Courses

Flagship Courses

Windows Infrastructure Security

Master Windows & Active Directory Security
Before Attackers Exploit Your Weaknesses

Identify & fix misconfigurations before they lead to breaches.
Learn real-world attack & defense techniques not just theory.
Secure Windows & AD environments using best practices, security baselines, and structured models like Tiering.

David Horák

249$

Building a Secure Active Directory

Master Building & Hardening AD Step-by-Step
Hands-On Experience That Pays Off

Build your own secure AD lab from scratch — follow a proven, field-tested process used by security pros.
Lock down AD with Tiering Model, Security Basellines, and Microsoft’s most effective hardening practices.
Walk away with real-world skills you can use immediately — no fluff, no theory, just results.

David Horák

219$

Complete Windows Security Bundle

Master Windows & AD Security — Theory + Hands-On

Windows Infrastructure Security — Understand the “what & why” with a deep dive into Windows & AD security, plus OS-level protections.
Building a Secure Active Directory — Follow step-by-step to build & harden AD from scratch in your own lab.
Gain full-spectrum expertise — from strategic defenses to hands-on implementation — and truly own this domain.

David Horák

349$

Mini-Courses

Active Directory - Authentication

Master AD Authentication & Secure Your Infrastructure

Understand NTLM & Kerberos inside out — and where attackers exploit them.
Apply best practices like AES encryption, Protected Users, and restricted delegation.
Stop common attacks such as Kerberoasting with proven defenses.

David Horák

Windows Security - Secrets Location

Master Where & How Windows Stores Credentials

Identify credential storage locations — SAM, LSASS, LSA Secrets, and more.
See exactly how attackers steal credentials and close those gaps fast.
Implement defenses like Credential Guard, LAPS, and hardened GPO settings.

David Horák

Windows Security - System Protection

Protect System Integrity & Control Application Execution

Secure the boot process with UEFI Secure Boot, Trusted Boot, and ELAM.
Block malware & unauthorized software with Applocker and WDAC.
Lock down Windows systems using proven hardening best practices.

David Horák

Free Courses

Windows - Stealing Credentials

See How Attackers Steal Credentials—So You Can Stop Them.

How credentials & secrets are stored in Windows OS (LSASS, SAM, etc.).
How protections like Credential Guard work.
Real-world credential attacks (WDigest, delegation, token theft) and how to defend against them.

David Horák

Active Directory - Tiering Model

Segment & Secure AD Privileges to Prevent Escalation.

What the Tiering Model is and why it’s essential for AD security.
How many tiers you need and how to structure them properly.
How Tiering protects against lateral movement & privilege escalation.

David Horák

Active Directory - Kerberos

Master Kerberos Authentication & Prevent Credential Theft.

How Kerberos authentication works inside Active Directory.
How ticket encryption & delegation function and where security gaps exist.
How attackers exploit weak configurations—and how to defend against them.

David Horák

Active Directory - Password Policies

Master AD Password Policies & Strengthen Security

Configure GPO & Fine-Grained Password Policies for maximum control.
Align with CIS, NIST, and cybersecurity regulations to ensure compliance.
Block credential attacks with strong, well-structured password rules.

David Horák

Active Directory - Service Accounts

Secure Service Accounts & Stop Privilege Escalation

Avoid risky misconfigurations that lead to Kerberoasting attacks.
Use Managed & Group Managed Service Accounts (MSA/GMSA) for strong security.
Watch a live demo on securing service accounts step-by-step.

David Horák

Active Directory - Protected Users Group

Harden Admin Accounts & Block Credential Theft

Automatically protect high-value accounts with the Protected Users group.
See real-world attack demos and how these protections stop them.
Roll out securely with tested configuration & compatibility tips.

David Horák

Active Directory - Advanced Auditing

Log What Matters. Detect What Matters.

Configure Advanced Audit Policy & Sysmon for high-value event logging.
Cut noise and focus on real threats with optimized baselines.
Use ThreatLog to create a practical, defender-friendly auditing strategy.

David Horák