Completed
ATTACK SCENARIO #2
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 WHEN NOT COMPUTERING...
- 3 ATTACK SCENARIO #2
- 4 WINDOWS LOGON TYPES
- 5 LOCAL SAM DATABASE
- 6 ACTIVE DIRECTORY DATABASE
- 7 LSA SECRETS
- 8 CREDENTIAL MANAGER
- 9 WINDOWS CREDENTIAL & AUTH ISSUES
- 10 STEALING WINDOWS ACCESS TOKENS
- 11 WINDOWS CRED & AUTH ISSUES
- 12 INTRODUCING PAWS
- 13 ACTIVE DIRECTORY ADMINISTRATIVE TIER MODEL
- 14 LOGON RESTRICTIONS
- 15 TRADITIONAL SOLUTIONS - JUMP SERVERS
- 16 PAW PREREQUISITES
- 17 PHASES OF DEPLOYMENT
- 18 PAW DEPLOYMENT MODELS
- 19 DEPLOY PAW ACTIVE DIRECTORY FRAMEWORK
- 20 PAW COMPUTER ACCOUNT GPOs
- 21 PAW USER GPOS
- 22 PAW GPOS - DENY LOWER TIER LOGON
- 23 RESTRICTED ADMIN)
- 24 PAW SETUP - PHASE 2
- 25 MULTI-FACTOR)
- 26 PAW SETUP - PHASE 3 (PROTECTED USERS)
- 27 LESSONS LEARNED FROM MY DEPLOYMENT
- 28 PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION
- 29 NETWORK SEGMENTATION (LAYER3)
- 30 FURTHER LIMITING EXPOSURE TO CREDENTIAL THEFT AND LATERAL MOVEMENT
- 31 CLOSING
- 32 QUESTIONS/CONTACT