Attacking and Defending Active Directory: Advanced Edition

Build expertise in attacking and defending real-world enterprise Active Directory environments.
Write your awesome label here.
Batch 3:  14 Mar 2021  Duration: 4 weeks
Recordings of live sessions included!

What's included?

  • Become a Certified Red Team Expert [CRTE]

Identify and analyze threats and practice attacks against a modern multi-forest Active Directory environment. Included is one attempt at the CRTE exam.
  • Bootcamp Completion Certificate

Get a course completion certificate after attending all 4 live sessions.
  • 4 live sessions

  • 3 hrs per session

  • 4 weeks access

  • 60 flags to be collected

  • 29 lab exercises

  • 1 CRTE attempt

  • Recordings of Live Sessions

What will you learn?

This advanced bootcamp is designed to help security professionals understand, analyze and practice threats and attacks in a modern, multi-forest Active Directory environment with fully patched Server 2019 machines.
In addition to learning the popular tactics, techniques and procedures (TTPs), you will also see how they change for attacks across forest trusts. You will also learn how to abuse or bypass modern Windows defenses like Advanced Threat Analytics, Local Administrator Password Solution (LAPS), Just Enough Administration (JEA), Resource-Based Constrained Delegation (RBCD), Windows Defender Application Control (WDAC), Application Whitelisting (AWL), Constrained Language Mode (CLM), virtualization and more.

Live Session Schedule

Weekly 3 hr sessions start at 12:00pm ET and end at 3:00pm ET.
14 Mar 2021
21 Mar 2021
28 Mar 2021
04 Apr 2021
Introduction to Active Directory, Enumeration and Local Privilege Escalation
Lateral Movement, Domain Privilege Escalation and Persistence
Domain Persistence, Dominance and Escalation to Enterprise Admins
Defenses, Monitoring and Bypassing Defenses


1. A good understanding of Active Directory security.
2. The ability to use command line tools.

Study Plan

Meet the instructor

Nikhil Mittal

Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes red teaming, active directory security, attack research, defense strategies and post exploitation research. He has 12+ years of experience in red teaming.

He specializes in assessing security risks at secure environments that require novel attack vectors and "out of the box" approach. He has worked extensively on Active Directory, Azure AD attacks, defense and bypassing detection mechanisms and Offensive PowerShell for red teaming. He is creator of multiple tools like Nishang, a post exploitation framework in PowerShell, Deploy-Deception a framework for deploying Active Directory deception and RACE toolkit for attacking Windows ACLs. In his spare time, Nikhil researches on new attack methodologies and updates his tools and frameworks.

Nikhil has held trainings and bootcamps for various corporate clients (in US, Europe and SE Asia), and at the world’s top information security conferences. He has spoken/trained at conferences like DEFCON, BlackHat, BruCON and more.

He blogs at
Nikhil Mittal - Principal Instructor

Can't attend this bootcamp? Get informed about future bootcamps!

Thank you!
Thank you!