Active Directory Security Configuration & Management

Active Directory Security Configuration & Management

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 14 Lessons (3h 58m) | 2.89 GB

Active Directory is the central piece of most organizations’ identity and authentication infrastructure. Properly securing it from attackers is a critical step in protecting your organization from a costly compromise. From the basics of an AD structure, to specific Group Policy settings to restrict authentication types, this course will take you through the necessary steps to properly secure your AD infrastructure. You’ll learn about the most common types of attacks against Active Directory systems, as well as how to protect against them. In addition, we’ll cover some of the common misconfigurations you may encounter when working with AD and how to correct those configurations to be more secure. To wrap it up, we’ll take a look at best practices for monitoring and logging Active Directory, and some high priority Event IDs that should be monitored.

Table of Contents

1 Course Introduction
2 Active Directory Basics
3 Active Directory Management
4 Read-Only Domain Controllers
5 Active Directory Security Risks
6 Common AD Attacks
7 Active Directory Misconfiguration
8 AD Best Practices
9 Group Policy
10 Group Policy Demo
11 Securing Group Policy
12 Fixing Common AD Misconfigurations
13 Active Directory Monitoring & Logging
14 Course Conclusion

Homepage