Courses

Windows Infrastructure Security

Are you ready to elevate your cybersecurity skills in Windows environments? Our course offers in-depth insights into Windows Operating Systems and Active Directory, all from a cybersecurity perspective. This course is the culmination of 8 years of dedicated knowledge gathering and expertise. Whether you are a Security Engineer looking for unique knowledge, a System Administrator seeking career advancement, or an IT Manager wanting to provide your team with the necessary training to protect against cyber threats, this course is designed to meet your needs.

David Horák

Windows Infrastructure Security - Kerberos

Explore the Kerberos authentication protocol within Active Directory in this focused mini course. You’ll learn the fundamentals of Kerberos, gain advanced knowledge of Kerberos ticket encryption, and understand the potential attack known as kerberoasting, highlighting the importance of complex passwords for service accounts. By the end of this course, you’ll have a clear understanding of these critical aspects of Active Directory security. If you find this valuable, consider exploring our full Windows Infrastructure Security Course.

David Horák

Windows Infrastructure Security - Stealing Credentials

Delve into the intricacies of credential and secret management within Windows OS in this focused mini course. You’ll learn about the LSASS process and its protection – Credential Guard, and specific attacks targeting stored credentials, such as WDigest and Delegation of Default Credentials. By the end of this course, you’ll understand how these credentials and secrets are stored and protected, as well as how they can be abused. If you find this valuable, consider exploring our full Windows Infrastructure Security Course.

David Horák

Windows Infrastructure Security - Tiering Model

You are going to learn about Tiering Model concept in Active Directory. We will deal with following questions:
What is Tiering Model?
Why Tiering Model?
How many Tiers?
If you like this free part of the Windows Infrastructure Security Course, please consider our full version.




David Horák