Tutorialspoint

Celebrating 11 Years of Learning Excellence! Use: TP11

Ethical Hacking Course: Red Team Operations Ransomware Deployment

person icon AJAY R, Pooja Somu

4.6

Ethical Hacking Course: Red Team Operations Ransomware Deployment

Start from 0 & learn both topics Red team and Blue team. The only course you can learn about how TA hack organization

updated on icon Updated on Jun, 2025

language icon Language - English

person icon AJAY R, Pooja Somu

category icon IT and Software ,Network and Security,Ethical Hacking

Lectures -92

Duration -14.5 hours

Lifetime Access

4.6

price-loader

Lifetime Access

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

Welcome to the "Red Team Operations: Initial Access to Ransomware Deployment." In this course, you will start as a beginner with no previous knowledge, and by the end of the course, you will be at the beginner to advanced level in Red Teaming activities. This course is full of practical sessions, and you will see all the attacks in real time.

We have started our course with the basic section on LOLBAS and how threat actors will use LOLBAS for their attacks. This course is highly practical. 

The course is divided into a number of sections; each section covers Red and Blue team skills. By the end of the course, you will have a strong foundation in red and blue teaming activities. How TA will compromise the environment, Real-time Attacks How Threat Actors Deploy Ransomware in Organizations.

The course is divided into 18 sections:

  • LOLBin for Red Teamers and Threat Hunters.
  • Working with Windows Processes.
    MITRE ATT&CK framework discussion.
  • Open source intelligence (OSINT) for Red and Blue Teamers.
  • Persistence techniques for Red and Blue Teamers.
  • Investigating defensive mechanisms and methods to evade antivirus and EDR.
  • Red + Blue Team Operation - Initial Access Phase.
  • Red + Blue Team Operation - Defense Evasion Phase.
  • Red + Blue Team Operation - Post Exploitation Phase.
  • Red + Blue Team Operation - Persistence phase.
  • Red + Blue Team Operation - Privilege Escalation.
  • Red + Blue Team Operation - Credential Access.
  • Red + Blue Team Operation - Lateral Movement.
  • Red + Blue Team Operation - Exfiltration.
  • Red + Blue Team Operation - Impact.
  • Blue Team Operations - Investigation.
  • History of Ransomware.

At the end of each section, you will learn how to detect, prevent, and secure systems and yourself from the discussed attacks. With this course you'll get 24/7 support, so if you have any questions, you can post them in the Q&A section, and we'll respond to you within 8 hours.

Goals

  • 90+ Red Team and Blue Team videos in practice.
  • Start from 0 up to an advanced level.
  • Learn how to abuse LOLBAS to defend evasion (Practical).
  • Learn about Windows processes (practical).
  • Learn about the MITRE ATT&CK framework and how to use OSINT for real-time attacks (practical).
  • Learn how to create persistence in Windows (Practical).
  • Learn how to use various attack tools.
  • Learn how to evade defense mechanisms (practical).
  • Learn the complete attack pattern from Initial Access to Impact (Practical).
  • Learn how to do a threat analysis (practical).
  • Learn about the history of ransomware.
  • Learn Red Teaming and Blue Teaming Activities.
  • Learn how threat actors will hack organization computers.

Prerequisites

  • Strong desire to learn and progress in cybersecurity.
  • No Linux, programming, or cybersecurity/hacking knowledge is required.
  • Optional: A PC, Mac, or Linux computer with up to 100 GB of free disk space to set up your FREE virtual lab.
  • No experience is needed. Learn from scratch.
Ethical Hacking Course: Red Team Operations Ransomware Deployment

Curriculum

Check out the detailed breakdown of what’s inside the course

Introduction(Red Team Operations)

2 Lectures
  • play icon Introduction to the course 13:45 13:45
  • play icon Disclaimer 01:26 01:26

LOLBin for Red Teamers and Threat Hunters

12 Lectures
Tutorialspoint

Working with Windows Processes

4 Lectures
Tutorialspoint

MITRE ATT&CK® framework discussion

1 Lectures
Tutorialspoint

Open source intelligence (OSINT) for Red and Blue Teamers

1 Lectures
Tutorialspoint

Persistence techniques for Red and Blue Teamers

5 Lectures
Tutorialspoint

Investigating defensive mechanisms and methods to evade antivirus and EDR

7 Lectures
Tutorialspoint

Red + Blue Team Operation - Initial Access Phase

8 Lectures
Tutorialspoint

Red + Blue Team Operation - Defence Evasion Phase

4 Lectures
Tutorialspoint

Red + Blue Team Operation - Post Exploitation Phase

4 Lectures
Tutorialspoint

Red + Blue Team Operation - Persistence phase

6 Lectures
Tutorialspoint

Red + Blue Team Operation - Privilege Escalation

9 Lectures
Tutorialspoint

Red + Blue Team Operation - Credential Access

7 Lectures
Tutorialspoint

Red + Blue Team Operation - Lateral Movement

4 Lectures
Tutorialspoint

Red + Blue Team Operation - Exfiltration

3 Lectures
Tutorialspoint

Red + Blue Team Operation - Impact

5 Lectures
Tutorialspoint

Blue Team Operations - Investigation

6 Lectures
Tutorialspoint

History of Ransomwares

3 Lectures
Tutorialspoint

Conclusion

1 Lectures
Tutorialspoint

Instructor Details

AJAY R

AJAY R

Currently working in the MDR Threat Analyst team, analyzing events. Threat hunts and trying to automate the problematic part using python

Prior experience includes VMware Carbon Black, Microsoft Defender ATP (EDRs), and Qradar.

Familiar with analyzing malware executables, maldocx, malicious PowerShell scripts, malicious Visual Basic scripts, malicious DLL's, curl and golang based malicious executables, and ransomware using peview, pstudio, procmon, dnspy, scdbg, oledump, wireshark, cutter, x64 and 32 dbg tools, and mobsf

Also doing some Python automation with the modules selenium, etc. I'm not a professional coder, but I'll keep pushing myself to learn and automate tedious and time-consuming tasks in a simple way.

Also, I spend time every day learning about new threats and other cybersecurity platforms such as Nessus, Qualys, Red Team tools such as Cobalt Strike, and so on. My weekend plans include performing some pen testing in the Real web Application. Reporting bugs and performing malware analysis

Furthermore, Doing some Windows forensics activities like investigating 'BAM, shellbags, userassist, Registry analysis, MFT, USN Journal, $J, Amcache, Shimcache, Memory Analysis etc. with different forensics tools

Researching and programming about EDR/AV evasion methods like API hooking, unhooking, event tracing API, module stomping, etc., to test how the EDRs are defending against APTs and how efficient EDR is in the security world.

Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515