Tags
Language
Tags
October 2025
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Kerberos authentication protocol in Windows domains

    Posted By: BlackDove
    Kerberos authentication protocol in Windows domains

    Kerberos authentication protocol in Windows domains
    Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.67 GB | Duration: 2h 58m


    Understand, configure, troubleshoot, secure and monitor Kerberos authentication protocol in Windows domains.

    What you'll learn
    Learn Kerberos terminology and concepts.
    Understand how Kerberos authentication works.
    Configure Kerberos authentication in a secure way for multi-tier applications.
    Resolve Kerberos authentication problems using Network Monitor and analytical

    Description
    The course will introduce you to Microsoft implementation of Kerberos authentication protocol and its benefits, terminology, concepts, and service infrastructure. It will then explain how Kerberos works through detail and step-by-step examination of the ticketing system and communication messages in various configurations using flow diagrams and network traffic analyzer to get better understanding of the processes under the hood. Understanding how Kerberos works will help you troubleshoot complex problems and reduce stress.



    We will walk through the configuration of the most common Microsoft applications such as IIS, SQL, Exchange, and file servers, including multi-hop setups and mid-tier service integration, discuss impersonation, review delegation options, and see why some of these options are not so secure. We will also learn how to Kerberize non-Windows services so they can benefit from Kerberos security and convenience of SSO.



    Then we will dive into troubleshooting issues, go through a checklist so we don’t miss most common misconfigurations and we will look into specific troubleshooting examples. We will also examine Kerberos vulnerabilities and the most common attacks, such as Kerberoasting and Golden and Silver Tickets and talk about how to prevent and detect compromise. Finally, we will look into relevant monitoring and alerting options and learn how to use these for detecting malicious activity.

    Who this course is for:
    This course is designed for Windows system administrators, .Net developers, database administrators and cybersecurity specialists.
    Anyone interested in authentication protocols will benefit from good understanding of Kerberos.