Windows Environments
IT Security
| Beginner
- 16 videos | 1h 31m 4s
- Includes Assessment
- Earns a Badge
As a security operations person, you'll need to tailor your methods to suit the operating system your working with. This course covers some of the core competencies required to conduct offensive security operations against a Windows environment. Throughout this course, you'll learn how to recognize the differences between various Windows versions. You'll examine the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in a Windows environment. You'll then learn about the MITRE ATT&CK framework and how it relates to Windows intrusions and identify the different Windows logging mechanisms. Next, you'll practice using event logging, basic PowerShell commands, and the Windows Registry. You'll then explore how the Windows hashing algorithm works and practice cracking an NTLM hash value. Lastly, you'll investigate different data artifacts within Windows and outline how best to work with Active Directory and Kerberos.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the standard security features and controls placed on windows hostsIdentify different windows server operating systems and their various uses within the environmentRecognize the role of intrusion detection systems (ids) and intrusion prevention systems (ips) within a windows environmentOutline the mitre att&ck framework and how it relates to windows intrusionsIdentify the location of command windows-based logs and the event viewerView windows event logging in actionName the various user and service accounts within a windows active directory environment
-
Use basic windows and powershell commandsOutline how ntfs and active directory permissions work and some of their common misconfigurationsDescribe the hashing algorithm used to store windows passwordsCrack an ntlm hash value using several toolsUse the windows registry and recognize the different artifacts contained withinList and describe various artifacts created within the windows operating systemOutline how kerberos works and some common active directory misconfigurationsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 49s
-
8m 44sAfter completing this video, you will be able to recognize the standard security features and controls placed on Windows hosts. FREE ACCESS
-
5m 58sLearn how to identify different Windows Server operating systems and their various uses within the environment. FREE ACCESS
-
5m 19sUpon completion of this video, you will be able to recognize the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) within a Windows environment. FREE ACCESS
-
5m 38sIn this video, you will outline the MITRE ATT&CK framework and how it relates to Windows intrusions. FREE ACCESS
-
6m 2sIn this video, you will identify the location of Windows-based command logs and the event viewer. FREE ACCESS
-
5m 12sIn this video, you will learn how to view Windows event logging in action. FREE ACCESS
-
5m 29sAfter completing this video, you will be able to name the various user and service accounts within a Windows Active Directory environment. FREE ACCESS
-
6m 46sIn this video, you will learn how to use basic Windows and PowerShell commands. FREE ACCESS
-
4m 40sIn this video, you will outline how NTFS and Active Directory permissions work, as well as some of their common misconfigurations. FREE ACCESS
-
2m 55sUpon completion of this video, you will be able to describe the hashing algorithm used to store Windows passwords. FREE ACCESS
-
9m 59sDuring this video, you will learn how to crack an NTLM hash value using several tools. FREE ACCESS
-
8m 40sIn this video, you will use the Windows Registry and recognize the different types of data contained within. FREE ACCESS
-
5m 5sUpon completion of this video, you will be able to list and describe various artifacts created within the Windows operating system. FREE ACCESS
-
7m 19sIn this video, you will outline how Kerberos works and some common Active directory misconfigurations. FREE ACCESS
-
1m 29s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.