professionals are job-ready from day one.

Who This Is For / Not For

✅ This Program Is For:

1. Students & freshers entering cybersecurity
2. Developers moving into security
3. SOC analysts transitioning to pentesting
4. Anyone serious about offensive security

❌ This Program Is NOT For:

1. People looking for shortcuts
2. Script kiddies with no interest in learning fundamentals

Who Should Enroll?

1. Students and beginners curious about cybersecurity.
2. IT professionals seeking a career transition into ethical hacking.
3. Security enthusiasts who want structured, professional training.
4. Anyone eager to start a career in penetration testing without prerequisites.
5. No prior experience is required - only curiosity and the drive to learn.

At a Glance

1. Lab Duration: 6 months (Each course includes 1 month of dedicated lab access.)
2. Format: Live Sessions + Lifetime Recordings
3. Certifications: RCPT, CJEH, CJWPT, CWAPT, CAIPT, CWRT and CAPT
4. Lab Access: 6 months dedicated hands-on lab environment
5. Eligibility: No prerequisites - open to all with curiosity and interest in cybersecurity
6. Lab Access Model: Labs are fully flexible and can be started at any time by sending a request email to training@redfoxsec.com.

Program Instructors

Testimonials
Where Our Learners Are Placed

Course Curriculum

Introduction to Ethical Hacking Course

66 Learning Materials

Module 1: Introduction

Intro to Hacking 101

Video
00:01:15

About Me

Video
00:01:19

Introduction to Cyber Security

Video
00:06:13

Common Cyber Threats

Video
00:08:28

Offensive Security

Video
00:02:26

Defensive Security

Video
00:05:26

Careers in Cyber Security

Video
00:10:55

Module 2: Fundamental Concepts

CIA Triad

Video
00:06:21

Types of Hats

Video
00:04:23

Types of Assessment

Video
00:14:14

Encoding vs Encryption vs Hashing

Video
00:05:23

Authentication vs Authorization

Video
00:05:03

Module 3: Networking Concepts

Understanding Networking

Video
00:11:24

OSI Model

Video
00:14:04

TCP/IP Model

Video
00:01:21

NAT

Video
00:03:50

Common Protocols

Video
00:16:33

Subnetting

Video
00:06:43

Module 4: How the Internet talks: A Deep Dive

Demystifying DNS

Video
00:15:01

Understanding HTTP

Video
00:00:51

Anatomy of a Website

Video
00:03:00

Connecting the Dots

Video
00:02:02

Commanding the OS

Video
00:27:10

Module 5: Art of Getting Initial Access

Google Dorking

Video
00:16:44

External Assets

Video
00:15:26

Physical Access

Video
00:10:06

Phishing

Video
00:09:56

External Assests Enumeration (Practical)

Video
00:20:37

Module 6: Understanding Web Application Pentesting

Pentesting Phases

Video
00:03:35

Pentesting Methodology

Video
00:14:39

Anatomy of Web Application

Video
00:04:50

Understanding HTTP Protocol

Video
00:15:52

OWASP Top 10

Video
01:01:23

Introduction to Burp Suite

Video
00:22:22

Recon

Video
00:13:16

Module 7: Web Exploitation

Web Enumeration Overview

Video
00:10:58

Initial Access 1: Google Dorking

Video
00:05:25

Command Execution

Video
00:11:26

SQL Injection

Video
00:46:35

Initial Access 2: Brute Forcing

Video
00:28:29

Remote Code Execution

Video
00:11:22

Initial Access 3: Default Credentials

Video
00:01:24

Other Vulnerability Vectors that Exploit RCE

Video
00:04:37

Summary

Video
00:03:48

Module 8: Linux Privilege Escalation

Basic Concepts

Video
00:10:23

Linux Enumeration

Video
00:22:52

Linux Privilege Escalation (Theory)

Video
00:04:39

Linux privilege Escalation (Practical)

Video
00:17:34

Pivoting

Video
00:22:10

Common Ports

Video
00:02:26

Module 9: Tools

Nmap

Video
00:08:15

Nessus

Video
00:16:02

Metasploit

Video
00:21:39

Hydra - Bruteforcing Service

Video
00:04:13

Module 10: Windows Privilege Escalation

Enumeration - Lateral Movement

Video
00:29:48

Windows Enumeration

Video
00:14:08

Windows Privilege Escalation (Theory)

Video
00:05:47

Windows Privilege Escalation (Practical)

Video
00:18:52

CJEH Exam

Video
00:03:44

Next Steps

Video
00:04:51

Module 11: Course Resources

Additional Material

Commands List (SQL Injection)

RCE (Template - HTML Code)

RCE (Script - JavaScript Code)

Draft Report

PDF

Course PPT

PPT

Web Hacking Basics Course

60 Learning Materials

Module 1: Introduction to CJWPT

Introduction to CJWPT

Video
00:04:40

Module 2: Web Fundamentals

Intro to Web application

Video
00:03:14

HTTP/HTTPS Protocol

Video
00:31:47

Client Server Architecture

Video
00:03:23

Cookies

Video
00:12:13

Common Terminiologies

Video
00:05:24

Module 3: Comonents of Web Application

Overview

Video
00:04:37

Front End

Video
00:04:53

Gateway

Video
00:07:00

CDNs

Video
00:06:00

WAF

Video
00:07:33

Load Balancers

Video
00:04:39

Web Server

Video
00:05:24

Server Side Code

Video
00:08:38

Database

Video
00:03:18

API's and Third Party Integrations

Video
00:02:46

Module 4: Burp Suite

Introduction to Burp Suite

Video
00:09:43

Target

Video
00:09:25

Proxy

Video
00:05:16

Intruder

Video
00:05:50

Repeater

Video
00:03:03

Collaborator

Video
00:03:32

Sequencer

Video
00:01:34

Decoder

Video
00:01:43

Comparer

Video
00:01:55

Logger

Video
00:01:46

Extenstions

Video
00:05:31

Module 5: OWASP Top 10

Introduction to OWASP & OWASP Top 10

Video
00:02:23

Broken Access Control

Video
00:09:01

Cryptographic Failures

Video
00:04:07

Injection

Video
00:03:05

Insecure Design

Video
00:08:29

Security Misconfiguration

Video
00:03:00

Vulnerable and Outdated Components

Video
00:03:18

Identification and Authentication Failures

Video
00:03:01

Software and Data Integrity Failures

Video
00:02:51

Security Logging and Monitoring Failures

Video
00:03:23

Server Side Request Forgery (SSRF)

Video
00:05:54

Module 6: Broken Access Control

Broken Access Control

Video
00:37:37

Module 7: Broken Authentication

Broken Authentication

Video
00:51:58

Cookie Manipulation (Commands Templates)

Module 8: Cross Site Scripting (XSS)

Cross Site Scripting (XSS)

Video
00:33:45

Cross Site Scripting XSS - (Command Template)

Module 9: File Inclusion

File Inclusion

Video
00:18:29

Module 10: SQL Injection

SQL Injection

Video
00:51:08

SQL Injection (Blind SQLi Template)

Module 11: Server Side Request Forgery

Server Side Request Forgery

Video
00:18:48

Module 12: XML External Entity

XML External Entity

Video
00:09:43

Module 13: File Upload Vulnerability

File Upload Vulnerability

Video
00:49:34

Module 14: Low Severity Findings

Low Severity Findings

Video
00:08:26

Module 15: Pentesting Methodology

Pentest timeline

Video
00:05:18

Methodology

Video
00:13:17

Overview of ROE Document

Video
00:04:12

Recon & Vulnerability Assessment (Practical)

Video
00:22:34

Blind SQLi Exploitation

Video
01:07:05

XSS Exploitation

Video
00:36:15

Overview of Reporting

Video
00:10:15

Module 16: Course Resources

CJWPT PPT

PPT

Scripts

ZIP

Draft Report

DOC

Web Hacking Advanced Course

91 Learning Materials

Module 1: Introduction

Introduction

Video
00:03:13

Module 2: Web Application Pentesting Overview

Why Web applications?

Video
00:01:15

What is Web Application Security?

Video
00:01:01

Attacker Motives & Common Occurences

Video
00:02:38

OWASP Top 10

Video
00:04:57

Common Challenges faced as a Pentester

Video
00:01:56

Bug Bounty Hunting

Video
00:02:23

Module 3: Pentesting Methodology and Reconnaisance

Pentest Methodology & Information Gathering

Video
00:02:10

What are Subdomains?

Video
00:01:26

Subdomain Enumeration

Video
00:01:22

Understanding and Performing Passive Subdomain Enumeration

Video
00:04:52

Active Subdomain Enumeration

Video
00:01:07

Module 4: Bruteforcing

What is Brute-Forcing

Video
00:02:41

Real-time Scenarios

Video
00:02:13

Brute forcing Tools

Video
00:00:50

Bruteforcing Simplified with Examples

Video
00:09:44

Scope of a Pentest (Access Details)

Video
00:01:32

OTP Bruteforcing Explained

Video
00:05:36

Bruteforcing Practical

Video
00:12:51

Mitigation

Video
00:05:18

Module 5: Broken Access Control

What is Broken Access Control

Video
00:09:25

Real Time Scenarios

Video
00:02:27

Broken Access Control Simplified with examples

Video
00:06:17

Broken Access Control - Practical

Video
00:11:09

Mitigation

Video
00:02:49

Module 6: Insecure Direct Object Reference

What is IDOR

Video
00:11:04

Real-time Scenarios

Video
00:01:40

IDOR simplied with examples

Video
00:03:30

IDOR Practical

Video
00:13:51

Mitigation

Video
00:06:55

Module 7: Interview Questions

Interview Questions

Video
00:27:45

Module 8: Reporting

Reporting

Video
01:29:56

Module 9: Server Side Request Forgery

What is SSRF and types of SSRF

Video
00:10:50

Real Time Scenarios

Video
00:03:45

Open Redirection vs SSRF

Video
00:02:41

CSRF vs SSRF

Video
00:01:11

Practical Example

Video
00:09:09

Mitigation

Video
00:01:50

Module 10 Business Logic Flaws

What are business logic flaws

Video
00:04:43

Business Logic Simplified with examples

Video
00:04:40

Real Time Scenarios

Video
00:04:40

Practical

Video
00:21:40

Mitigation

Video
00:08:55

Module 11: HTTP Parameter Pollution

What is HTTP Parameter Pollution

Video
00:05:16

HTTP Simplified with Example

Video
00:05:49

Real Time Scenarios

Video
00:02:30

Practical

Video
00:06:37

Mitigation

Video
00:01:05

Module 12: Interview Questions

Interview Questions

Video
00:44:24

Module 13: Reporting

Reporting

Video
00:44:24

Module 14: SSTI

What is Serialization & Deserialization

Video
00:12:08

Practical

Video
00:08:40

Mitigation

Video
00:02:28

Module 15: XSS

What is XSS

Video
00:10:36

Types of XSS

Video
00:06:48

Why XSS occurs with use cases

Video
00:14:51

Real time scenarios

Video
00:02:03

Practical 1

Video
00:07:54

Data Encoding, Filtering & Web Application Firewalls (WAFs)

Video
00:08:20

Common WAF Bypasses

Video
00:03:16

Practical 2

Video
00:00:46

Practical 3

Video
00:03:58

Mitigation

Video
00:02:33

Module 16: Serialization & Deserialization

What is Serialization & Deserialization

Video
00:05:47

Practical

Video
00:07:52

Mitigation

Video
00:02:10

Module 17: CSRF

What is CSRF

Video
00:19:22

Working on CSRF

Video
00:08:05

What are Cookies and CSRF Tokens

Video
00:09:34

CSRF vs SSRF

Video
00:01:54

Real time Scenarios

Video
00:02:35

Practical

Video
00:17:10

Mitigation

Video
00:02:13

Module 18: Interview Questions

Interview Questions

Video
00:14:17

Module 19: Reporting

Reporting

Video
00:38:31

Module 20: SQL Injection

Understanding why SQL Injection occurs

Video
00:32:23

What is SQL Injection and how it works?

Video
00:04:46

Types of Sql injection

Video
00:05:54

Practicals with Explanations and Examples

Video
00:24:58

Mitigation

Video
00:15:20

Module 21: Directory Traversal & Low Level Findings

Directory Traversal Explained

Video
00:07:36

File Upload + Directory Traversal

Video
00:09:51

Directory Bruteforcing

Video
00:32:36

Practical

Video
00:03:46

Mitigation

Video
00:01:13

Module 22: Interview Questions

Interview Questions

Video
00:07:47

Module 23: Report

Report

Video
00:06:42

Module 24: Course Resources

SQL Payloads

Interview Questions

DOC

Course Slides

PPT

Template Report

DOC

AI Pentesting Course

Module 1: Introduction to AI Red Teaming

Module 2: LLM Architecture & Attack Surface

Module 3: LLM Word Generation

Module 4: Real life case studies

Module 5: Scope of AI Red Teaming & Testing methodology

Module 6: Introduction to Prompt Injection

Module 7: Direct Prompt Injection

Module 8: Indirect Prompt Injection

Module 9: Introduction to Jailbreak Bypass

Module 10: Risk in AI APIs

Module 11: RAG Systems

Module 12: OWASP AI top 10

Module 13: Introduction to Model Poisoning

Module 14: Data Poisoning Attack

Module 15: Model Context Protocol (MCP)

Module 16: Introduction to AI Agents

Module 17: Multi Agent Systems

Module 18: AI Safety Issues

Module 19: Detection & Mitigation of AI Issues

Windows Red Teaming Course

85 Learning Materials

Module 1: Introduction

Course Overview

Video
00:04:59

Introduction to Red Teaming

Video
00:12:57

Fundamentals of Active Directory

Video
00:33:35

Module 2: Active Directory Components

Domain and Domain Controller

Video
00:10:29

Organizational Units

Video
00:05:19

Group Policy Objects

Video
00:15:41

Security Groups

Video
00:13:55

Trees and Forests

Video
00:09:57

Authentication Mechanism in Active Directory

Video
00:02:43

Cyber Kill Chain

Video
00:02:00

Module 3: Lab Structure and Access

Lab Structure and Access

Video
00:14:47

Module 4: NTLM Relay Attacks

NTLM Relay Attacks Overview

Video
00:02:42

NTLM Authentication

Video
00:11:25

Name Resolution Process in Windows

Video
00:10:00

LLMNR/NBT-NS/MDNS Poisoning

Video
00:25:49

SMB Relay Attack

Video
00:42:40

Cross Protocol Relay

Video
00:05:58

LDAP Relay Attack

Video
00:29:10

IPv6 DNS Takeover Attack

Video
00:48:07

Module 5: Enumeration Tactics

Enumeration Tactics Overview

Video
00:01:43

Enumeration with Command Prompt

Video
00:09:24

Powershell Basics

Video
00:09:26

Enumeration with PowerView

Video
00:20:28

Share Enumeration

Video
00:06:11

BloodHound

Video
00:18:35

Module 6: Kerberos Authentication

Kerberos Authentication Overview

Video
00:01:15

Understanding Authentication Mechanisms

Video
00:23:59

Kerberos Pre-Requisites

Video
00:20:45

Kerberos Deep Dive

Video
00:37:59

Kerberos Practical

Video
00:09:42

Module 7: Kerberos Based Attacks

Kerberos Based Attacks Overview

Video
00:00:24

User Enumeration

Video
00:09:34

Password Guessing

Video
00:04:02

AS-Rep Roasting

Video
00:16:29

Kerberoasting

Video
00:14:52

Module 8: Kerberos Delegation

Kerberos Delegation Overview

Video
00:07:23

Unconstrained Delegation

Video
00:46:25

Constrained Delegation - Kerberos Only

Video
00:18:29

Constrained Delegation - Any Authentication Protocol

Video
00:34:41

Resource Based Constrained Delegation (RBCD)

Video
00:39:14

Module 9: Abusing ACLs

Abusing Generic All ACL

Video
00:08:58

ACL Fundamentals

Video
00:36:31

Abusing Generic Write ACL (RBCD) from Linux

Video
00:46:31

Abusing Generic Write ACL (RBCD) from Windows

Video
00:22:23

Module 10: Coercion Attacks

Coercion Overview

Video
00:04:02

PrinterBug

Video
00:20:12

Petitpotam

Video
00:06:06

WebDav Relay Attack

Video
00:16:38

WebDav Relay Attack Practical

Video
00:23:45

Module 11: Post Exploitation Analysis

Post Exploitation Analysis Overview

Video
00:03:36

Taking POC

Video
00:06:56

DCSynck Attack

Video
00:14:36

Credential Dumping and Password Analysis

Video
00:08:17

Module 12: Persistence Techniques

Persistence Overview

Video
00:03:15

Silver Ticket

Video
00:22:38

Golden Ticket

Video
00:20:46

Diamond Ticket

Video
00:14:31

Module 13: Active Directory Certificate Services (ADCS)

ADCS Overview

Video
00:20:11

Certificate Signing Request

Video
00:26:06

Enumeration

Video
00:12:30

ESC1 - Misconfigured Certificate Template

Video
00:21:46

ESC4 - Misconfigured Certificate Template Access Control

Video
00:30:12

ESC8 - Misconfigured Certificate Authority

Video
00:29:13

Module 14: Pass the Cert

Pass the Cert Overview

Video
00:12:27

Pass the Cert in Action

Video
00:38:15

Module 15: Shadow Credentials

Shadow Credentials Attack Overview

Video
00:21:12

Abusing msDs-KeyCredentialLink

Video
00:35:09

Un-Pac the Hash Attack

Video
00:19:27

WebDav Relay Attack (Shadow Credentials)

Video
00:31:25

Module 16: Abusing Domain Trusts

Overview

Video
00:09:59

Kerberos across Trust Boundaries

Video
00:11:30

Abusing Domain Trusts

Video
00:33:33

Module 17: Case Study & Statistics

Case Study & Statistics from 100 Engagements

Video
00:15:19

Module 18: Report Writing

Writing Exploitation

Video
00:29:10

Writing Information Gathering

Video
00:29:35

Writing Proof Of Concept

Video
00:06:56

Writing Domain Persistence

Video
00:09:13

Writing Post Exploitation

Video
00:08:26

Writing Executive Summary and ROE

Video
00:13:27

Finalizing the Report

Video
00:25:17

Writing Finding

Video
00:08:26

Module 19: CWRT Exam and What Next?

CWRT Exam

Video
00:02:24

What Next?

Video
00:03:41

Module 20: Course Resources

Windows Red Teaming PPT

PPT

Windows Red Teaming Report

DOC

AWS Pentesting Course

138 Learning Materials

Module 1: AWS & AWS Pentesting

Intro to AWS Pentesting Course

Video
00:00:41

Accessing Labs

Video
00:04:42

Overview of AWS

Video
00:04:42

Cyber Kill Chain (Cloud)

Video
00:03:22

What is AWS Pentesting

Video
00:04:58

Initial Access Scenarios

Video
00:06:09

Real World Case Studies

Video
00:12:02

Module 2: Learning AWS Basics - A Practical Approach

AWS Basics

Video
00:00:44

AWS Account

Video
00:04:53

AWS Architecture

Video
00:14:02

Practical - A look at an AWS Account

Video
00:11:04

Practical - Creating a User

Video
00:06:01

Practical - Giving Permssion to a User

Video
00:09:30

Practical - Creating your first EC2 Instance

Video
00:06:49

Practical - Creating your first S3 Bucket

Video
00:02:41

Practical - Setting up MFA

Video
00:02:12

Module 3: Deep Dive into IAM Service

Understanding IAM Service

Video
00:04:52

IAM Identities

Video
00:02:26

Taking a deep dive into Roles

Video
00:21:07

Practical - Role Usage (Service to Service)

Video
00:11:32

Practical - Role Usage (Account to Account)

Video
00:41:19

Role Usage (External ID to Service)

Video
00:00:37

IAM Access Keys

Video
00:00:37

Practical - Solving your first Lab

Video
00:18:49

Practical - Automating the Enumeration with aws-enumerator

Video
00:07:25

Understanding ARN

Video
00:03:10

Module 4: Understanding different types of IAM Policies

Types of Policies in IAM

Video
00:00:54

IAM Identity Permission Policy

Video
00:09:35

Practical - IAM Identity Permission Policy

Video
00:04:28

Few More Examples

Video
00:04:46

Types of IAM Identity Permission Policy

Video
00:04:47

Practical - IAM Identity Permission Policy

Video
00:04:28

Resource Based Policy

Video
00:03:08

Bucket Resource Policy

Video
00:06:45

Bucket Resource Policy - Examples

Video
00:04:19

Practical - Bucket Resource Policy

Video
00:05:25

Trust Policy

Video
00:08:15

Permission Boundary

Video
00:08:42

Practical - Permission Boundary

Video
00:15:22

Session Policies

Video
00:03:50

Practical - Session Policies

Video
00:13:22

Module 5: AWS Organizations and their policy types

AWS Organizations

Video
00:04:16

Practical - AWS Organizations

Video
00:02:11

Service Control Policies

Video
00:05:44

Practical - Service Control Policies

Video
00:12:14

Resource Control Policies

Video
00:04:42

Practical - Resource Control Policies

Video
00:12:14

Policy Evaluation Logic

Video
00:11:35

Module 6: Common IAM Misconfigurations

Misconfiguration 1 - Wildcard Everywhere

Video
00:01:54

Misconfiguration 2 - Inline Privileged Policy

Video
00:01:52

Misconfiguration 3 - Over-Permissive Trust Policy

Video
00:02:10

Misconfiguration 4 - Over-Permissive Resource Based Policy

Video
00:00:46

Maybe a Misconfiguration 5 - KMS Key Policy

Video
00:01:50

Misconfiguration 6 - NotAction or NotResource

Video
00:01:57

Module 7: IAM Initial Access

Practical - Account ID Manual Enumeration (Public Buckets)

Video
00:29:50

Practical - Account ID Automated Enumeration (Public Buckets)

Video
00:12:21

Practical - Account ID Enumeration (AMIs and Snapshots)

Video
00:04:44

Practical - Manual Enumeration of Users and Roles

Video
00:05:12

Practical - Automated Enumeration of Users and Roles (Pacu)

Video
00:20:40

Practical - Initial Access - Weak Credential in Use

Video
00:15:03

Module 8: IAM Enumeration

Enumeration Basics

Video
00:03:39

Practical - General Enumeration

Video
00:09:11

Practical - User Enumeration

Video
00:09:49

Practical - Group Enumeration

Video
00:02:21

Practical - Role Enumeration

Video
00:03:54

Practical - Policy Enumeration

Video
00:16:25

Service Enumeration

Video
00:04:40

Module 9: IAM Exploitation & Privilege Escalation & Persistence

Practical - Change Group Membership

Video
00:18:06

Practical - Creating a New Policy Version

Video
00:25:43

Setting the Default Policy Version

Video
00:01:55

Creating User Access Key

Video
00:02:29

Creating a New Login Profile

Video
00:01:59

Updating an Existing Login Profile

Video
00:01:41

Attaching a Policy (User, Group & Role)

Video
00:02:33

Creating/Updating an Inline Policy (User, Group & Role)

Video
00:02:57

Updating the AssumeRolePolicyDocument of a Role

Video
00:02:21

IAM Persistence

Video
00:03:44

Module 10: STS & KMS Service

STS Basics & Misconfiguration

Video
00:02:30

KMS Basics & Practical

Video
00:15:38

Enumerating & Finding Misconfigurations

Video
00:09:21

Module 11: SecretsManager Service & SSM Parameter Store

SecretsManager Basics and Enumerating Secrets

Video
00:24:08

SSM Parameter Store Basics and Enumerating Parameters

Video
00:09:13

Module 12: EC2 Service

EC2 Basics & Practical

Video
00:26:06

Initial Access & Enumeration

Video
00:22:49

Practical 1 - Exploitation & Priv Esc

Video
00:21:58

Practical 2 - Exploitation & Priv Esc

Video
00:19:58

Few More Exploitation & Priv Esc

Video
00:01:52

Module 13: S3 Service

S3 Basics & Practical

Video
00:07:31

Real World Case Studies

Video
00:03:20

Initial Access, Enumeration & Exploitation

Video
00:08:44

Practical - Initial Access, Enumeration & Exploitation

Video
00:17:24

Module 14: Lambda Service

Lambda Basics

Video
00:14:25

Practical - Creating your first lambda Function

Video
00:28:36

Practical - Creating your second lambda fucntion

Video
00:19:21

Practical - Lambda Enumeration

Video
00:18:43

Practical - Lambda Exploitation 1

Video
00:35:19

Practical - Lambda Exploitation 2

Video
00:21:37

Creating a Serverless Application

Video
00:27:51

Module 15: API Gateway

API Gateway Basics

Video
00:20:42

Practical - Creating a vulnerable API Gateway and Exploiting it

Video
00:40:52

Practical - Exploiting API keys

Video
00:23:52

API Gateway Authorizers

Video
00:02:53

Practical - Lambda Authorizer

Video
00:17:17

AWS IAM Authorizer

Video
00:14:23

Cognito User pool Authorizer

Video
00:02:32

Practical - API Gateway Enumeration

Video
00:07:54

Module 16: Cognito

Cognito

Video
00:01:41

Cognito User pools

Video
00:08:42

Practical - Creating your first User Pool

Video
00:18:41

Cognito Identity pool

Video
00:07:01

Practical - Creating your first Identity Pool

Video
00:10:26

Practical - Exploiting Unauthenticated (Guest) Identity pool

Video
00:18:50

Practical - Exploiting Self Registration Feature

Video
00:22:20

Practical - Exploiting Custom Attributes

Video
00:10:41

Practical - Cognito Enumeration

Video
00:06:43

Module 17: DynamoDB

DynamoDB Basics

Video
00:05:21

Creating your first DynamoDB Table

Video
00:05:21

Module 18: IAM Identity Center

IAM Identity Center Basics

Video
00:05:39

Practical - IAM Identity Center

Video
00:23:30

Practical - Enumerating IAM Identity Center

Video
00:34:34

Module 19: CloudTrail

CloudTrail Basics

Video
00:03:51

Practical - Creating your first Trail

Video
00:23:59

Practical - Analyzing the logs

Video
00:13:33

Bypassing CloudTrail Logging

Video
00:14:38

Module 20: GuardDuty

GuardDuty Basics

Video
00:05:41

Enumerating & Bypassing GuardDuty

Video
00:30:55

Module 21: AWS Pentest Tools

Boto3

Video
00:08:45

ScoutSuite

Video
00:23:51

Prowler

Video
00:20:20

PMapper

Video
00:15:30

Cloudsplaining

Video
00:07:39

Cloudfox

Video
00:12:11

Pacu

Video
00:33:33

Module 22: Report Writing & CAPT Exam

Report Writing

Video
00:39:44

CAPT Exam

Video
00:04:44

Module 23: Course Resources

AWS Pentesting Course PPT

PPT

Commands & Scripts

ZIP

Template Report

DOC
Frequently Asked Questions

No search results found

Masters in Ethical Hacking is Redfox Cybersecurity Academy’s flagship 6-month program designed to take you from beginner to advanced penetration tester.

Start Date: Fully self-paced, start anytime
Content Length: 100+ hours
Lab Duration: 6 months

View Curriculum



Get in Touch

Have a question, need assistance, or want to collaborate? We’re here to help!

Whether you're looking for cutting-edge cybersecurity solutions or expert training or want to learn more about our services, contact us today.


+91