- Learning Path Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
- Security
Active Directory Exploitation
4 Courses
4 Labs
16 Hours
Skill IQ
The Active Directory Exploitation path covers attackers target, exploit, and abuse weaknesses in Active Directory (AD) environments to escalate privileges, gain unauthorized access, and move laterally within a network. This path explores techniques such as credential dumping, pass-the-hash, Kerberos ticket attacks (e.g., Golden and Silver Tickets), and leveraging misconfigurations for domain dominance.
Content in this path
Active Directory
Active Directory from recon to privilege escalation!
Active Directory Exploitation Labs
Hands-on exploitation labs!
Try this learning path for free
Access this learning path and other top-rated tech content with a free
trial.
Have questions? Get them answered now.
Not sure where to start?
With over 500 assessments to choose from, you can see where your skills
stand and receive adaptive learning recommendations to fill knowledge gaps in as little as 10 minutes.
Learn more