Red Team and Blue Team Fundamentals

Practice Labs
Virtual Lab

Learn the cybersecurity fundamentals of how to protect IT systems from cyberattacks. In each module of this series, you will examine a scenario from both the Red Team and Blue Team perspective. First, you learn how to perform an exploit, then you learn how to apply the preventative measures to prevent that exploit from happening.

Time
21 hours
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

This Virtual Lab is part of a Career Path: Become a Penetration Tester
Content
Module 1
Introduction to Red Team and Blue Team Fundamentals
Virtual Lab
1h
Protocols and Ports Used for Exploits
Virtual Lab
1h
IP Addressing Concepts
Virtual Lab
1h
Red Team - Introduction to Kali Linux
Virtual Lab
1h
Blue Team - Server Operating System Basics
Virtual Lab
1h
Red Team - Wireshark Essentials
Virtual Lab
1h
Blue Team - Network Monitoring Tools in Server Operating Systems
Virtual Lab
1h
Red Team - Nmap Network Scanning Techniques
Virtual Lab
1h
Blue Team - Server Firewall Configuration
Virtual Lab
1h
Red Team - Man in the Middle Exploits
Virtual Lab
1h
Blue Team - Malware protection and Antivirus protection
Virtual Lab
1h
Red Team - Introduction to Metasploit
Virtual Lab
1h
Blue Team - Patch Management and Software Updates
Virtual Lab
1h
Red Team - Credential Harvesting Tools
Virtual Lab
1h
Blue Team - Securing Servers with Policies
Virtual Lab
1h
Initiate a Denial of Service Attack on a Server
Virtual Lab
1h
Exploiting Telnet Vulnerabilities
Virtual Lab
1h
SMB Exploit with Responder
Virtual Lab
1h
Performing a Brute Force Password Attack
Virtual Lab
1h
Exploit Windows with Metasploit (Eternal Blue)
Virtual Lab
1h
Introduction to Cyber Ranges
Virtual Lab
1h

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this virtual lab in a guided Career Path.

Description

Learn the cybersecurity fundamentals of how to protect IT systems from cyberattacks. In each module of this series, you will examine a scenario from both the Red Team and Blue Team perspective. First, you learn how to perform an exploit, then you learn how to apply the preventative measures to prevent that exploit from happening.

Provider
Practice Labs
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Red Team and Blue Team Fundamentals Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.