Kerberos authentication protocol in Windows domains | Udemy


Kerberos authentication protocol in Windows domains | Udemy
English | Size: 1.67 GB
Genre: eLearning

What you’ll learn
Learn Kerberos terminology and concepts.
Understand how Kerberos authentication works.
Configure Kerberos authentication in a secure way for multi-tier applications.
Resolve Kerberos authentication problems using Network Monitor and analytical thinking.
Secure and monitor Kerberos infrastructure and communications.

The course will introduce you to Microsoft implementation of Kerberos authentication protocol and its benefits, terminology, concepts, and service infrastructure. It will then explain how Kerberos works through detail and step-by-step examination of the ticketing system and communication messages in various configurations using flow diagrams and network traffic analyzer to get better understanding of the processes under the hood. Understanding how Kerberos works will help you troubleshoot complex problems and reduce stress.

We will walk through the configuration of the most common Microsoft applications such as IIS, SQL, Exchange, and file servers, including multi-hop setups and mid-tier service integration, discuss impersonation, review delegation options, and see why some of these options are not so secure. We will also learn how to Kerberize non-Windows services so they can benefit from Kerberos security and convenience of SSO.

Then we will dive into troubleshooting issues, go through a checklist so we don’t miss most common misconfigurations and we will look into specific troubleshooting examples. We will also examine Kerberos vulnerabilities and the most common attacks, such as Kerberoasting and Golden and Silver Tickets and talk about how to prevent and detect compromise. Finally, we will look into relevant monitoring and alerting options and learn how to use these for detecting malicious activity.

Who this course is for:
This course is designed for Windows system administrators, .Net developers, database administrators and cybersecurity specialists.
Anyone interested in authentication protocols will benefit from good understanding of Kerberos.

nitro.download/view/3899113B0C5DE6B/KerberosauthenticationprotocolinWindowsdomains.fc.part1.rar
nitro.download/view/FDBCFB969D8B15F/KerberosauthenticationprotocolinWindowsdomains.fc.part2.rar
nitro.download/view/F595CB880B35C36/KerberosauthenticationprotocolinWindowsdomains.fc.part3.rar
nitro.download/view/EE4387C540FD58E/KerberosauthenticationprotocolinWindowsdomains.fc.part4.rar
nitro.download/view/D975D21BBBD76F2/KerberosauthenticationprotocolinWindowsdomains.fc.part5.rar

rapidgator.net/file/4a15d067dc500fe9428842e07c6feee5/KerberosauthenticationprotocolinWindowsdomains.fc.part1.rar.html
rapidgator.net/file/06718cfa7f8e430268ba9751fcac5429/KerberosauthenticationprotocolinWindowsdomains.fc.part2.rar.html
rapidgator.net/file/a9ac3bb73e301952393852c4a01230d5/KerberosauthenticationprotocolinWindowsdomains.fc.part3.rar.html
rapidgator.net/file/af8c4e658e2d53ec284487800b0ffc00/KerberosauthenticationprotocolinWindowsdomains.fc.part4.rar.html
rapidgator.net/file/1b2eb7f5252cf692ef637032a809bef7/KerberosauthenticationprotocolinWindowsdomains.fc.part5.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.