• 6 hours
  • Medium

Free online content available in this course.

course.header.alt.is_certifying

Got it!

Last updated on 10/31/24

Course introduction

Virtually all companies use Active Directory, and attackers are well aware of this. They are experts in using this technology to compromise their targets.

Understanding the techniques that attackers use allows you to resolve the vulnerabilities they exploit and monitor your environment to detect any intrusion attempts. This is what we’ll be covering during the course.

Register now and head to the first chapter!

Example of certificate of achievement
Example of certificate of achievement