Red Teamer Hacking Course: Learn Ethical Hacking Volume 3

Level up your red team skills with Volume 3 of this expert-led ethical hacking series. Explore advanced exploitation, post-exploitation, password cracking, stealth, and full-scale Active Directory attacks—all based on real-world offensive security scenarios.

4.8
(1,500)
50,000 Students
11 Hours
Stage 4 - Advanced

Last update: Sep 2021

Audio Language: English

Subtitles/Captions: Yes

Caption Language: English

Focus: Ethical Hacking Courses, Penetration Testing Training Courses

Type of Training: Online, self-paced

Red Teamer Hacking Course Learn Ethical Hacking Volume 3

What You’ll Learn

This red team hacking methodology volume 3 course will teach you:

  • Password Cracking: Use tools like John the Ripper, Hashcat, and rainbow tables to crack credentials.
  • Stealth & Cleanup: Evade detection, clear logs, and cover your tracks post-attack on computer systems.
  • Persistence & Lateral Movement: Build durable footholds and pivot through networks to expand access.
  • Professional Reporting: Learn how to present findings to both technical security professionals and executive stakeholders.
  • Post-Exploitation Skill Development: Maintain access, escalate privileges, and navigate compromised machines like a pro.
  • Modern Exploitation Techniques: Identify vulnerabilities, misconfigurations, and OWASP Top 10 issues (such as cross-site scripting) in real systems.
  • Enterprise AD Attacks: Simulate red team operations in Active Directory environments, from recon to domain admin, using real-world scenarios.

Included in the Red Teamer Hacking Course

11 Hours of On-Demand Video

50+ Downloadable Resources

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Red Team Operator

Ethical Hacker

Penetration Tester

Cyber Security Analyst

SOC Analyst

Information Security Consultant

and all forms of Security Professionals

Course Content

Exploitation

icon-yt Finding Exploits Preview
icon-yt Misconfigurations Preview
icon-yt Looking for 0 Days Preview
icon-yt Metasploit - What is Metasploit? Preview
icon-yt Metasploit - Exploits and Payloads Preview
icon-yt Metasploit - The Meterpreter Preview
icon-yt Metasploit - Adding an Exploit to Metasploit Preview
icon-yt Metasploit - MSFVenom Preview
icon-yt Metasploit - Hands On Preview
icon-yt The OWASP Top 10 Preview
icon-yt SQL Injection & SQL Map Preview
icon-yt XSS Preview
icon-yt Insecure Direct Object Reference Preview
icon-yt Local File Inclusion Preview
icon-yt Remote File Inclusion Preview
icon-yt The Authenticated Unauthenticated Pages Preview
icon-yt Broken Authentication and Session Management Preview
icon-yt Faulty Redirects Preview

Post Exploitation

icon-yt Stabilizing Shells Preview
icon-yt Breaking Out Of The Jail Shell Preview
icon-yt What is Persistence? Preview
icon-yt Windows Persistence Preview
icon-yt Linux Persistence Preview
icon-yt What is Privilege Escalation? Preview
icon-yt OS Version Preview
icon-yt Common Configuration Issues Preview
icon-yt File Permissions Preview
icon-yt MySQL Preview
icon-yt Sudo Preview
icon-yt Relative Path Sudo Binary Preview
icon-yt Unquoted Service Path Preview
icon-yt Service Misconfigurations Preview
icon-yt LinuxPrivChecker Preview
icon-yt Im Root Now What? Preview
icon-yt Pulling Hashes Preview
icon-yt Pass The Hash Preview
icon-yt SSH Keys Preview
icon-yt Checking Logs Preview
icon-yt Duel Homed Machines Preview
icon-yt Network Traffic Preview
icon-yt ARP Poisoning Preview
icon-yt Web Servers Preview
icon-yt Account Directory Attacks Preview
icon-yt Password Spraying Preview
icon-yt SSH Tunneling Preview
icon-yt Pivoting Preview

Password Cracking

icon-yt What is Password Cracking? Preview
icon-yt John The Ripper Preview
icon-yt Hashcat Preview
icon-yt Rainbow Tables Preview
icon-yt Password Cracking Hands On Preview

Covering Your Tracks

Reporting

Attacking Active Directory (Realistic Scenario)

Audio Version of Training

OPEN FULL CURRICULUM

Requirements

Intermediate to advanced knowledge of cybersecurity and Linux/Windows

Familiarity with tools like Metasploit, Nmap, and common cyber attacks/post-exploitation techniques

Prior experience with Volumes 1 and 2 recommended for continuity

Basic Python or scripting knowledge is helpful but not required

Description of This Red Team Penetration Testing Course Vol 3

This course is Volume 3 in the Red Team Ethical Hacking series and focuses on advanced exploitation, post-exploitation, and enterprise-level cyber attacks and hacking methodology. You’ll learn how to break into systems, elevate privileges, establish persistence, crack passwords, and cover your tracks—all while simulating real-world red team operations.

Through a mix of practical labs and realistic enterprise scenarios, you’ll build skills in attacking Active Directory environments, using Metasploit, exploiting common misconfigurations, and navigating lateral movement. This volume is ideal for aspiring red teamers, OSCP candidates, and cybersecurity professionals aiming to sharpen their offensive security techniques.

  • Master tools like Metasploit and MSFVenom to launch and customize real-world attacks.
  • Identify and exploit misconfigurations across Linux and Windows environments.
  • Establish persistence, exfiltrate data, and use compromised systems to pivot deeper into networks.
  • Use John the Ripper, Hashcat, and rainbow tables to crack credentials.
  • Evade detection by manipulating logs, histories, and command trails.
  • Simulate full red team intrusions in realistic Active Directory environments.
  • Perform traffic sniffing, ARP poisoning, tunneling, and SSH pivoting techniques.

By the end of this course, you’ll be equipped to operate like a real red teamer—conducting stealthy attacks, navigating enterprise defenses, and simulating high-impact breaches from initial access to domain dominance using an established ethical hacking process.

Who is This Course For

This course is perfect for advanced learners pursuing red team careers, security professionals prepping for real-world offensive roles at their own pace, and anyone seeking to master the final stages of the hacking lifecycle—from exploitation to reporting.

Course Instructor

Brandon Dennis

Brandon Dennis has over a decade of experience in Ethical Hacking and Red Teaming, working with various organizations, from Silicon Valley companies to smaller firms. Known for his public speaking, 0-day exploits, and open-source contributions, Brandon is the CEO of RedTeam Nation and an ethical hacker at a Silicon Valley company.

Partnering with StationX, he delivers courses designed to prepare students for careers in cybersecurity, focusing on practical skills and realistic goals. His hands-on courses, updated with the latest cybersecurity information, cover essential knowledge for ethical hacking and interview preparation for top tech companies.

Brandon holds certifications such as Offensive Security Web Expert (OSWE), Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), MTA Networking, MTA Security, CompTIA Network+, and CompTIA Security+.

Read More

Read Less

Testimonials

Anonymous

Abdelkrim S.

Excellent hands on course !! With very useful commands and tricks.

Anonymous

Kenny K.

I have purchased many courses with regards to technology. This course goes way further than I thought. I've learned so much and I'm not even halfway through. Great job!

Anonymous

Matías M.

It is a good course for those who are starting out in the area, in fact now I am going to start recommending it, the theoretical material is very extensive, and the practical material too. Regarding the knowledge of the tutor, he shows that he knows what he is talking about and has experience. Without a doubt, it is a good introductory course in Hacking.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!