Social Media Icons

Windows Red Teaming Course
Want to know how Real Red Teamers Break Active Directory?

If want to think, move, and operate like a real red teamer, this course is built for you.

✔️ Real attack paths
✔️ Real AD environments
✔️ Real red team Windows ops
✔️ AD & trust abuse
✔️ Lateral pivots
✔️ Privilege escalation
✔️ Credential harvesting
✔️ Post-exploit tradecraft
✔️ Professional reporting
⭐ 70% Labs + 30% Theory
❌ No theory padding

Duration: 24 hrs

🔴 Join the Windows Red Teaming Course
⏳ Price increases soon
🔥 Lab seats limited

View Syllabus

Course Overview

Welcome to the Windows Red Teaming Extreme Course. This advanced course is designed to provide deep, hands-on expertise in modern Windows red teaming, focusing on initial access, malware development, command and control operations, and kernel-based offensive security.

This course takes you beyond surface-level exploitation and into real-world adversary tradecraft, covering how modern attackers gain access, deploy malware, evade defenses, and operate stealthily within Windows environments. It is built for practitioners who want to understand how attacks work under the hood, not just how to run tools
The course covers topics such as:
  • Core Active Directory concepts and enumeration tactics
  • Poisoning and relay-based attacks (SMB Relay, LDAP Relay, WebDav Relay, MITM6)
  • In-depth explanation of Kerberos authentication and related attack techniques such as AS-REP Roasting, Kerberoasting, delegation abuse, and exploiting domain trust relationships
  • Post Compromise and Persistence Techniques (Silver Ticket, Golden Ticket, Diamond Ticket)
  • Attacking ADCS (ESC1, ESC4, ESC8, Shadow Credentials, Pass-the-Cert)
  • Report Writing and Real-world case studies on compromising Active Directory environments.

By combining theory with practical demonstrations in a lab setup, this course ensures you gain hands-on experience and build a solid red teaming skill set.

What You’ll Be Able To Do After This Course

  • Map Active Directory attack paths without relying blindly on BloodHound
  • Abuse Kerberos, NTLM, and AD CS with intent
  • Escalate from low-priv user → Domain Admin in realistic environments
  • Operate post-exploitation without getting instantly caught
  • Think like a red teamer, not a tool runner

Is This Course For You?

This IS for you if:
  • You know basic pentesting
  • You want enterprise-grade red team skills, not cert theory
  • You’re tired of “try harder” labs that don’t mirror reality
This is NOT for you if:
  • You want beginner Windows or IT fundamentals
  • You’re looking for a blue-team / SOC course
  • You prefer watching videos instead of attacking systems
  • You want shortcuts without understanding tradecraft

Prerequisites

  • Basic Windows & Linux Knowledge
  • Basic Pentesting & Security Concepts
  • Basic Command Line & PowerShell Skills

Why Learn From Redfox Cybersecurity Academy

  • Offensive security professionals who actually do this work
  • Techniques taught are used in real enterprise engagements
  • No recycled YouTube content
  • No CEH-style abstraction
  • 15+ years of red teaming experience
  • Real engagements inspired labs

Course Curriculum

Windows Red Teaming Course

85 Learning Materials

Module 1: Introduction

Course Overview

Video
00:04:59

Introduction to Red Teaming

Video
00:12:57

Fundamentals of Active Directory

Video
00:33:35

Module 2: Active Directory Components

Domain and Domain Controller

Video
00:10:29

Organizational Units

Video
00:05:19

Group Policy Objects

Video
00:15:41

Security Groups

Video
00:13:55

Trees and Forests

Video
00:09:57

Authentication Mechanism in Active Directory

Video
00:02:43

Cyber Kill Chain

Video
00:02:00

Module 3: Lab Structure and Access

Lab Structure and Access

Video
00:14:47

Module 4: NTLM Relay Attacks

NTLM Relay Attacks Overview

Video
00:02:42

NTLM Authentication

Video
00:11:25

Name Resolution Process in Windows

Video
00:10:00

LLMNR/NBT-NS/MDNS Poisoning

Video
00:25:49

SMB Relay Attack

Video
00:42:40

Cross Protocol Relay

Video
00:05:58

LDAP Relay Attack

Video
00:29:10

IPv6 DNS Takeover Attack

Video
00:48:07

Module 5: Enumeration Tactics

Enumeration Tactics Overview

Video
00:01:43

Enumeration with Command Prompt

Video
00:09:24

Powershell Basics

Video
00:09:26

Enumeration with PowerView

Video
00:20:28

Share Enumeration

Video
00:06:11

BloodHound

Video
00:18:35

Module 6: Kerberos Authentication

Kerberos Authentication Overview

Video
00:01:15

Understanding Authentication Mechanisms

Video
00:23:59

Kerberos Pre-Requisites

Video
00:20:45

Kerberos Deep Dive

Video
00:37:59

Kerberos Practical

Video
00:09:42

Module 7: Kerberos Based Attacks

Kerberos Based Attacks Overview

Video
00:00:24

User Enumeration

Video
00:09:34

Password Guessing

Video
00:04:02

AS-Rep Roasting

Video
00:16:29

Kerberoasting

Video
00:14:52

Module 8: Kerberos Delegation

Kerberos Delegation Overview

Video
00:07:23

Unconstrained Delegation

Video
00:46:25

Constrained Delegation - Kerberos Only

Video
00:18:29

Constrained Delegation - Any Authentication Protocol

Video
00:34:41

Resource Based Constrained Delegation (RBCD)

Video
00:39:14

Module 9: Abusing ACLs

Abusing Generic All ACL

Video
00:08:58

ACL Fundamentals

Video
00:36:31

Abusing Generic Write ACL (RBCD) from Linux

Video
00:46:31

Abusing Generic Write ACL (RBCD) from Windows

Video
00:22:23

Module 10: Coercion Attacks

Coercion Overview

Video
00:04:02

PrinterBug

Video
00:20:12

Petitpotam

Video
00:06:06

WebDav Relay Attack

Video
00:16:38

WebDav Relay Attack Practical

Video
00:23:45

Module 11: Post Exploitation Analysis

Post Exploitation Analysis Overview

Video
00:03:36

Taking POC

Video
00:06:56

DCSynck Attack

Video
00:14:36

Credential Dumping and Password Analysis

Video
00:08:17

Module 12: Persistence Techniques

Persistence Overview

Video
00:03:15

Silver Ticket

Video
00:22:38

Golden Ticket

Video
00:20:46

Diamond Ticket

Video
00:14:31

Module 13: Active Directory Certificate Services (ADCS)

ADCS Overview

Video
00:20:11

Certificate Signing Request

Video
00:26:06

Enumeration

Video
00:12:30

ESC1 - Misconfigured Certificate Template

Video
00:21:46

ESC4 - Misconfigured Certificate Template Access Control

Video
00:30:12

ESC8 - Misconfigured Certificate Authority

Video
00:29:13

Module 14: Pass the Cert

Pass the Cert Overview

Video
00:12:27

Pass the Cert in Action

Video
00:38:15

Module 15: Shadow Credentials

Shadow Credentials Attack Overview

Video
00:21:12

Abusing msDs-KeyCredentialLink

Video
00:35:09

Un-Pac the Hash Attack

Video
00:19:27

WebDav Relay Attack (Shadow Credentials)

Video
00:31:25

Module 16: Abusing Domain Trusts

Overview

Video
00:09:59

Kerberos across Trust Boundaries

Video
00:11:30

Abusing Domain Trusts

Video
00:33:33

Module 17: Case Study & Statistics

Case Study & Statistics from 100 Engagements

Video
00:15:19

Module 18: Report Writing

Writing Exploitation

Video
00:29:10

Writing Information Gathering

Video
00:29:35

Writing Proof Of Concept

Video
00:06:56

Writing Domain Persistence

Video
00:09:13

Writing Post Exploitation

Video
00:08:26

Writing Executive Summary and ROE

Video
00:13:27

Finalizing the Report

Video
00:25:17

Writing Finding

Video
00:08:26

Module 19: CWRT Exam and What Next?

CWRT Exam

Video
00:02:24

What Next?

Video
00:03:41

Module 20: Course Resources

Windows Red Teaming PPT

PPT

Windows Red Teaming Report

DOC

This course is designed to be uncomfortable... 

because real red teaming is.

You won’t watch attacks - you’ll execute them
You won’t follow scripts - you’ll chain attack paths
You won’t be given answers - you’ll earn access

Lab Structure

Course Instructor

Shashi Kant Prasad

Principal Security Consultant
Shashi Kant Prasad is a skilled red teamer at Redfox Security with expertise in Web, Cloud, Hardware, DevOps, and Red Teaming. He also trains peers at top security conferences.

Get Certified (CWRT)

Earn the Certified Windows Red Teamer (CWRT) certification to validate your expertise in Active Directory exploitation, red teaming tactics, and security bypass techniques. This certification proves your ability to conduct real-world attacks on Windows environments, making you a valuable asset in cybersecurity. Gain hands-on experience through labs and instructor-led training, preparing for roles like red team operator or penetration tester. Participants will receive a CWRT certificate upon completing the course and passing the CWRT practical exam.

Key Takeaways

  • Life time access to course and resources
  • 30 days of free lab access
  • Private Discord community access for direct support and networking.
  • One attempt at the Certified Windows Red Teamer Exam (CWRT)
  • Develop strategies for maintaining persistence in compromised environments
  • A professionally structured report template is provided for use in real-world engagements
Frequently Asked Questions

No search results found

Panel only seen by widget owner

Ready to Master the Art of Pentesting?

Choose our pentesting courses for:

Affordable Price

Unlock your potential with affordable upskilling! Our unbeatable course prices are your chance to level up without breaking the bank. 

Lifetime Access

Acquire lifetime access to our resources when you buy our courses. Gain knowledge today and unlock a lifetime of learning. 

Certificate of Completion

Upon completing our course, you'll receive a certificate of completion to showcase your new skills. Add it to your resume or LinkedIn profile.

Hands-On Experience

Get hands-on experience with real-world scenarios and challenges, giving you practical skills that you can apply immediately in your career. 

Expert Instructors

Learn from industry experts with years of experience in pentesting, who are passionate about sharing their knowledge and helping you succeed. 

Flexible Learning

Whether you're a beginner or an experienced professional, our courses are designed to meet you where you are and help you reach your goals. 

Get in Touch

Have a question, need assistance, or want to collaborate? We’re here to help!

Whether you're looking for cutting-edge cybersecurity solutions or expert training or want to learn more about our services, contact us today.

+91