YoVDO

Abusing Active Directory in Post Exploitation

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Offensive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced post-exploitation techniques for abusing Active Directory in this 41-minute conference talk by Carlos Perez at DerbyCon 4. Gain insights into leveraging compromised Active Directory environments, learn about common misconfigurations, and discover methods for escalating privileges and maintaining persistence within corporate networks. Delve into practical demonstrations and real-world scenarios to enhance your understanding of Active Directory security vulnerabilities and how attackers exploit them during post-exploitation phases.

Syllabus

t105 Abusing Active Directory in Post Exploitation Carlos Perez


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX