Windows Environments
IT Security
| Beginner
- 16 videos | 1h 31m 4s
- Includes Assessment
- Earns a Badge
As a security operations person, you'll need to tailor your methods to suit the operating system your working with. This course covers some of the core competencies required to conduct offensive security operations against a Windows environment. Throughout this course, you'll learn how to recognize the differences between various Windows versions. You'll examine the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in a Windows environment. You'll then learn about the MITRE ATT&CK framework and how it relates to Windows intrusions and identify the different Windows logging mechanisms. Next, you'll practice using event logging, basic PowerShell commands, and the Windows Registry. You'll then explore how the Windows hashing algorithm works and practice cracking an NTLM hash value. Lastly, you'll investigate different data artifacts within Windows and outline how best to work with Active Directory and Kerberos.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize the standard security features and controls placed on Windows hostsidentify different Windows Server operating systems and their various uses within the environmentrecognize the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) within a Windows environmentoutline the MITRE ATT&CK framework and how it relates to Windows intrusionsidentify the location of command Windows-based logs and the event viewerview Windows event logging in actionname the various user and service accounts within a Windows Active Directory environment
-
use basic Windows and PowerShell commandsoutline how NTFS and Active Directory permissions work and some of their common misconfigurationsdescribe the hashing algorithm used to store Windows passwordscrack an NTLM hash value using several toolsuse the Windows Registry and recognize the different artifacts contained withinlist and describe various artifacts created within the Windows operating systemoutline how Kerberos works and some common Active directory misconfigurationssummarize the key concepts covered in this course
IN THIS COURSE
-
1m 49s
-
8m 44s
-
5m 58s
-
5m 19s
-
5m 38s
-
6m 2s
-
5m 12s
-
5m 29s
-
6m 46s
-
4m 40s
-
2m 55s
-
9m 59s
-
8m 40s
-
5m 5s
-
7m 19s
-
1m 29s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.