Windows Environments

IT Security    |    Beginner
  • 16 videos | 1h 31m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 14 users Rating 4.8 of 14 users (14)
As a security operations person, you'll need to tailor your methods to suit the operating system your working with. This course covers some of the core competencies required to conduct offensive security operations against a Windows environment. Throughout this course, you'll learn how to recognize the differences between various Windows versions. You'll examine the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in a Windows environment. You'll then learn about the MITRE ATT&CK framework and how it relates to Windows intrusions and identify the different Windows logging mechanisms. Next, you'll practice using event logging, basic PowerShell commands, and the Windows Registry. You'll then explore how the Windows hashing algorithm works and practice cracking an NTLM hash value. Lastly, you'll investigate different data artifacts within Windows and outline how best to work with Active Directory and Kerberos.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the standard security features and controls placed on windows hosts
    Identify different windows server operating systems and their various uses within the environment
    Recognize the role of intrusion detection systems (ids) and intrusion prevention systems (ips) within a windows environment
    Outline the mitre att&ck framework and how it relates to windows intrusions
    Identify the location of command windows-based logs and the event viewer
    View windows event logging in action
    Name the various user and service accounts within a windows active directory environment
  • Use basic windows and powershell commands
    Outline how ntfs and active directory permissions work and some of their common misconfigurations
    Describe the hashing algorithm used to store windows passwords
    Crack an ntlm hash value using several tools
    Use the windows registry and recognize the different artifacts contained within
    List and describe various artifacts created within the windows operating system
    Outline how kerberos works and some common active directory misconfigurations
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 49s
  • 8m 44s
    After completing this video, you will be able to recognize the standard security features and controls placed on Windows hosts. FREE ACCESS
  • Locked
    3.  Windows Server Operating System Types
    5m 58s
    Learn how to identify different Windows Server operating systems and their various uses within the environment. FREE ACCESS
  • Locked
    4.  Intrusion Detection and Prevention in Windows
    5m 19s
    Upon completion of this video, you will be able to recognize the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) within a Windows environment. FREE ACCESS
  • Locked
    5.  The MITRE ATT&CK Framework and Windows Intrusions
    5m 38s
    In this video, you will outline the MITRE ATT&CK framework and how it relates to Windows intrusions. FREE ACCESS
  • Locked
    6.  The Logging Features in Windows
    6m 2s
    In this video, you will identify the location of Windows-based command logs and the event viewer. FREE ACCESS
  • Locked
    7.  Viewing Event logging
    5m 12s
    In this video, you will learn how to view Windows event logging in action. FREE ACCESS
  • Locked
    8.  The Different Windows Account Types
    5m 29s
    After completing this video, you will be able to name the various user and service accounts within a Windows Active Directory environment. FREE ACCESS
  • Locked
    9.  Using Windows Commands
    6m 46s
    In this video, you will learn how to use basic Windows and PowerShell commands. FREE ACCESS
  • Locked
    10.  How Windows Permissions Work
    4m 40s
    In this video, you will outline how NTFS and Active Directory permissions work, as well as some of their common misconfigurations. FREE ACCESS
  • Locked
    11.  NT (New Technology) LAN Manager (NTLM) in Windows
    2m 55s
    Upon completion of this video, you will be able to describe the hashing algorithm used to store Windows passwords. FREE ACCESS
  • Locked
    12.  Cracking an NTLM Hash
    9m 59s
    During this video, you will learn how to crack an NTLM hash value using several tools. FREE ACCESS
  • Locked
    13.  Using the Windows Registry
    8m 40s
    In this video, you will use the Windows Registry and recognize the different types of data contained within. FREE ACCESS
  • Locked
    14.  Artifacts Found in Windows OS
    5m 5s
    Upon completion of this video, you will be able to list and describe various artifacts created within the Windows operating system. FREE ACCESS
  • Locked
    15.  How Active Directory and Kerberos Work
    7m 19s
    In this video, you will outline how Kerberos works and some common Active directory misconfigurations. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 29s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 70 users Rating 4.5 of 70 users (70)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.0 of 4 users Rating 4.0 of 4 users (4)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)