January 2022
Beginner
528 pages
10h 49m
English
"As an inventor and researcher, I realize that the degree of vulnerability of an organization depends on how the infrastructure was implemented, managed, and designed,"
– Sarbajit Rakshit, IBM Master Inventor
Almost all companies have Windows systems in their infrastructure, either as workstations, servers, or directory services. Therefore, to master the art of cybersecurity, you need to know which strategies, techniques, and tools to apply, but also how and when to apply them to achieve the desired level of security in your infrastructure.
To achieve those goals, we are going to cover the following main topics: