Protect your Windows OS and prevent hackers from stealing or destroying your data. This course will teach you the weaknesses of the Windows OS, the different ways it can be hacked, and how to secure yourself against these attacks.
If you want to protect your Windows OS from getting hacked, you need to have an understanding of how hacking occurs and the tools to prevent it. In this course, Windows: How It's Hacked, How to Protect It, one of the world's foremost experts in the Windows OS will show you the principles behind different attacks against the modern Windows OS, from Windows XP to Windows 10, including computers with encrypted and non-encrypted disks. First, you will learn the how weaknesses of the Windows OS can be used to break into the system. You'll then go through a full path of hacks, starting with getting access to local computer, breaking into a company network, and elevating yourself to Domain Admin. Finally, you'll discover how to use built-in Windows privileges to bypass all ACL checks, steal another user's identity, and replace any protected file in a system. By the end of this course, you'll be able to secure your Windows OS and protect it from malicious attacks.
Hi everyone, my name is Sami Laiho, welcome to my course Windows: How It's Hacked, How to Protect It.
I am a Senior Technical Fellow at my own company Adminize.
In 2015 major anti-malware labs found 250000-300000 new malware samples per day. The world is changing and reactive security is dead. Everyone needs move to proactive security and make sure their operating systems are secured from ground up with correct configurations.
This course takes you through a horror show on how easy the Windows OS is to hack and then teaches you how to proactively secure it.
In this course, we're going to learn all about Packer, and how it can take your infrastructure from frustrating to awesome!
Some of the major topics that we will cover include:
Why harddisk encryption is mandatory
Why removal of admin rights is mandatory
How to prevent Pass-The-Hash attacks
By the end this course, you’ll know what are the biggest threats to your security and how you can easily increase the level of protection in your own environment.
Before beginning the course you should be familiar with the basics of Windows operating systems.
I hope you’ll join me on this journey to learn about OS Security with the Windows: How It's Hacked, How to Protect It course, at Pluralsight.