» » Windows Active Directory for IT Security Adepts

Windows Active Directory for IT Security Adepts

Tutorials   18-10-2020, 12:08   10   0   oaxino
Windows Active  Directory for IT Security Adepts


Windows Active Directory for IT Security Adepts
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 1.14 GB
Genre: eLearning Video | Duration: 9 lectures (3 hour, 29 mins) | Language: English
Gain a range of practical defense cybersecurity skills based on a technologically advanced cyber range training platform


What you'll learn

Learn how Active Directory works and what possibilities it offers, and how Kerberos works
Be aware what is the attacker's perspective and how attackers utilize Active Directory features to take advantage over IT security specialists
Discern opportunities of reconnaissance of the infrastructure that Active Directory creates to attackers and what you can do to improve security
Configure Active Directory policies related to user accounts to hinder attacks
Detect and limit password spraying
Identify a Kerberoast attack and what threats it carries
Learn what countermeasures you can take to prevent a Kerberoast attack
Understand how LAPS works and how it can help you with secure password management

Requirements

Neither special equipment is necessary to participate in the course, nor advanced knowledge
All you need is a basic knowledge of Windows systems and the basics of computer networks
Be ready to learn awesome Active Directory stuff!

Description

Active Directory is the most critical application for the majority of enterprises. It allows its administrators to manage easily and centrally the entire set of users, define their access to network resources and configure the computers they work on. Unfortunately, this powerful tool, being called the "keys to the kingdom", is a very attractive target of cyber-attacks. This is the reason why IT security specialists should take into account this directory service.

Gain hands-on knowledge that is applicable to real-world environments about threats, methods of detecting attacks and how to prevent them.

Learn how Active Directory works and what possibilities it offers, and how Kerberos works

Be aware what is the attacker's perspective and how attackers utilize Active Directory features to take advantage over IT security specialists

Discern opportunities of reconnaissance of the infrastructure that Active Directory creates to attackers and what you can do to improve security

Configure Active Directory policies related to user accounts to hinder attacks

Detect and limit password spraying

Identify a Kerberoast attack and what threats it carries

Learn what countermeasures you can take to prevent a Kerberoast attack

Understand how LAPS works and how it can help you with secure password management

Increasingly desirable cyber security skills at your fingertips

Despite the existence of many good sources of knowledge about Active Directory security, most of them take the perspective of offensive security representatives, mainly pentesters and red team members. We noticed the gap regarding materials created for blue teamers and decided to fill it with a course fully oriented towards people responsible for recognizing and counteracting cyber-attacks, and maintaining the availability and security of core services.

As defense security adept you play a significant role in maintaining company IT security undistorted. Being aware of it, we provide you comprehensive knowledge of the Active Directory from a security perspective, with particular emphasis on detecting and preventing attacks.

WHAT MAKES OUR COURSE UNIQUE?

What distinguishes our course is its extensive practical value, thanks to the use of CDeX Cyber Range as an illustration of the discussed content. It is an advanced cybernetic training platform allowing for practical training in the area of security of any scale and level of complexity, and containing infrastructure prepared especially for the Active Directory security training scenario.

So, our course won't be limited only to delivering information. For the vast majority of time, you can see practical actions involving the use of vulnerabilities, detecting attacks and counteracting them. You can immerse in realistic attack situation thanks to many practical examples, which strengthen your position in the fight against threats!

No matter whether you want to level up your career and get a well-paid job, to become more skillful in the IT defensive security field, or you are at the beginning of your professional way as cybersecurity specialist, or are just passionate about it. This course creates an opportunity for you to gain practical skills and fill in the knowledge gaps, and finally achieve the intended career goals.

In order to provide you an optimal way of learning, we used the following structure for most of our lessons:

discussing the theory behind the threat, showing what the problem is and what attackers can achieve with it

showing what the attack path looks like from the perspective of the attacker, using the training scenario launched on cybernetic training range

presenting practical ways of detecting a given attack also using our platform

discussing how to implement mechanisms that will make the execution of a given attack difficult or impossible

At the end of the course you will also receive a bonus lesson!

Remember

You have a 30-day money back guarantee from Udemy, so there's absolutely nothing to worry about. Do not hesitate.

It is time to stop thinking what if the attack happens. It is time to start preparing to face an attack!

Thank you for taking the time to review the course. It is the result of our joint work as a team of specialists, in which we put a lot of heart and experience. We hope until next time!

Who this course is for:

People who want to level up their career and get a well-paid job
IT Security practitioners
People interested in starting a career in cybersecurity
Passionates about cybersecurity
People who want to become more skillful in the IT field
Anyone looking for learning more about and broadening knowledge of Active Directory

Download link:



Links are Interchangeable - No Password - Single Extraction
Go Back
Your name: *
E-Mail:*
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
Security Code: *