Path icon Learning Paths
Skills

Active Directory Exploitation

  • Number of Courses1 courses
  • Duration0 hours

The Active Directory Exploitation path covers attackers target, exploit, and abuse weaknesses in Active Directory (AD) environments to escalate privileges, gain unauthorized access, and move laterally within a network. This path explores techniques such as credential dumping, pass-the-hash, Kerberos ticket attacks (e.g., Golden and Silver Tickets), and leveraging misconfigurations for domain dominance.

Courses in this path

Active Directory Labs

Join our learners and upskill
in leading technologies