Udemy - Kerberos authentication protocol in Windows domains

seeders: 1
leechers: 5
updated:

Download Fast Safe Anonymous
movies, software, shows...

Files

[ CoursePig.com ] Udemy - Kerberos authentication protocol in Windows domains
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 1. Welcome.mp4 (15.9 MB)
    • 1. Welcome.srt (1.9 KB)
    • 1.1 1.1 welcome and about.pptx (3.1 MB)
    • 1.2 Kerberos authentication protocol in Windows domains.pdf (1.8 MB)
    • 1.3 Useful commands and scripts.txt (6.2 KB)
    • 10. Messages, tickets and encryption algorithms.mp4 (50.6 MB)
    • 10. Messages, tickets and encryption algorithms.srt (6.3 KB)
    • 2. Introduction to Kerberos.mp4 (17.0 MB)
    • 2. Introduction to Kerberos.srt (2.4 KB)
    • 2.1 1.2 intro.pptx (3.3 MB)
    • 3. Kerberos advantages.mp4 (9.2 MB)
    • 3. Kerberos advantages.srt (1.3 KB)
    • 4. Kerberos ticketing system.mp4 (9.2 MB)
    • 4. Kerberos ticketing system.srt (1.5 KB)
    • 5. Symmetric cryptography.mp4 (10.9 MB)
    • 5. Symmetric cryptography.srt (1.5 KB)
    • 6. Encryption prerequisites.mp4 (5.9 MB)
    • 6. Encryption prerequisites.srt (1.0 KB)
    • 7. Kerberos terminology.mp4 (9.3 MB)
    • 7. Kerberos terminology.srt (1.2 KB)
    • 7.1 1.3 terminology.pptx (4.4 MB)
    • 8. Kerberos secret keys.mp4 (21.6 MB)
    • 8. Kerberos secret keys.srt (2.9 KB)
    • 9. Kerberos cache.mp4 (9.0 MB)
    • 9. Kerberos cache.srt (1.1 KB)
    2. How Kerberos works
    • 1. Domain user logon to a PC.mp4 (21.3 MB)
    • 1. Domain user logon to a PC.srt (2.5 KB)
    • 1.1 2.1 How it works - user logon.pptx (22.1 MB)
    • 2. Demo how to use Microsoft Network Monitor.mp4 (20.6 MB)
    • 2. Demo how to use Microsoft Network Monitor.srt (2.2 KB)
    • 3. User logon step by step.mp4 (64.9 MB)
    • 3. User logon step by step.srt (8.5 KB)
    • 4. Smart card logon.mp4 (21.5 MB)
    • 4. Smart card logon.srt (2.4 KB)
    • 4.1 2.2 How it works - smart card auth.pptx (708.5 KB)
    • 5. Network service access step by step.mp4 (56.9 MB)
    • 5. Network service access step by step.srt (7.4 KB)
    • 5.1 2.3 How it works - network service access.pptx (7.8 MB)
    • 6. Cross-realm authentication step by step.mp4 (36.0 MB)
    • 6. Cross-realm authentication step by step.srt (4.9 KB)
    • 6.1 2.4 How it works - cross realm.pptx (11.1 MB)
    3. Kerberos configuration
    • 1. Basic Kerberos configuration.mp4 (62.4 MB)
    • 1. Basic Kerberos configuration.srt (7.0 KB)
    • 1.1 3.1 Basic Kerberos configuration.pptx (773.3 KB)
    • 2. Configure Kerberos for IIS.mp4 (22.8 MB)
    • 2. Configure Kerberos for IIS.srt (3.0 KB)
    • 2.1 3.2 Configure Kerberos for IIS.pptx (1.2 MB)
    • 3. Configure Kerberos for Exchange.mp4 (24.8 MB)
    • 3. Configure Kerberos for Exchange.srt (4.8 KB)
    • 3.1 3.3 Configure Kerberos for Exchange.pptx (726.3 KB)
    • 4. Demo configure Kerberos for Exchange.mp4 (44.4 MB)
    • 4. Demo configure Kerberos for Exchange.srt (3.5 KB)
    • 5. Configure Kerberos for SharePoint, SQL and network file servers.mp4 (34.6 MB)
    • 5. Configure Kerberos for SharePoint, SQL and network file servers.srt (4.6 KB)
    • 5.1 3.4.1 Configure Kerberos for SharePoint SQL CIFS.pptx (720.7 KB)
    • 5.2 3.4.2 Configure Kerberos for SSRS.pptx (700.0 KB)
    • 6. Kerberos authentication through SMB.mp4 (9.9 MB)
    • 6. Kerberos authentication through SMB.srt (1.3 KB)
    • 6.1 3.5 Kerberos auth through SMB.pptx (2.3 MB)
    • 7. Configure Kerberos for non-Windows systems.mp4 (16.2 MB)
    • 7. Configure Kerberos for non-Windows systems.srt (2.2 KB)
    • 7.1 3.6 Configure Kerberos for non-Windows system.pptx (710.4 KB)
    • 8. Demo configure Kerberos for non-Windows systems.mp4 (22.0 MB)
    • 8. Demo configure Kerberos for non-Windows systems.srt (2.5 KB)
    4. User impersonation and Kerberos delegation
    • 1. IIS configuration for ASP.NET impersonation.mp4 (43.2 MB)
    • 1. IIS configuration for ASP.NET impersonation.srt (5.5 KB)
    • 1.1 4.1 Kerberos impersonation and delegation.pptx (3.4 MB)
    • 10. Demo constrained delegation with MSAs.mp4 (19.3 MB)
    • 10. Demo constrained delegation with MSAs.srt (1.5 KB)
    • 11. Demo RBCD with MSAs.mp4 (12.1 MB)
    • 11. Demo RBCD with MSAs.srt (0.7 KB)
    • 12. IIS application integration.mp4 (39.4 MB)
    • 12. IIS application integration.srt (4.6 KB)
    • 12.1 4.2 Application integration.pptx (741.1 KB)
    • 2. Kerberos delegation and unconstrained delegation.mp4 (40.4 MB)
    • 2. Kerberos delegation and unconstrained delegation.srt (5.7 KB)
    • 3. Demo forwarding the client's TGT to a service account.mp4 (34.5 MB)
    • 3. Demo forwarding the client's TGT to a service account.srt (2.1 KB)
    • 4. Constrained delegation.mp4 (44.8 MB)
    • 4. Constrained delegation.srt (5.8 KB)
    • 5. Demo constrained delegation lab config.mp4 (23.5 MB)
    • 5. Demo constrained delegation lab config.srt (3.2 KB)
    • 6. Demo constrained delegation log events and network packet analysis.mp4 (44.3 MB)
    • 6. Demo constrained delegation log events and network packet analysis.srt (3.2 KB)
    • 7. Resource based constrained delegation.mp4 (26.5 MB)
    • 7. Resource based constrained delegation.srt (3.8 KB)
    • 8. Demo RBCD.mp4 (20.7 MB)
    • 8. Demo RBCD.srt (1.4 KB)
    • 9. Kerberos delegation and Managed Service Accounts.mp4 (10.2 MB)
    • 9. Kerberos delegation and Managed Service Accounts.srt (1.1 KB)
    5. Troubleshooting Kerberos issues
    • 1. Kerberos troubleshooting checklist.mp4 (44.4 MB)
    • 1. Kerberos troubleshooting checklist.srt (4.7 KB)
    • 1.1 5.1 Troubleshooting checklist.pptx (796.8 KB)
    • 10. Demo account is sensitive and cannot be delegated.mp4 (28.8 MB)
    • 10. Demo account is sensitive and cannot be delegated.srt (1.8 KB)
    • 11. Demo KDC_ERR_BADOPTION.mp4 (10.4 MB)
    • 11. Demo KDC_ERR_BADOPTION.srt (0.9 KB)
    • 12. Demo KDC_ERR_ETYPE_NOTSUPP.mp4 (13.2 MB)
    • 12. Demo KDC_ERR_ETYPE_NOTSUPP.srt (1.2 KB)
    • 13. Demo KDC_ERR_S_PRINCIPAL_UNKNOWN.mp4 (16.0 MB)
    • 13. Demo

Description

Kerberos authentication protocol in Windows domains



https://CoursePig.com

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 61 lectures (2h 58m) | Size: 1.31 GB
Understand, configure, troubleshoot, secure and monitor Kerberos authentication protocol in Windows domains
What you'll learn:
Learn Kerberos terminology and concepts.
Understand how Kerberos authentication works.
Configure Kerberos authentication in a secure way for multi-tier applications.
Resolve Kerberos authentication problems using Network Monitor and analytical thinking.
Secure and monitor Kerberos infrastructure and communications.

Requirements
This is expert level course with focus on Kerberos infrastructure and authentication.
You should have experience with Windows server infrastructure and Active Directory.
Good knowledge of communication protocols and security standards is required.
Knowledge of Microsoft IIS, SQL Server and Exchange Server will help a lot.

Description
The course will introduce you to Microsoft implementation of Kerberos authentication protocol and its benefits, terminology, concepts, and service infrastructure. It will then explain how Kerberos works through detail and step-by-step examination of the ticketing system and communication messages in various configurations using flow diagrams and network traffic analyzer to get better understanding of the processes under the hood. Understanding how Kerberos works will help you troubleshoot complex problems and reduce stress.

We will walk through the configuration of the most common Microsoft applications such as IIS, SQL, Exchange, and file servers, including multi-hop setups and mid-tier service integration, discuss impersonation, review delegation options, and see why some of these options are not so secure. We will also learn how to Kerberize non-Windows services so they can benefit from Kerberos security and convenience of SSO.



Download torrent
1.7 GB
seeders:1
leechers:5
Udemy - Kerberos authentication protocol in Windows domains


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1.7 GB
seeders:1
leechers:5
Udemy - Kerberos authentication protocol in Windows domains


Torrent hash: 99C474405761304184D07C2E2046A0D86E68AA27