Completed
LOGGING AND MONITORING - WINDOWS
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking Identity - A Pen Tester's Guide to IAM - Jerod Brennen
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 STILL RELEVANT
- 3 LET'S TALK ATTACK SURFACE
- 4 PEN TESTING TEN EIGHT STEP PROCESS
- 5 USER LIFECYCLE
- 6 WHO (TRADITIONALLY) DOES WHAT
- 7 OSINT GATHERING
- 8 DOCUMENT METADATA
- 9 WHAT ARE WE LOOKING FOR AGAIN
- 10 PASSWORD SPRAYING
- 11 ONCE YOU'RE IN...
- 12 PASSWORD SELF-SERVICE
- 13 ANALYZE YOUR EXTERNAL ATTACK SURFACE
- 14 REDUCE SAID ATTACK SURFACE
- 15 TIGHTEN UP ADMIN PRIVILEGES
- 16 DETECTION IS KING
- 17 LOGGING AND MONITORING - WINDOWS
- 18 FUNDAMENTALS FTW