Windows Infrastructure Security
Master Windows & Active Directory Security—Before Attackers Exploit Your Weaknesses
Most IT professionals manage Windows environments daily—but hidden misconfigurations leave infrastructures vulnerable to attackers.
This comprehensive course gives you the skills to:
✔ Identify & fix misconfigurations before they lead to breaches.
✔ Learn real-world attack & defense techniques—not just theory.
✔ Secure Windows & AD environments using best practices, security baselines, and structured models like Tiering.
Whether you’re a Security Engineer looking to expand your expertise, a System Administrator securing critical infrastructure, or an IT Manager ensuring best practices, this course will give you the practical skills you need.

David Horák
249$
Windows Infrastructure Security - Kerberos
Master Kerberos Authentication & Prevent Credential-Based Attacks
Kerberos is the backbone of authentication in Active Directory—but misconfigurations can expose your environment to attacks like Kerberoasting.
In this focused mini-course, you’ll learn:
✔ How Kerberos authentication works inside Active Directory.
✔ How ticket encryption & delegation function and where security gaps exist.
✔ How attackers exploit weak configurations—and how to defend against them.
By the end, you’ll have a deep understanding of Kerberos security risks and how to harden authentication in AD.
If you find this valuable, explore the full Windows Infrastructure Security Course for more in-depth training.

David Horák
FREE
Windows Infrastructure Security - Stealing Credentials
Understand How Attackers Steal Windows Credentials—And How to Stop Them
Credential theft is one of the most common attack vectors in Windows environments. Without proper defenses, attackers can extract, abuse, and escalate privileges using stolen credentials.
In this focused mini-course, you’ll learn:
✔ How credentials & secrets are stored in Windows OS (LSASS, SAM, etc.).
✔ How protections like Credential Guard work.
✔ Real-world credential attacks (WDigest, delegation, token theft) and how to defend against them.
By the end, you’ll know how credential attacks work and how to stop them before they compromise your systems.
Want to go deeper? This is just one part of the full Windows Infrastructure Security Course.

David Horák
FREE
Windows Infrastructure Security - Tiering Model
Implement the Tiering Model & Strengthen Your AD Security
Active Directory environments often lack structured access control, making them an easy target for privilege escalation attacks. The Tiering Model helps you segregate privileges to protect critical assets.
In this focused mini-course, you’ll learn:
✔ What the Tiering Model is and why it’s essential for AD security.
✔ How many tiers you need and how to structure them properly.
✔ How Tiering protects against lateral movement & privilege escalation.
If you like this free lesson, the full Windows Infrastructure Security Course goes even deeper into AD security models, best practices, and real-world attack simulations.
