2020 launch! Learn how to escalate privileges on Windows machines with absolutely no filler.

What you’ll learn
Ethical hacking and penetration testing skills
Windows privilege escalation techniques
Common privilege escalation tools and methodology
Preparation for capture the flag style exams and events
Prior beginner hacking knowledge preferred
Prior virtualization knowledge preferred
A subscription to Hack the Box is required to complete the course.
A subscription to TryHackMe is strongly recommended to complete the course.
This course focuses on Windows Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in:

Gaining a better understanding of privilege escalation techniques
Improving Capture the Flag skillset
Preparing for certifications such as the OSCP, eCPPT, CEH, etc.
What will I learn?

1) How to enumerate Windows systems manually and with tools
2) A multitude of privilege escalation techniques, including:

Kernel Exploits
Password Hunting
Impersonation Attacks
Registry Attacks
Executable Files
Schedule Tasks
Startup Applications
DLL Hijacking
Service Permissions
Windows Subsystem for Linux
3) Tons of hands-on experience, including:
13 vulnerable machines total
Capstone challenge
Custom lab with no installation required

Due to the cost of Windows licensing, this course is designed around Hack The Box and TryHackMe platforms, which are additional charges, but offer an incredible variety of vulnerable machines at a fraction of the cost of one Windows license. I do not receive any financial incentive from either platform for utilizing them in the course.

Who this course is for:
Students interested in ethical hacking and cybersecurity
Students interested in improving privilege escalation skillset
Featured review
This is my second course with Heath and he has once again exceeded my expectations. He is a natural at teaching and very knowledgeable about the course materials. I would definitely recommend that all new pentesters take this course and master the skills and methods provided.

Course content
20 sections • 59 lectures • 6h 46m total length
Gaining a Foothold
Initial Enumeration
Exploring Automated Tools
Escalation Path: Kernel Exploits
Escalation Path: Passwords and Port Forwarding
Escalation Path: Windows Subsystem for Linux
Impersonation and Potato Attacks
Escalation Path: getsystem
Escalation Path: RunAs
Additional Labs
Escalation Path: Registry
Escalation Path: Executable Files
Escalation Path: Startup Applications
Escalation Path: DLL Hijacking
Escalation Path: Service Permissions (Paths)
Escalation Path: CVE-2019-1388
Capstone Challenge
BONUS Section
Created by: Heath Adams, TCM Security, Inc.
Last updated 5/2020
English [Auto]
Direct Download Available
(1,202 ratings)
9,990 students

Please wait you can get the course in 30 Seconds....

Add a Comment

Your email address will not be published. Required fields are marked *