February 2018
Intermediate to advanced
396 pages
9h 38m
English
In the previous chapter, we explored how to exploit an organization's networks. We went from networking fundamentals to discovering the latest attacking methodologies. This chapter is your next step to gaining more knowledge about securing another important technical system for every modern company, which is Active Directory. We will take you to another level of experience following a well-designed plan to obtain the required skills to defend another environment.
The following topics will be covered in this chapter: