Active Directory - Network Ports
This document will guide you through the challenging task of opening ports in Windows environments. Although there are many resources available online, it can be difficult to find comprehensive information for all use cases in one place. Additionally, some of these resources may contain inaccuracies. This document demonstrates following network ports groups:
• DC to DC
• DC to RODC
• RODC to DC
• Domain Member to DC
• Domain Member to RODC
• PAW to TIER
Windows Infrastructure Security - Kerberos
Kerberos is the backbone of authentication in Active Directory—but misconfigurations can expose your environment to attacks like Kerberoasting.
In this focused mini-course, you’ll learn:
✔ How Kerberos authentication works inside Active Directory.
✔ How ticket encryption & delegation function and where security gaps exist.
✔ How attackers exploit weak configurations—and how to defend against them.
By the end, you’ll have a deep understanding of Kerberos security risks and how to harden authentication in AD.