We may earn an affiliate commission when you visit our partners.
Guillaume Ross

Attacking Active Directory is a great way to achieve control of an environment, letting you access the data, and act on your objectives. BloodHound lets you visualize the shortest path to get to where you need to be.

Read more

Attacking Active Directory is a great way to achieve control of an environment, letting you access the data, and act on your objectives. BloodHound lets you visualize the shortest path to get to where you need to be.

Understanding the relationship between thousands of Active Directory objects can be difficult. Users are members of groups, which can be nested in other groups, and linked to thousands of permissions. In this course, Discovery with BloodHound, you will gain the ability to use BloodHound to quickly find the shortest path to compromise systems in an Active Directory environment. First, you will learn how to install BloodHound. Next, you will discover how to use SharpHound to gather data from AD. Finally, you will explore how to ingest and visualize that data, finding paths between objects and the ultimate goal, Domain Admin access. When you are finished with this course, you will have the skills and knowledge of BloodHound needed to start using it to attack AD, or to understand how to better defend it.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Discovering the Path to Domain Admin with BloodHound
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for beginners by starting with basic concepts of Active Directory and the purpose of BloodHound
Uses proven tools and technologies such as BloodHound and SharpHound that are widely used in the field of cybersecurity
Helps learners develop professional skills in Active Directory security and penetration testing
Teaches skills, knowledge, and tools that are highly relevant to industry
Taught by instructors who are recognized for their work in the field of cybersecurity

Save this course

Save Discovery with BloodHound to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Discovery with BloodHound with these activities:
Practice using the command line
Refresh your familiarity with command-line operations, preparing you to effectively execute BloodHound commands and navigate its interface.
Browse courses on Command Line
Show steps
  • Review basic command-line navigation and commands
  • Practice using common commands for file management, directory navigation, and command execution
  • Experiment with more advanced command-line techniques
Review key AD fundamentals
Refresh your knowledge of foundational Active Directory concepts, ensuring you possess a solid base for the upcoming course content.
Browse courses on Active Directory
Show steps
  • Review key AD concepts and terminology
  • Understand the hierarchical structure of AD
  • Familiarize yourself with common AD objects (users, groups, OUs)
Review Active Directory Security Fundamentals
Review the fundamentals of securing an Active Directory environment to deepen your understanding of AD.
Show steps
  • Read the Microsoft Security Research & Defense blog post on "Defending Active Directory: A Guide to Security Best Practices"
  • Watch the Pluralsight course on "Securing Active Directory in the Cloud"
Five other activities
Expand to see all activities and additional details
Show all eight activities
Explore BloodHound's interface
Familiarize yourself with BloodHound's graphical user interface, preparing you for effective navigation and data analysis.
Browse courses on Bloodhound
Show steps
  • Install and set up BloodHound on your local machine
  • Load data into BloodHound and explore the resulting graph
  • Navigate the BloodHound interface and understand its key features
Visualize and Describe AD relationships
Create a visual representation of an Active Directory environment to better understand the relationships between objects and how BloodHound can be used to attack it.
Browse courses on Active Directory
Show steps
  • Create a diagram of the AD environment
  • Use BloodHound to gather data on the environment
  • Map out the shortest path to Domain Admin
Visualize Active Directory Relationships
Practice using BloodHound to visualize the relationships between Active Directory objects.
Show steps
  • Install BloodHound
  • Collect data from Active Directory using SharpHound
  • Ingest and visualize the data in BloodHound
  • Identify the shortest path to Domain Admin access
Participate in a BloodHound study group
Join a study group to connect with peers, engage in discussions, and share insights, fostering a deeper understanding of BloodHound and its applications.
Show steps
  • Find or create a BloodHound study group
  • Attend regular study sessions and actively participate in discussions
  • Share knowledge, ask questions, and collaborate on BloodHound-related projects
Participate in a BloodHound CTF
Test your BloodHound skills and knowledge in a challenging environment, striving to solve puzzles and uncover hidden information.
Show steps
  • Find or register for a BloodHound CTF
  • Analyze the CTF environment and identify potential attack paths
  • Use BloodHound to gather data, identify vulnerabilities, and exploit them

Career center

Learners who complete Discovery with BloodHound will develop knowledge and skills that may be useful to these careers:
Penetration Tester
A Penetration Tester is responsible for simulating attacks on an organization's computer systems and networks to identify vulnerabilities. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Incident Responder
An Incident Responder is responsible for responding to security incidents and breaches. BloodHound may be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Security Researcher
A Security Researcher is responsible for developing new security tools and techniques to protect organizations from attack. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining an organization's computer systems and networks. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Security Analyst
A Security Analyst is responsible for monitoring and analyzing security data to identify and mitigate threats. BloodHound may be useful for a Security Analyst by helping them to visualize the shortest path to get to where they need to be in an Active Directory environment.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for protecting an organization's computer systems and networks from attack. BloodHound may be useful for this role by giving you the ability to quickly find the shortest path to compromise systems in an Active Directory environment.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and maintaining an organization's network security infrastructure. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Security Consultant
A Security Consultant is responsible for providing advice and guidance to organizations on how to improve their security posture. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Compliance Analyst
A Compliance Analyst is responsible for ensuring that an organization's computer systems and networks comply with applicable laws and regulations. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Vulnerability Manager
A Vulnerability Manager is responsible for identifying and mitigating vulnerabilities in an organization's computer systems and networks. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Forensic Analyst
A Forensic Analyst is responsible for investigating and analyzing computer systems and networks to identify evidence of criminal activity. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Risk Analyst
A Risk Analyst is responsible for assessing and managing the risks to an organization's security. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Auditor
An Auditor is responsible for reviewing and evaluating an organization's computer systems and networks to ensure that they are operating in accordance with established standards and procedures. BloodHound could be useful in this role by providing a way to quickly find the shortest path to compromise systems in an Active Directory environment.
Security Engineer
A Security Engineer is responsible for protecting an organization's computer systems and networks from attack. BloodHound could be useful for this role by giving you the ability to quickly find the shortest path to compromise systems in an Active Directory environment.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Discovery with BloodHound.
Provides a deep dive into the internal workings of Windows. It is essential reading for anyone who wants to understand how Windows works, and how to exploit it.
Provides a hands-on guide to penetration testing. It valuable resource for anyone who wants to learn how to test the security of their systems.
Provides a comprehensive overview of Kali Linux, a popular penetration testing distribution. It valuable resource for anyone who wants to learn how to use Kali Linux for security testing.
Provides a comprehensive overview of network security assessment. It valuable resource for anyone who wants to learn how to assess the security of their network.
Provides an overview of cybersecurity issues related to the smart grid. It valuable resource for anyone who wants to learn more about how to protect the smart grid from cyberattacks.
Provides a comprehensive overview of software security assessment. It valuable resource for anyone who wants to learn how to assess the security of their software.
Provides a comprehensive overview of insider threats. It valuable resource for anyone who wants to learn how to detect, deter, and defeat insider attacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Discovery with BloodHound.
Windows Server Administration Concepts: Active Directory
Most relevant
Install and Configure Active Directory Domain Services in...
Most relevant
Discovery with ADRecon
Most relevant
Administering Active Directory and Entra ID
Most relevant
Secure Access with Azure Active Directory
Most relevant
Managing Identities in Microsoft Azure Active Directory
Most relevant
Configuring Azure Active Directory for Microsoft Azure...
Most relevant
Specialized Hunts: Threat Hunting within Active Directory
Most relevant
Getting Started with Azure Active Directory for Developers
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser