© 2025 Horizon Secured - Academy
Built with Teachable
  • Follow us on LinkedIn
  • Zero-Day Newsletter
  • Terms of Use
  • Privacy Policy
Horizon Secured - Academy logo

Main menu

Includes navigation links and user settings

Horizon Secured - Academy logo
  • Browse products
  • About
  • Courses
  • Free Resources
  • Sign up
  • Log in

Browse products

Browse products

Product filters:
search

Categories

Product image for Windows Infrastructure Security

Windows Infrastructure Security

Master Windows and Active Directory Security Before Attackers Exploit Your Weaknesses

Course•By David Horák

Learn more
Product image for Building a Secure Active Directory

Building a Secure Active Directory

Master AD Security by Building & Hardening It Yourself

Course•By David Horák

Learn more
Product image for Active Directory - Authentication

Active Directory - Authentication

Master Active Directory Authentication and Secure Your Windows Infrastructure

Course•By David Horák

Learn more
Product image for Windows Security - Secrets Location

Windows Security - Secrets Location

Master Windows Security: Learn Where and How Credentials Are Stored

Course•By David Horák

Learn more
Product image for Windows Security - System Protection

Windows Security - System Protection

Master Windows Security: Protect System Integrity and Control Application Execution

Course•By David Horák

Learn more
Product image for Windows - Stealing Credentials

Windows - Stealing Credentials

See How Attackers Steal Credentials—So You Can Stop Them

Course•By David Horák

Learn more
Product image for Active Directory - Kerberos

Active Directory - Kerberos

Master Kerberos Authentication and Prevent Credential Theft

Course•By David Horák

Learn more
Product image for Active Directory - Tiering Model

Active Directory - Tiering Model

Segment and Secure AD Privileges to Prevent Escalation

Course•By David Horák

Learn more
Product image for Active Directory - Password Policies

Active Directory - Password Policies

Master Password Policies in Active Directory

Course•By David Horák

Learn more
Product image for Active Directory - Service Accounts

Active Directory - Service Accounts

Master Service Accounts in Active Directory

Course•By David Horák

Learn more
Product image for Active Directory - Protected Users Group

Active Directory - Protected Users Group

Learn how to protect high-value admin accounts in Active Directory using the Protected Users group—what it does, how to deploy it safely, and what attacks it blocks.

Course•By David Horák

Learn more
Product image for Active Directory - Advanced Auditing

Active Directory - Advanced Auditing

Learn how to audit your Windows & AD environment properly using real-world techniques and tools — without flooding your SIEM with noise.

Course•By David Horák

Learn more
Product image for Active Directory - Network Ports

Active Directory - Network Ports

Quickly identify the right ports to open between AD components.

Digital file•2 files•By David Horák

Learn more
Product image for ADProbe - Vulnerability Script

ADProbe - Vulnerability Script

Scan your AD for real risks—vulnerabilities, misconfigs, and exposure points

Digital file•3 files•By David Horák

Learn more
Product image for Advanced Audit Policy Configuration - Table

Advanced Audit Policy Configuration - Table

Quickly find which audit category triggers which event—plus config recommendations for DCs, servers & workstations.

Digital file•1 file•By David Horák

Learn more
Product image for Complete Windows Security Bundle

Complete Windows Security Bundle

Build & Defend Your Active Directory — From the Ground Up

Bundle

Learn more
Product image for Learning Path - Windows Cybersecurity

Learning Path - Windows Cybersecurity

From IT support to Security Engineer—follow the same path I took

Digital file•1 file•By David Horák

Learn more
Product image for Learning Path - Windows Server 2012 R2 Security Guide

Learning Path - Windows Server 2012 R2 Security Guide

Hidden Microsoft gem on securing Windows Server roles

Digital file•1 file•By David Horák

Learn more
Product image for ThreatLog

ThreatLog

Stop Wasting Resources. Audit What Matters.

Digital file•1 file•By David Horák

Learn more
Product image for Windows Infrastructure Security Guides

Windows Infrastructure Security Guides

Get hands-on security guides for real-world AD challenges

Digital file•12 files•By David Horák

Learn more
20 products found