Specialized Hunts: Threat Hunting within Active Directory
Offered By: Pluralsight
Course Description
Overview
Active Directory is used in most medium and large companies, making it a significant target for abuse. This course will teach you how to hunt for threats in Active Directory to uncover malicious activity rapidly, allowing you to respond faster
Medium and large companies are constant targets for attackers, and abusing Active Directory is one method used in attacks. In this course, Specialized Hunts: Threat Hunting within Active Directory, you’ll learn to hunt for threats specific to Active Directory. First, you’ll explore Kerberos attacks and how to discover them. Next, you’ll discover different persistence methods used on AD, and how to hunt for them. Finally, you’ll learn how to hunt for replication based attacks on AD. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting needed to hunt for threats specific to Active Directory.
Medium and large companies are constant targets for attackers, and abusing Active Directory is one method used in attacks. In this course, Specialized Hunts: Threat Hunting within Active Directory, you’ll learn to hunt for threats specific to Active Directory. First, you’ll explore Kerberos attacks and how to discover them. Next, you’ll discover different persistence methods used on AD, and how to hunt for them. Finally, you’ll learn how to hunt for replication based attacks on AD. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting needed to hunt for threats specific to Active Directory.
Syllabus
- Course Overview 1min
- Kerberos Attacks 24mins
- Common Persistence Methods 16mins
- Replication Based Attacks 8mins
Taught by
Guillaume Ross
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network