Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • Cybersecurity, Video Tutorials, Forensics, Certification
  • Windows Authentication Attacks and Forensics – Learn 4 Free

Windows Authentication Attacks and Forensics – Learn 4 Free

Dr Erdal Ozkaya
Erdal2023-02-24T16:44:31-04:00

Windows Authentication Attacks and Forensics See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.

1 | Windows Security and Forensics Take a look at the current state of the security landscape, Windows Security, and what “computer forensics” are.

2 | Windows Memory Attacks and Forensics Learn how and why hackers attack a system’s memory and see how Memory Forensics can help address the problem.

3 | Windows Authentication Attacks and Forensics See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.

4 | Windows Forensics Explore Digital Forensics and find out what to do as a first responder to preserve evidence for legal actions.

5 | Network Forensics Explore network forensics, along with with case studies, best practices, and online analysis techniques.

6 | Malware Incident Response Learn about malware incident response, including identifying, locating, and removing malware.

Here is the link for Microsoft Virtual Academy

Erdal

Watch the Video’s in YouTube

Windows Security Erdal Ozkaya
Windows Security Erdal Ozkaya

 

Windows Security & Forensics Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion?

These days, every IT Pro should learn to recover key intelligence from Windows systems. Learn how to do just that, from leading expert Erdal Ozkaya, and find out what you need to become a digital forensic professional, incident responder, and media exploitation expert, capable of piecing together Windows system events, second by second.

Erdal joins forces with Hasain “the Wolf” Alshakarti and Raymond Comvalius to show how cybercrime happens, what you can do to prevent it, and how to respond when it occurs.

 Erdal Ozkaya

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Server war stories Erdal

Server war stories: Free webcast ( September 13)

Server war stories: Published at ZDnet https://www.zdnet.com/article/server-war-stories-webcast/ How many server disaster stories (or close calls) do you think the average system administrator... read more
CyberSec First Responder

CyberSec First Responder

CyberSec First Responder CyberSec First Responder v2 (CFR 210) is coming soon, a group of starts has worked to make this... read more

A CISOs role in Security Leadership – 6 Critical Tips ( Free PDF)

A CISOs role in Security Leadership A short summary of a CISO's role definition, and the six critical responsibilities  underpin Chief... read more
Phishing

How to protect yourself from phishing ? 6 Effective Tips

How to protect yourself from phishing ? A phishing attack is an attack vector that cybercriminals use it mainly for identity... read more
Microsoft management Summit Erdal Ozkaya

MMS 2011, Thank you

MMS 2011 MMS , What a week ... Being in Vegas with thousand of IT Pro's... Delivering 2 session. Fairly new... read more
A STRATEGIC PERSPECTIVE INTO THE TRADECRAFT OF THREAT ACTORS Dr Ozkaya

STRATEGIC PERSPECTIVE INTO THE TRADECRAFT 0F THREAT ACTORS

STRATEGIC PERSPECTIVE INTO THE TRADECRAFT OF THREAT ACTORS Phishing and ransomware have been effective weapons for hackers. Even the most sophisticated... read more
Cybersecurity Strategy for Cyber- Defenders by Erdal Ozkaya

Cybersecurity Strategy for Cyber Defenders – Free VIDE0

Cybersecurity Strategy for Cyber Defenders Hear Microsoft Cybersecurity Architect Dr Erdal Ozkaya discuss current threats and what to do with them.... read more
Be prepared

Incident Response and Management – Free Guide 2 learn

A successful approach to incident response and management ensures that an organization is set up for success to protect their... read more
Cybersecurity community meet up London

Cybersecurity community meet up London – Free Pizzas

Cybersecurity community meet up London If you are in London and you want to join our Cybersecurity community meet up, join... read more

Get Cloud ready for FREE – Great Learning Opportunities 15

We are in a stage where The landscape of business is changing really very quickly. All IT Professionals... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.