Hacking Identity - A Pen Tester's Guide to IAM - Jerod Brennen

Hacking Identity - A Pen Tester's Guide to IAM - Jerod Brennen

via YouTube Direct link

LOGGING AND MONITORING - WINDOWS

17 of 18

17 of 18

LOGGING AND MONITORING - WINDOWS

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Identity - A Pen Tester's Guide to IAM - Jerod Brennen

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 STILL RELEVANT
  3. 3 LET'S TALK ATTACK SURFACE
  4. 4 PEN TESTING TEN EIGHT STEP PROCESS
  5. 5 USER LIFECYCLE
  6. 6 WHO (TRADITIONALLY) DOES WHAT
  7. 7 OSINT GATHERING
  8. 8 DOCUMENT METADATA
  9. 9 WHAT ARE WE LOOKING FOR AGAIN
  10. 10 PASSWORD SPRAYING
  11. 11 ONCE YOU'RE IN...
  12. 12 PASSWORD SELF-SERVICE
  13. 13 ANALYZE YOUR EXTERNAL ATTACK SURFACE
  14. 14 REDUCE SAID ATTACK SURFACE
  15. 15 TIGHTEN UP ADMIN PRIVILEGES
  16. 16 DETECTION IS KING
  17. 17 LOGGING AND MONITORING - WINDOWS
  18. 18 FUNDAMENTALS FTW

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.