» » » Kerberos authentication protocol in Windows domains
Information of news
14-11-2021, 09:45

Kerberos authentication protocol in Windows domains

Category: Tutorials / Other

Kerberos authentication protocol in Windows domains
Kerberos authentication protocol in Windows domains
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 61 lectures (2h 58m) | Size: 1.31 GB

Understand, configure, troubleshoot, secure and monitor Kerberos authentication protocol in Windows domains
What you'll learn:
Learn Kerberos terminology and concepts.
Understand how Kerberos authentication works.
Configure Kerberos authentication in a secure way for multi-tier applications.
Resolve Kerberos authentication problems using Network Monitor and analytical thinking.
Secure and monitor Kerberos infrastructure and communications.

This is expert level course with focus on Kerberos infrastructure and authentication.
You should have experience with Windows server infrastructure and Active Directory.
Good knowledge of communication protocols and security standards is required.
Knowledge of Microsoft IIS, SQL Server and Exchange Server will help a lot.

The course will introduce you to Microsoft implementation of Kerberos authentication protocol and its benefits, terminology, concepts, and service infrastructure. It will then explain how Kerberos works through detail and step-by-step examination of the ticketing system and communication messages in various configurations using flow diagrams and network traffic analyzer to get better understanding of the processes under the hood. Understanding how Kerberos works will help you troubleshoot complex problems and reduce stress.

We will walk through the configuration of the most common Microsoft applications such as IIS, SQL, Exchange, and file servers, including multi-hop setups and mid-tier service integration, discuss impersonation, review delegation options, and see why some of these options are not so secure. We will also learn how to Kerberize non-Windows services so they can benefit from Kerberos security and convenience of SSO.

Then we will dive into troubleshooting issues, go through a checklist so we don't miss most common misconfigurations and we will look into specific troubleshooting examples. We will also examine Kerberos vulnerabilities and the most common attacks, such as Kerberoasting and Golden and Silver Tickets and talk about how to prevent and detect compromise. Finally, we will look into relevant monitoring and alerting options and learn how to use these for detecting malicious activity.

Who this course is for
This course is designed for Windows system administrators, .Net developers, database administrators and cybersecurity specialists.
Anyone interested in authentication protocols will benefit from good understanding of Kerberos.
Download link :
(If you need these, buy and download immediately before they are delete)
Links are Interchangeable - Single Extraction - Premium is support resumable


Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.
free html hit counter