Completed
Realistic Threat Model
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Top Active Directory Attacks - Understand, then Prevent and Detect
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Different ways of conceptualizing breaches
- 4 Lockheed Martin Cyberkill Train trademark
- 5 What every attacker or attack needs
- 6 Internal access
- 7 Why internal access
- 8 A 10000 employee company
- 9 Twitter breach
- 10 Finding the right data
- 11 X filtration
- 12 Ransomware
- 13 High Level Picture
- 14 Prevent vs Detect
- 15 Safes
- 16 Assume Breach
- 17 Realistic Threat Model
- 18 Password Spraying
- 19 Single Factor Authentication
- 20 Credential Stuffing
- 21 File Sharing
- 22 dns fallback abuse
- 23 Look printers
- 24 Kerberos roasting
- 25 What are kerberos
- 26 normal flow
- 27 analogies
- 28 authentication
- 29 ticket granting
- 30 service ticket
- 31 kerberos steam
- 32 preventive detective controls
- 33 password protection
- 34 printers
- 35 sensitive files
- 36 longterm action
- 37 fallback abuse
- 38 Jeff