Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Domain Controllers
YouTube
education
Showing:
13
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Cyber Mentor
How to Build an Active Directory Hacking Lab
0
rewiews
Learn to create and configure an Active Directory lab environment for practicing ethical hacking techniques and understanding network vulnerabilities.
Add to list
16
Lesons
48 minutes
On-Demand
Free-Video
Mastering Active Directory Lab
0
rewiews
Hands-on lab for installing, configuring, and managing Active Directory, including domain controllers, DNS, user objects, and delegations using RSAT tools.
Add to list
6
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Manage Your Windows Infrastructure with Active Directory
0
rewiews
Learn to manage Windows infrastructure using Active Directory. Covers installation, configuration, and administration of key services like DNS, DHCP, IIS, and Group Policy. Hands-on practice with server roles and features.
Add to list
90
Lesons
16 hours
On-Demand
Free-Video
Cyber Mentor
Print Nightmare - Domain Controller Domination
0
rewiews
Explore the Print Nightmare vulnerability and its impact on domain controllers. Learn about this critical security flaw and its potential for system compromise in Windows environments.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Tokens, Authorization and Docker
0
rewiews
Learn about authorization, tokens, and Docker in cybersecurity. Explore single sign-on, Active Directory, smart contracts, JSON Web Tokens, and FIDO for enhanced digital security and authentication.
Add to list
21
Lesons
1 hour 35 minutes
On-Demand
Free-Video
SyScan360
How to Own Any Windows Network via Group Policy Hijacking Attacks
0
rewiews
Explore Group Policy vulnerabilities in Windows networks, including attack scenarios, exploit processes, and mitigation strategies for domain controllers and members.
Add to list
41
Lesons
49 minutes
On-Demand
Free-Video
Network Gravity - Exploring an Enterprise Network
0
rewiews
Explore enterprise network analysis using Network Gravity, covering domain controllers, endpoint discovery, logging, egress traffic, and internal visibility for comprehensive security insights.
Add to list
22
Lesons
44 minutes
On-Demand
Free-Video
linux.conf.au
Dirty Samba Hacks to Make Your Life Easier
0
rewiews
Discover practical Samba hacks for efficient user management, file handling, and system integration. Learn tips for scripting, querying, and implementing secure solutions in enterprise environments.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
BSides SATX
DPAPI - The Spice of Encryption
0
rewiews
Explore Windows' Data Protection API, its encryption mechanisms, and exploitation techniques for credential dumping and domain persistence.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
SNIAVideo
Kerberos and Authentication Updates in Samba - 2022
0
rewiews
Discover the latest Kerberos authentication updates in Samba, including Heimdal integration, password management improvements, and Windows server compatibility features for enhanced domain controller operations.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
DEFCONConference
Spooky Authentication at a Distance - Post-exploitation Techniques for Windows Environments
0
rewiews
Discover innovative post-exploitation techniques for proxying Windows authentication protocols remotely, enabling user impersonation and domain control without elevated privileges.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
WEareTROOPERS
A Decade of Active Directory Attacks: What We've Learned and What's Next
0
rewiews
Explore a decade of Active Directory attacks, lessons learned, and future trends in this insightful IT security talk by Sean Metcalf at TROOPERS24 conference.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
WEareTROOPERS
So You Performed A Forest Recovery - The Sequel
0
rewiews
Explore advanced techniques for Active Directory forest recovery, focusing on complex scenarios and best practices for maintaining security and integrity during the process.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
load more...