ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

How to Secure Active Directory (AD Tiering) - Tutorial 15 min

Автор: Truesec

Загружено: 2022-03-22

Просмотров: 29111

Описание: A 15 minute tutorial about #ActiveDirectory (#Tiering) with Peter Löfgren, Senior Technical Architect and part of our #Truesec Incident Response Team, discussing the topic of how you can avoid getting exposed to #cyberattacks by protecting your credentials.

______
Unknown vulnerabilities and weaknesses in your IT environment will poses a large risk of being hit by a cyberattack. To ensure a secure infrastructure and staying ahead of threat actors, you need to identify vulnerabilities and create a secure infrastructure on all levels of your organization. Protecting your credentials is one of them. By understanding what cybercriminals can do with your credentials, you can also learn how to protect yourself and your environment.

You will learn about:
Tiering, and administrative approach to keeping your credentials safe.
What is pass-the-hash and pass-the-ticket.
Stepping up your game with Authentication silos and Conditional Access.

_____
For Whom:
Tech Professionals, IT technicians, IT professionals, and for you working at an IT department interested in cyber security.

Stay updated on blog here: https://www.truesec.com/hub/blog

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
How to Secure Active Directory (AD Tiering) - Tutorial 15 min

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Common Active Directory Misconfiguration | Tech Talk #1, 2022

Common Active Directory Misconfiguration | Tech Talk #1, 2022

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

Понимание Active Directory и групповой политики

Понимание Active Directory и групповой политики

Malware Development: Evading Microsoft Defender for Endpoint w. Mikkel Ole Rømer - Truesec Summit

Malware Development: Evading Microsoft Defender for Endpoint w. Mikkel Ole Rømer - Truesec Summit

Understanding Active Directory Sites

Understanding Active Directory Sites

Изучите Microsoft Active Directory (ADDS) за 30 минут

Изучите Microsoft Active Directory (ADDS) за 30 минут

Kerberos Explained (In 3 Levels Of Detail)

Kerberos Explained (In 3 Levels Of Detail)

Learn Microsoft Active Directory Advanced skills!

Learn Microsoft Active Directory Advanced skills!

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

Интернет в небе: Сергей

Интернет в небе: Сергей "Флеш" о том, как «Шахеды» и «Герберы» научились работать в одной связке

Deploying A Multi-Tier PKI (Public Key Infrastructure) Inside an Active Directory Domain Using ADCS

Deploying A Multi-Tier PKI (Public Key Infrastructure) Inside an Active Directory Domain Using ADCS

Top Active Directory Attacks: Understand, then Prevent and Detect

Top Active Directory Attacks: Understand, then Prevent and Detect

Cyber War on Ukraine in Reality: Victor Zhora, Ukrainian Cybersecurity Official, Shares His Story

Cyber War on Ukraine in Reality: Victor Zhora, Ukrainian Cybersecurity Official, Shares His Story

Active Directory Domain Service Deep Dive

Active Directory Domain Service Deep Dive

Объяснение аутентификации Kerberos | Подробное исследование

Объяснение аутентификации Kerberos | Подробное исследование

AI Trends 2026: Quantum, Agentic AI & Smarter Automation

AI Trends 2026: Quantum, Agentic AI & Smarter Automation

Building a LAB - Using PowerShell Hydration Toolkit with a XML data file - Truesec Reactor SE01E07

Building a LAB - Using PowerShell Hydration Toolkit with a XML data file - Truesec Reactor SE01E07

this Cybersecurity Platform is FREE

this Cybersecurity Platform is FREE

How Do Red Teams Legally Break into Banks? | Tech Talk #2, 2022

How Do Red Teams Legally Break into Banks? | Tech Talk #2, 2022

How to Harden Active Directory to Prevent Cyber Attacks

How to Harden Active Directory to Prevent Cyber Attacks

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]