![19f3b070162cb555a93701151e059add.jpg](https://i114.fastpic.ru/big/2020/1004/dd/19f3b070162cb555a93701151e059add.jpg)
Windows Active Directory for IT Security Adepts
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 9 lectures (3h 29m) | Size: 977.3 MB
Gain a range of practical defense cybersecurity skills based on a technologically advanced cyber range training platform What you'll learn:
Learn how Active Directory works and what possibilities it offers, and how Kerberos works
Be aware what is the attacker's perspective and how attackers utilize Active Directory features to take advantage over IT security specialists
Discern opportunities of reconnaissance of the infrastructure that Active Directory creates to attackers and what you can do to improve security
Configure Active Directory policies related to user accounts to hinder attacks
Detect and limit password spraying
Identify a Kerberoast attack and what threats it carries
Learn what countermeasures you can take to prevent a Kerberoast attack
Understand how LAPS works and how it can help you with secure password management
Requirements
Neither special equipment is necessary to participate in the course, nor advanced knowledge
All you need is a basic knowledge of Windows systems and the basics of computer networks
Be ready to learn awesome Active Directory stuff!
Description
Active Directory is the most critical application for the majority of enterprises. It allows its administrators to manage easily and centrally the entire set of users, define their access to network resources and configure the computers they work on. Unfortunately, this powerful tool, being called the "keys to the kingdom", is a very attractive target of cyber-attacks. This is the reason why IT security specialists should take into account this directory service.
Gain hands-on knowledge that is applicable to real-world environments about threats, methods of detecting attacks and how to prevent them.
Learn how Active Directory works and what possibilities it offers, and how Kerberos works
Be aware what is the attacker's perspective and how attackers utilize Active Directory features to take advantage over IT security specialists
Discern opportunities of reconnaissance of the infrastructure that Active Directory creates to attackers and what you can do to improve security
Configure Active Directory policies related to user accounts to hinder attacks
Detect and limit password spraying
Identify a Kerberoast attack and what threats it carries
Learn what countermeasures you can take to prevent a Kerberoast attack
Understand how LAPS works and how it can help you with secure password management
Increasingly desirable cyber security skills at your fingertips