Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Defensive Cybersecurity Fundamentals [Video]

Alexhost
TOP 110

TOP

Alpha and Omega
Member
Access
Joined
Jan 21, 2021
Messages
215,044
Reaction score
17,105
Points
113
Age
37
Location
OneDDL
grants
₲138,739
3 years of service
48d6ac0821e49408c2d02fcfa0855bc7.jpeg

Instructors: Amanda Berlin | March 2022 | Duration: 2h 32m
Video: MP4 1280x720 48 KHz | English | Size: 943 MB
Everyone talks about the intrusion kill chain (sometimes called the "cyber kill chain")-a model for actionable intelligence in which defenders align enterprise defensive capabilities to the specific processes an adversary might undertake to target that enterprise. However, much of what's discussed publicly is misinformation and scare tactics.

Join expert Amanda Berlin to learn the most effective steps you can take to protect your organization from the vast majority of threats with defensive mitigation and monitoring. Through use cases such as ransomware, data exfiltration, and lateral movement, you'll see how to improve the standard of defense at each level, then discover step-by-step what you can accurately cover using the kill chain by working through use cases that outline the specifics of attacks. You'll also gain hands-on experience through tabletop exercises and drills to strengthen your understanding.
Much of what's covered will be hands-on walk-throughs in a Microsoft Windows environment. Windows domains are the most popular target for attackers as they're frequently the most insecurely configured.
What you'll learn and how you can apply it
By the end of this course, you'll understand
Offensive and defensive tactics, techniques, and procedures surrounding three important use cases that constantly are a threat to enterprises
How to complete 10 or more specific configuration changes to increase the security against the use cases listed
And you'll be able to
Gather open source intelligence (OSINT), including names and emails that an attacker may be able to take advantage of
Navigate several built-in Windows tools, including Group Policy and AdsiEdit
Implement LAPS
This course is for you because.
You're a systems administrator looking for a step-by-step guide to configuration changes in an enterprise.
You're a general security practitioner looking to gain insight on defensive security strategies.
You're an IT practitioner who's being encouraged by your organization to step into an information security role.
Prerequisites
A general understanding of operating systems and technology in general
The ability to navigate the command line at a novice level
Knowledge of common security terminology (macros, attacker, threat, data exfiltration, etc.)
Set up three virtual machines with up-to-date patching (instructions below)
Please, Log in or Register to view URLs content!

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Links are Interchangeable - No Password - Single Extraction
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
383,214
Reaction score
6,549
Points
83
grants
₲41,683
2 years of service
TOP salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom