Red Team and Blue Team Fundamentals
Learn the cybersecurity fundamentals of how to protect IT systems from cyberattacks. In each module of this series, you will examine a scenario from both the Red Team and Blue Team perspective. First, you learn how to perform an exploit, then you learn how to apply the preventative measures to prevent that exploit from happening.
Time
21 hours
Difficulty
Beginner
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

This Virtual Lab is part of a Career Path: Become a Penetration Tester
Content
Module 1
Introduction to Red Team and Blue Team Fundamentals
Virtual Lab
1h
Protocols and Ports Used for Exploits
Virtual Lab
1h
IP Addressing Concepts
Virtual Lab
1h
Red Team - Introduction to Kali Linux
Virtual Lab
1h
Blue Team - Server Operating System Basics
Virtual Lab
1h
Red Team - Wireshark Essentials
Virtual Lab
1h
Blue Team - Network Monitoring Tools in Server Operating Systems
Virtual Lab
1h
Red Team - Nmap Network Scanning Techniques
Virtual Lab
1h
Blue Team - Server Firewall Configuration
Virtual Lab
1h
Red Team - Man in the Middle Exploits
Virtual Lab
1h
Blue Team - Malware protection and Antivirus protection
Virtual Lab
1h
Red Team - Introduction to Metasploit
Virtual Lab
1h
Blue Team - Patch Management and Software Updates
Virtual Lab
1h
Red Team - Credential Harvesting Tools
Virtual Lab
1h
Blue Team - Securing Servers with Policies
Virtual Lab
1h
Initiate a Denial of Service Attack on a Server
Virtual Lab
1h
Exploiting Telnet Vulnerabilities
Virtual Lab
1h
SMB Exploit with Responder
Virtual Lab
1h
Performing a Brute Force Password Attack
Virtual Lab
1h
Exploit Windows with Metasploit (Eternal Blue)
Virtual Lab
1h
Introduction to Cyber Ranges
Virtual Lab
1h
Description
Learn the cybersecurity fundamentals of how to protect IT systems from cyberattacks. In each module of this series, you will examine a scenario from both the Red Team and Blue Team perspective. First, you learn how to perform an exploit, then you learn how to apply the preventative measures to prevent that exploit from happening.