Specialized Hunts: Threat Hunting within Active Directory
Offered By: Pluralsight
Course Description
Overview
Active Directory is used in most medium and large companies, making it a significant target for abuse. This course will teach you how to hunt for threats in Active Directory to uncover malicious activity rapidly, allowing you to respond faster
Medium and large companies are constant targets for attackers, and abusing Active Directory is one method used in attacks. In this course, Specialized Hunts: Threat Hunting within Active Directory, you’ll learn to hunt for threats specific to Active Directory. First, you’ll explore Kerberos attacks and how to discover them. Next, you’ll discover different persistence methods used on AD, and how to hunt for them. Finally, you’ll learn how to hunt for replication based attacks on AD. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting needed to hunt for threats specific to Active Directory.
Medium and large companies are constant targets for attackers, and abusing Active Directory is one method used in attacks. In this course, Specialized Hunts: Threat Hunting within Active Directory, you’ll learn to hunt for threats specific to Active Directory. First, you’ll explore Kerberos attacks and how to discover them. Next, you’ll discover different persistence methods used on AD, and how to hunt for them. Finally, you’ll learn how to hunt for replication based attacks on AD. When you’re finished with this course, you’ll have the skills and knowledge of threat hunting needed to hunt for threats specific to Active Directory.
Syllabus
- Course Overview 1min
- Kerberos Attacks 24mins
- Common Persistence Methods 16mins
- Replication Based Attacks 8mins
Taught by
Guillaume Ross
Related Courses
Implementing and Administering Azure SentinelLinkedIn Learning Cloud-native security operations with Microsoft Sentinel
Microsoft via Microsoft Learn Defend against threats with Microsoft 365
Microsoft via Microsoft Learn SC-200: Mitigate threats using Microsoft Defender for Endpoint
Microsoft via Microsoft Learn SC-200: Perform threat hunting in Microsoft Sentinel
Microsoft via Microsoft Learn