[Pluralsight] Windows: How It's Hacked, How to Protect It - Pluralsight
Windows: How It's Hacked, How to Protect It - Pluralsight

Windows: How It's Hacked, How to Protect It - Pluralsight

image description

Course Description

Protect your Windows OS and prevent hackers from stealing or destroying your data. This course will teach you the weaknesses of the Windows OS, the different ways it can be hacked, and how to secure yourself against these attacks. If you want to protect your Windows OS from getting hacked, you need to have an understanding of how hacking occurs and the tools to prevent it. In this course, Windows: How It's Hacked, How to Protect It, one of the world's foremost experts in the Windows OS will show you the principles behind different attacks against the modern Windows OS, from Windows XP to Windows 10, including computers with encrypted and non-encrypted disks. First, you will learn the how weaknesses of the Windows OS can be used to break into the system. You'll then go through a full path of hacks, starting with getting access to local computer, breaking into a company network, and elevating yourself to Domain Admin. Finally, you'll discover how to use built-in Windows privileges to

bypass all ACL checks, steal another user's identity, and replace any protected file in a system. By the end of this course, you'll be able to secure your Windows OS and protect it from malicious attacks.

What you will learn

Hi everyone, my name is Sami Laiho. Welcome to my course, Windows: How It's Hacked, How to Protect It. I am a Senior Technical Fellow at my own company called Adminize. In 2015, major antimalware labs found 250, 000 to 300, 000 new malware samples per day. The world is changing and reactive security is dead. Everyone needs to move to proactive security and make sure their operating systems are secured from ground up with correct configurations. This course takes you through a horror show on how easy the Windows OS is to hack and then teaches you how to proactively secure it. Some of the major topics that we will cover include why hard disk encryption is nowadays mandatory, why removal of admin rights is mandatory, and how to prevent pass-the-hash attacks. By the end of this course, you'll know what are the biggest threats to your security and how you can easily increase the level of protection in your own environment. Before beginning the course, you should be familiar with the basics of Windows operating systems.


Section 1: Course Overview

Section 2: Introduction

Section 3: Acquiring Local Administrative Rights

Section 4: Beating Permissions with Privileges

Section 5: Bypassing Company Group Policies

Section 6: Elevating Your Rights to Domain Admin

Section 7: Using Pass-the-hash and Pass-the-ticket Attacks

Section 8: Bypassing BitLocker