Stop Being Passive with Your Active Directory
Kerberos, ADUC, Golden Tickets, Security Principals – have you come across these or similar words in penetration test reports or security bulletins and felt a little… lost? Active Directory comprises many components that fulfill complex architectural requirements but can also open cracks through which attackers may slip. Active Directory: Security Fundamentals demystifies the various Active Directory components and illustrates how these components can potentially introduce risks to your organization. This course empowers network defenders to directly look under the hood of their Active Directory architecture and understand their environment better than attackers.
Course Summary & Syllabus
Dig into Active Directory! This course will help you roll up your sleeves and get hands-on with Active Directory, enabling participants to gather answers directly when questions surrounding their organization’s AD architecture arise in the future. Learn Active Directory components and not only how they work together but also how they can work against your organization’s security posture. Full course syllabus coming soon!
Countless organizations leverage Active Directory (AD) to provide the foundation or entirety of their production environment’s identity and access management. But widespread usage doesn’t mean AD is simple; beyond its architecture and design considerations lie security implications that can directly impact your organization.
Active Directory: Security Fundamentals details key components of AD technology and architectures, focusing on the security implications of each. We’ll cover physical & logical components, forests & domains, Kerberos, and various tooling like ADUC – all from a security perspective. Course participants will get hands-on experience enumerating the architectures and security controls of a live Active Directory environment and will then analyze the data extracted.
This course is intended for security professionals of any experience level looking to learn more about the foundations of Active Directory security and analysis methods.
This course assumes no prior Active Directory knowledge, though participants would benefit from previous exposure to an enterprise Active Directory environment.
Participants must provide their own computer with a modern web browser installed to access training materials and complete the course’s labs. The SpecterOps training platform URL (https://specterops.training) must be accessible from the participant’s computer throughout the duration of the course.
There are no local virtual machines or special software required to fully participate in the course or labs.
During the course, participants will be provided access to a range to perform course labs and goals.
Upon completion of the course, participants are provided with a copy of course slides, copies of solution guides/videos, and a certificate of completion.
See What Else We Have to Offer
If a public offering of the training classes does not fit your busy schedule, our team of experts are available to provide a private training offering to your organization. This is by far the best way for your team to get one on one access to the instructors and solidify the material. We provide all training material as well as laptops and classroom locations if needed.Private Trainings