Active Directory Security
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.30 GB | Duration: 9h 33m
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.30 GB | Duration: 9h 33m
Gain a deep understanding of Active Directory and its protection, uncover vulnerabilities, and explore related services
What you'll learn
Gain in-depth knowledge of Active Directory
Learn what attackers are after and how to protect against them
Stand in the hacker’s shoes to understand their tactics
Learn how to natively detect attackers
Identify vulnerabilities in Active Directory
Search for escalation paths using BloodHound
Build a Tiering Model and implement Security Baselines
Requirements
Basic knowledge of Windows OS and Active Directory is recommended (but not required)
Description
In this course, I will help you understand how Active Directory and related services work. Specifically, we will cover:Basics:Understand how Active Directory works and explore its components.Topics include hierarchy, trusts, FSMO roles, RODC (Read-Only Domain Controller), and service accounts.Authentication:Dive into the background of authentication protocols Kerberos and NTLM.Learn how to configure and enhance their security.Explore authentication policies.Group Policy Objects (GPO):Master the proper usage of GPOs and understand how they function.Active Directory Certificate Services (AD CS):Explore asymmetric cryptography within the Windows Infrastructure.Understand the architecture of AD CS and best practices for its administration.Vulnerabilities:Investigate common vulnerabilities and persistent attack methods in Active Directory.Learn how to search for vulnerabilities and perform security scans.Topics include AD certificate services ESC vulnerabilities, Kerberos delegation, Entrust ID Connect server, misconfigured ACLs, DCSync, hidden accounts, and more.Attack Paths:Utilize BloodHound to discover escalation paths within Active Directory.Observe how attackers proceed in the attack process.With these chapters, you will not only understand how Active Directory functions but also how it is targeted by hackers and how to secure your environment against such attacks. Additionally, I will provide you with a script for scanning your Active Directory for commonly abused vulnerabilities. At the end of the course, there will be a comprehensive practical test.
Cybersecurity Experts and Architects: Strengthen your expertise in safeguarding organizations,System Engineers: Learn how to protect critical infrastructure,Windows Administrators: Enhance your skills in securing Windows environments,Helpdesk Operators: Advance your career by transitioning into cybersecurity,Active Directory Specialists: Dive deep into AD security practices,IT Managers and Companies: Utilize our courses for onboarding programs and validating administrators’ skills