06-18-2024, 06:20 PM
Published 6/2024
Created by Nadeem Muhammad Ali
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 8 Lectures ( 1h 13m ) | Size: 507 MB
Add the latest and greatest Active Directory defense techniques into your arsenal.
What you'll learn:
How to Enumeration & Password Spraying to Active Directory Users
Perform Passive Enumeration & Find the URL and Subdomains
Active Directory Password Filter Security for Blacklisting Bad Passwords
Secure Active Directory Environment & Preventing Ransomware Attacks
Secure Active Directory Tiering & Mitigating Pass-the-Hash Attack
Hijacking "Domain Administrator" Identity - Privileges Beats Permissions
Mastering "Ntds" File Extracting Windows Password Hashes
Requirements:
Basic understanding of networking, TCP/IP and IP addresses.
Virtual environment VirtualBox, Hyper-V, or VMware etc.
Plain expertise in computer networks, administration, and security is helpful.
Aspiring to learn about Entry Level Cyber Security.
Entry levels are welcome, we will take you step-by-step to expert-level.
Basic knowledge of Windows & Kali Linux
Description:
The world is changing and reactive security is dead, everyone needs to move to proactive security and make sure the operating systems are secured with the correct configurations.In this video lecture, I will practically demonstrate you:How to secure your active directory environmentUsername Enumeration & Password SprayingPassword Filter for Blacklisting Bad PasswordsPassive Enumeration & Find the URL and SubdomainsPreventing Ransomware AttacksHijacking "Domain Administrator" IdentityActive Directory best practices TieringPrevent all sorts of internal and external attacks.Least privileges Most IT departments use the same highest privilege account everywhere to manage internal and remote corporate servers including domain controllers, secure servers, and workstations.Pass-the-Hash (PtH), Pass-the-Ticket (PtT), and, different levels of kerboroasting attacks.Ntds.dit File: Extracting Windows Password HashesWe have to seriously change the way of IT operations to prevent most modern attacks for example Pass-the-Hash (PtH), Pass-the-Ticket (PtT), and, different levels of kerboroasting attacks.Even a ransomware attack cannot destroy your whole network, or you may say that this is one of the concrete solutions in many to prevent and spread ransomware attacks. In this video, I am going to demonstrate to you the effective and the only method that works nowadays to harden and prevent your network, none of those attacks work if you have the fundamentals correct, If you understand how operating systems & security systems work none of those should work.End of this video Training, you'll know the biggest threats to your security & how to increase protection.To secure your Active Directory infrastructure you have to seriously follow the directory tiering configuration in the Active Directory environment and should apply it right now.You Will Learn:1- Cyber Security 2024 | Active Directory Username Enumeration & Password Spraying using Kerbrute Tool2- Cyber Security 2024 | Passive Enumeration | Find the URL and Subdomains3- Active Directory Security - Password Filter for Blacklisting Bad Passwords4- Cyber Security 2024: Secure Active Directory Environment & Preventing Ransomware Attacks5- Cyber Security 2024: Secure Active Directory Tiering & Mitigating Pass-the-Hash Attack6- Cyber Security 2024 - Hijacking "Domain Administrator" Identity - Privileges Beats Permissions7- Mastering Ntds.dit File: Extracting Windows Password Hashes
Who this course is for:
Anybody interested in learning how to secure systems from hackers
Cybersecurity students also get benefits to gain practical experience
Systems Administrator to understand the quickly fixes the gaps.
Ethical hacking & Penetration Testing enthusiasts.
All IT professionals who are responsible for managing internal and external networks.
Systems and Network professionals are also encouraged to learn how hackers hack computers
Homepage