1. Real-world simulation: non-admin user account to enterprise admin
2. Exploiting overlooked domain features (not just software vulnerabilities)
3. Proving that a single machine compromise can lead to full organisational compromise
4. 9 hands-on labs covering: AD enumeration and trusts mapping, LLMNR Poisoning, SMB Relay with interactive shell, IPv6 attacks, Pass the Hash/Password, Token Impersonation, Kerberoasting attack, Golden Ticket attack, Domain privilege escalation, persistence, ACL issues, and SQL server trusts, Defences and bypasses of defences