Posted by: kurtsh | June 10, 2016

TRAINING: Defending Active Directory Against Cyberattacks (FREE)

image

Interested in the why, how, and what of Active Directory (AD) and enterprise protection? This course has the answers you need to help you defend AD against cyberattacks. Learn from the experts, as they look at Active Directory from an enterprise risk perspective. The key to success is knowing what your high-value assets are, securing them, and securing their dependencies.

Whether your digital assets are on-premises or in the cloud, join us to explore the AD environment, today’s adversaries, relationship dynamics, and strategic prioritization, along with adoption of least privilege. Take a look at the different aspects of Active Directory security, based on findings from the Microsoft Cybersecurity Services team, learn strategies to protect privileged identities in your environment, and finish the course with a roadmap for hardening your AD environment. Defenders should be as extremely adaptive as adversaries are these days, and this course is a great place to start.

  • Active Directory Security: First Things First
    Take a look at the sophisticated threats that target Active Directory. Examine the anatomy of a cyberattack, and review the basics of Active Directory security.
  • Adopt Least Privilege
    Learn about the centricity of Active Directory, further explore Tier 0, and understand the importance of assigning least privilege, including its role in your organization’s cyberdefense strategy.
  • Protect Privileged Identities
    Adversaries leverage privileged identities, the primary attack vector, to persist and expand the scope of compromise. Learn strategies to protect privileged identities in your environment.
  • Defend Your Directory
    Do you know who your admins are? Learn why maintaining solid access control to sensitive directory objects is important for mitigating stealthy means of persistence and escalation of privilege.
  • Defend Your Domain Controllers
    Protecting Domain Controller hosts is fundamental to maintain the integrity of the overall access model and security boundary provided by Active Directory. Learn how to mitigate the risks.
  • Beware of Security Dependencies
    Security dependencies are one of the more sophisticated means of compromising Active Directory. Learn how to minimize and protect the security dependencies in your organization’s environment.
  • Monitoring
    Collection is not the same as detection. Learn what to collect and how to analyze and respond to your collected data. Start making more informed decisions in response to your collected data. Start making more informed decisions in response to security events.

Learn

  • Learn about the anatomy of a cyberattack.
  • Learn the importance of assigning least privilege.
  • List strategies you can use to protect privileged identities in your organization’s environment.
  • Maintain solid access control to sensitive directory objects.
  • Find out different means of compromising hosts, and differentiate ways to mitigate the risks.
  • Identify your organization’s security dependencies.
  • Analyze and respond to your collected data.

To start the FREE course, go to:


Categories

%d bloggers like this: