Windows Environments
IT Security
| Beginner
- 16 Videos | 1h 31m 4s
- Includes Assessment
- Earns a Badge
As a security operations person, you'll need to tailor your methods to suit the operating system your working with. This course covers some of the core competencies required to conduct offensive security operations against a Windows environment. Throughout this course, you'll learn how to recognize the differences between various Windows versions. You'll examine the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in a Windows environment. You'll then learn about the MITRE ATT&CK framework and how it relates to Windows intrusions and identify the different Windows logging mechanisms. Next, you'll practice using event logging, basic PowerShell commands, and the Windows Registry. You'll then explore how the Windows hashing algorithm works and practice cracking an NTLM hash value. Lastly, you'll investigate different data artifacts within Windows and outline how best to work with Active Directory and Kerberos.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize the standard security features and controls placed on Windows hostsidentify different Windows Server operating systems and their various uses within the environmentrecognize the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) within a Windows environmentoutline the MITRE ATT&CK framework and how it relates to Windows intrusionsidentify the location of command Windows-based logs and the event viewerview Windows event logging in actionname the various user and service accounts within a Windows Active Directory environment
-
use basic Windows and PowerShell commandsoutline how NTFS and Active Directory permissions work and some of their common misconfigurationsdescribe the hashing algorithm used to store Windows passwordscrack an NTLM hash value using several toolsuse the Windows Registry and recognize the different artifacts contained withinlist and describe various artifacts created within the Windows operating systemoutline how Kerberos works and some common Active directory misconfigurationssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 49sUP NEXT
-
2.The Security Features and Controls on Windows Hosts8m 44s
-
3.Windows Server Operating System Types5m 58s
-
4.Intrusion Detection and Prevention in Windows5m 19s
-
5.The MITRE ATT&CK Framework and Windows Intrusions5m 38s
-
6.The Logging Features in Windows6m 2s
-
7.Viewing Event logging5m 12s
-
8.The Different Windows Account Types5m 29s
-
9.Using Windows Commands6m 46s
-
10.How Windows Permissions Work4m 40s
-
11.NT (New Technology) LAN Manager (NTLM) in Windows2m 55s
-
12.Cracking an NTLM Hash9m 59s
-
13.Using the Windows Registry8m 40s
-
14.Artifacts Found in Windows OS5m 5s
-
15.How Active Directory and Kerberos Work7m 19s
-
16.Course Summary1m 29s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.