Rudrasec - Active Directory Security Training

Master Active Directory Attacks.Build the Defenses That Stop Them.

Execute real Kerberos attacks — Golden Tickets, Kerberoasting, delegation abuse — then build the detection and hardening strategies to shut them down. 24 lessons, 14 hands-on labs, taught by GIAC Security Expert #97.

GSE #97 (~200 worldwide)CrowdStrike Director of IR20+ Years Incident ResponseBlackHat, RSA, SANS Speaker
4.78Overall
4.83Instructor
Averaged across hundreds of students over 10 years

Active Directory Is the #1 Target.Most Teams Aren't Ready.

Active Directory controls authentication and authorization for over 90% of Fortune 500 companies. It is the single most targeted infrastructure component in enterprise breaches — from ransomware operators to nation-state adversaries.

Yet most security teams treat AD as a black box. Pentesters run Kerberoasting without understanding the protocol. Defenders monitor Event IDs without knowing what the attack actually looks like. The gap between offense and defense is where breaches happen.

Generic security courses cover AD as one module among many. You get a surface-level overview, run a few CTF-style challenges, and leave without the depth to secure a production environment or investigate a real compromise.

Deep AD Security. Both Sides. One Course.

Built by someone who investigates AD compromises for a living — not someone who just teaches about them. Every attack is paired with its detection strategy. Every lab uses real enterprise tools.

Attack and Defend Every Technique

Each attack — from DCSync to Diamond Tickets — is paired with its specific Event IDs, detection logic, and prevention controls. Offense and defense are integrated, the way real engagements work.

14 Labs on Real Infrastructure

Domain Controller, workstation, database server, Elastic SIEM with Sysmon and WEF. You deploy the same architecture used in production environments, not sandboxed CTF challenges.

MITRE ATT&CK Mapped Throughout

9+ ATT&CK techniques covered with specific sub-technique IDs (T1558.001 through T1558.004, T1003.006, T1557.001, and more). Every lab maps to the framework your SOC already uses.

What You Will Be Able to Do

1

Execute and detect Kerberos attacks end-to-end

Kerberoasting, AS-REP Roasting, Golden/Silver/Diamond Ticket forgery, and delegation abuse, with the exact Event IDs and Elastic SIEM queries to catch each one.

2

Compromise a domain from initial access to full control

Walk the complete attack chain: credential theft, privilege escalation through DACL abuse, lateral movement via NTLM relay, and persistence through ticket forging.

3

Build production-grade AD monitoring

Configure Windows Event Forwarding, Sysmon, and Elastic SIEM to detect the techniques that matter, using the same architecture deployed in real enterprise environments.

4

Harden Active Directory against the attacks you just performed

Implement tiered admin models, Protected Users Group, LAPS, SMB signing, LDAP signing, and constrained delegation controls.

5

Map your findings to MITRE ATT&CK and communicate risk

Every technique is mapped to ATT&CK sub-techniques, giving you the language to write actionable reports and brief leadership.

Built for Both Sides of the Engagement

Whether you are breaching Active Directory or defending it, you get practical skills you can use on your next engagement.

Red Team

Forge Golden/Silver/Diamond Tickets

Achieve domain persistence through ticket forgery techniques.

Extract credentials via Kerberoasting, AS-REP Roasting, DCSync

Target service accounts, weak configurations, and replication protocols.

Abuse NTLM relay, DACL misconfigs, and delegation

Escalate privileges through protocol-level and configuration attacks.

Chain techniques for full domain compromise

Walk from initial foothold to complete domain control.

Blue Team

Detect ticket forgery, roasting, and DCSync

Through specific Event IDs: 4768, 4769, 4662, 5136, and more.

Build centralized logging with WEF, Sysmon, and Elastic SIEM

Deploy production-grade monitoring across your lab environment.

Harden AD with tiered admin, Protected Users, and LAPS

Implement the controls that prevent the attacks you just learned.

Hunt for malicious GPOs, delegation, and DACL backdoors

Identify persistence mechanisms and misconfigurations attackers exploit.

Your Lab. Real Infrastructure. Not a Sandbox.

You deploy a Domain Controller, workstation, database server, and an ELK stack with centralized logging via Windows Event Forwarding. Provision locally with VMware or in Azure. Automate everything with Ansible.

client1 (WEF client) ──┐
                       ├─> dc1 (WEF collector) ──> dc1 (Winlogbeat) ──> adsecvm (Elasticsearch/Kibana)
db-server (WEF client) ─┘

Enterprise-Grade Training. Accessible Pricing.

EARLY ACCESS
$599
One-time payment. No subscription.
1-year full access
24 lessons of recorded video content
14 hands-on labs with step-by-step wiki
Downloadable PDF slides for offline reference
Deploy on your own infrastructure — VMware or Azure
All course updates included during your access period
No per-seat cloud fees
Join the Waitlist

Frequently Asked Questions

Stop Guessing. Start Knowing.

24 lessons. 14 labs. Both sides of every AD attack. Built by a practitioner, not a full-time instructor.

Join the Waitlist