• 6 hours
  • Medium

Free online content available in this course.

course.header.alt.is_certifying

Got it!

Last updated on 10/31/24

Get the Most Out of This Course

Welcome to the course!

Meet Your Teacher

My name is Romain Bentz. I’m acybersecurity engineer, and I’ve been interested in cybersecurity forover a decade. I specialize in attacks on Active Directory environments and how to defend against them. It’s a field that I still find interesting to this day!

➡️ LinkedIn

Meet the Experts We Interviewed

Charlie currently leads penetration testing activities for the Mediterranean region at Capgemini. An active member of the cybersecurity community, he created “The Hacker Recipes,” the pentesting system “Exegol,” and has contributed to several tools. His technical focus is primarily on Active Directory.

➡️ LinkedIn

Clément has been a cybersecurity engineer for around ten years. He started as a pentester and auditor, initially at a service firm, conducting diverse penetration tests for clients, then moved internally to a major French industrial group to work more closely with operations teams in cybersecurity.
He now works as an Active Directory Security Researcher at Tenable, where he helps develop tools to detect vulnerabilities and ongoing attacks in AD environments. Clément enjoys sharing his findings on Twitter and his blog.

➡️ LinkedIn

Lionel has been passionate about computers and hacking since a young age. Self-taught, he’s now an offensive security auditor with experience working for various companies. His primary areas of interest are Active Directory, Windows, adversary simulation, and IoT/Hardware penetration testing. He is also the creator of the tool "PetitPotam."

Vincent is a freelance cybersecurity wizard with over 12 years of experience helping clients with cybersecurity projects. He is the creator and former head of CERT-Wavestone, where he:

  • Led numerous cyber crisis responses for various organizations.

  • Enhanced prevention, detection, and response capabilities for cyber defense centers, including SOCs and internal CERTs/CSIRTs for large multinational organizations.

  • Advised many CISOs on cyber strategies, agile ISP models, risk analysis, training, cyber resilience, and more.

He also supports OpenClassrooms as a technical advisor for various cybersecurity courses!

➡️ LinkedIn

Learn About How the Course Works

Before we jump in, I’d like to talk about the structure of this course, and give you a few tips on how to get the most out of it.

  • The course is divided into three parts, each with several chapters.

  • Each chapter contains text that will help you understand the key concepts. The chapters might also include:

    • Videos to expand on these concepts.

    • Screencasts to demonstrate tools.

    • Exercises to apply what you’ve learned.

  • Finally, each section concludes with a quiz where you can test your knowledge and identify areas you need to work on.

Learn About the Case Study Used Throughout the Course

MedicEx Logo
MedicEx Logo

In this course, you’ll take on the role of an Active Directory IT security auditor. You have been hired by a company to test the security of its internal information system. Your client’s name is MedicEx. The company specializes in pharmaceutical products that boost cognitive ability. Your contact, Mehdi Cale, is the company’s IT manager.

The examples throughout this course will be based on this scenario.

Your Goal 

Your role is to:

  • List as many vulnerabilities as possible, along with demonstrations of how they can be exploited so that your client can replicate your attacks.

  • Provide recommendations on how your client can secure and monitor their information system. You will support them through this process.

Ready to get started? Let’s go!

Example of certificate of achievement
Example of certificate of achievement