Includes navigation links and user settings
Master Windows and Active Directory Security Before Attackers Exploit Your Weaknesses
Course•By David Horák
Master AD Security by Building & Hardening It Yourself
Master Active Directory Authentication and Secure Your Windows Infrastructure
Master Windows Security: Learn Where and How Credentials Are Stored
Master Windows Security: Protect System Integrity and Control Application Execution
See How Attackers Steal Credentials—So You Can Stop Them
Master Kerberos Authentication and Prevent Credential Theft
Segment and Secure AD Privileges to Prevent Escalation
Master Password Policies in Active Directory
Master Service Accounts in Active Directory
Learn how to protect high-value admin accounts in Active Directory using the Protected Users group—what it does, how to deploy it safely, and what attacks it blocks.
Learn how to audit your Windows & AD environment properly using real-world techniques and tools — without flooding your SIEM with noise.
Quickly identify the right ports to open between AD components.
Digital file•2 files•By David Horák
Scan your AD for real risks—vulnerabilities, misconfigs, and exposure points
Digital file•3 files•By David Horák
Quickly find which audit category triggers which event—plus config recommendations for DCs, servers & workstations.
Digital file•1 file•By David Horák
Build & Defend Your Active Directory — From the Ground Up
Bundle
From IT support to Security Engineer—follow the same path I took
Hidden Microsoft gem on securing Windows Server roles
Stop Wasting Resources. Audit What Matters.
Get hands-on security guides for real-world AD challenges
Digital file•12 files•By David Horák