Download link
File List
-
02.Detecting and Analyzing Attacks and Security Breaches/0205.Active Directory Default Configuration.mp4 35.47 MB
06.Analyzing Activity Using Auditing and Logs/0605.Managing Auditing Using PowerShell.mp4 29.33 MB
06.Analyzing Activity Using Auditing and Logs/0603.Advanced File and Folder Auditing.mp4 27.71 MB
03.Protecting Credentials and Privileged Access/0307.Group Managed Service Accounts.mp4 26.13 MB
06.Analyzing Activity Using Auditing and Logs/0606.Locating Events in the Security Log.mp4 25.78 MB
06.Analyzing Activity Using Auditing and Logs/0604.Dynamic Access Control and Expression-based Auditing.mp4 24.24 MB
03.Protecting Credentials and Privileged Access/0302.Configuring User Rights.mp4 24.11 MB
02.Detecting and Analyzing Attacks and Security Breaches/0208.Using the sysinternals Suite.mp4 23.99 MB
02.Detecting and Analyzing Attacks and Security Breaches/0206.Event Forwarding and Scheduled Tasks.mp4 23.02 MB
02.Detecting and Analyzing Attacks and Security Breaches/0207.Configuring Auditing.mp4 22.57 MB
03.Protecting Credentials and Privileged Access/0305.Configuring Protected Users.mp4 22.27 MB
03.Protecting Credentials and Privileged Access/0306.Configuring Authentication Policies.mp4 22.23 MB
05.Configuring Privileged Access Management and Administrative Forests/0505.Creating Users and Shadow Principals.mp4 22.03 MB
03.Protecting Credentials and Privileged Access/0304.Password and Lockout Policies.mp4 21.16 MB
03.Protecting Credentials and Privileged Access/0303.Configuring Account Security.mp4 20.4 MB
03.Protecting Credentials and Privileged Access/0308.Configuring Credential Guard.mp4 19.51 MB
03.Protecting Credentials and Privileged Access/0310.Local Administrator Password Solution.mp4 19.2 MB
04.Limiting Administrator Rights with Just Enough Administration/0405.Session Configuration Files.mp4 17.35 MB
04.Limiting Administrator Rights with Just Enough Administration/0404.Role-capability Files.mp4 17.33 MB
05.Configuring Privileged Access Management and Administrative Forests/0504.Configuring a PAM Trust Relationship.mp4 17.27 MB
04.Limiting Administrator Rights with Just Enough Administration/0403.Setting up JEA.mp4 16.2 MB
04.Limiting Administrator Rights with Just Enough Administration/0407.Connecting to a JEA Endpoint.mp4 15.68 MB
03.Protecting Credentials and Privileged Access/0301.The Principle of Least Privilege.mp4 13.69 MB
05.Configuring Privileged Access Management and Administrative Forests/0501.Understanding Enhanced Security Administrative Environments.mp4 10.03 MB
05.Configuring Privileged Access Management and Administrative Forests/0506.Requesting Privileged Access.mp4 9.92 MB
02.Detecting and Analyzing Attacks and Security Breaches/0201.Understanding Attacks.mp4 9.66 MB
03.Protecting Credentials and Privileged Access/0309.Privileged Access Workstations.mp4 7.67 MB
05.Configuring Privileged Access Management and Administrative Forests/0503.Understanding Microsoft Identity Manager.mp4 7.11 MB
04.Limiting Administrator Rights with Just Enough Administration/0406.Creating a JEA Endpoint.mp4 6.37 MB
06.Analyzing Activity Using Auditing and Logs/0601.Understanding Audit Policies.mp4 6.36 MB
Exercise Files/managing-privileged-identities-windows-server-2016.zip 6.25 MB
04.Limiting Administrator Rights with Just Enough Administration/0401.Understanding JEA.mp4 6.21 MB
05.Configuring Privileged Access Management and Administrative Forests/0507.Configuring PAM Roles.mp4 5.64 MB
02.Detecting and Analyzing Attacks and Security Breaches/0202.Detecting Security Breaches.mp4 5.6 MB
06.Analyzing Activity Using Auditing and Logs/0602.Understanding Advanced Auditing.mp4 5.57 MB
05.Configuring Privileged Access Management and Administrative Forests/0502.Understanding Privileged Access Management.mp4 5.57 MB
04.Limiting Administrator Rights with Just Enough Administration/0402.Configuring JEA.mp4 4.59 MB
06.Analyzing Activity Using Auditing and Logs/0607.Course Wrap-up.mp4 4.3 MB
02.Detecting and Analyzing Attacks and Security Breaches/0203.Identifying Key Resources.mp4 4.2 MB
01.Course Overview/0101.Course Overview.mp4 3.9 MB
02.Detecting and Analyzing Attacks and Security Breaches/0204.How It Can Affect You.mp4 3.5 MB
02.Detecting and Analyzing Attacks and Security Breaches/0206.Event Forwarding and Scheduled Tasks.srt 12.73 KB
03.Protecting Credentials and Privileged Access/0310.Local Administrator Password Solution.srt 11.71 KB
02.Detecting and Analyzing Attacks and Security Breaches/0205.Active Directory Default Configuration.srt 11.62 KB
02.Detecting and Analyzing Attacks and Security Breaches/0207.Configuring Auditing.srt 11.6 KB
03.Protecting Credentials and Privileged Access/0301.The Principle of Least Privilege.srt 11.37 KB
06.Analyzing Activity Using Auditing and Logs/0603.Advanced File and Folder Auditing.srt 11.11 KB
03.Protecting Credentials and Privileged Access/0307.Group Managed Service Accounts.srt 11.06 KB
06.Analyzing Activity Using Auditing and Logs/0604.Dynamic Access Control and Expression-based Auditing.srt 10.81 KB
03.Protecting Credentials and Privileged Access/0304.Password and Lockout Policies.srt 10.54 KB
06.Analyzing Activity Using Auditing and Logs/0605.Managing Auditing Using PowerShell.srt 10.45 KB
03.Protecting Credentials and Privileged Access/0306.Configuring Authentication Policies.srt 9.48 KB
02.Detecting and Analyzing Attacks and Security Breaches/0201.Understanding Attacks.srt 9.24 KB
03.Protecting Credentials and Privileged Access/0303.Configuring Account Security.srt 8.98 KB
06.Analyzing Activity Using Auditing and Logs/0606.Locating Events in the Security Log.srt 8.74 KB
03.Protecting Credentials and Privileged Access/0302.Configuring User Rights.srt 8.59 KB
02.Detecting and Analyzing Attacks and Security Breaches/0208.Using the sysinternals Suite.srt 8.38 KB
05.Configuring Privileged Access Management and Administrative Forests/0505.Creating Users and Shadow Principals.srt 8.33 KB
03.Protecting Credentials and Privileged Access/0305.Configuring Protected Users.srt 7.62 KB
03.Protecting Credentials and Privileged Access/0308.Configuring Credential Guard.srt 7.51 KB
05.Configuring Privileged Access Management and Administrative Forests/0504.Configuring a PAM Trust Relationship.srt 7.44 KB
05.Configuring Privileged Access Management and Administrative Forests/0501.Understanding Enhanced Security Administrative Environments.srt 7.15 KB
03.Protecting Credentials and Privileged Access/0309.Privileged Access Workstations.srt 6.4 KB
04.Limiting Administrator Rights with Just Enough Administration/0405.Session Configuration Files.srt 6.27 KB
04.Limiting Administrator Rights with Just Enough Administration/0407.Connecting to a JEA Endpoint.srt 6.13 KB
04.Limiting Administrator Rights with Just Enough Administration/0404.Role-capability Files.srt 5.87 KB
02.Detecting and Analyzing Attacks and Security Breaches/0202.Detecting Security Breaches.srt 5.86 KB
04.Limiting Administrator Rights with Just Enough Administration/0403.Setting up JEA.srt 5.78 KB
05.Configuring Privileged Access Management and Administrative Forests/0503.Understanding Microsoft Identity Manager.srt 5.19 KB
04.Limiting Administrator Rights with Just Enough Administration/0401.Understanding JEA.srt 5.09 KB
06.Analyzing Activity Using Auditing and Logs/0601.Understanding Audit Policies.srt 5.05 KB
05.Configuring Privileged Access Management and Administrative Forests/0502.Understanding Privileged Access Management.srt 4.88 KB
02.Detecting and Analyzing Attacks and Security Breaches/0203.Identifying Key Resources.srt 4.7 KB
06.Analyzing Activity Using Auditing and Logs/0602.Understanding Advanced Auditing.srt 4.44 KB
05.Configuring Privileged Access Management and Administrative Forests/0506.Requesting Privileged Access.srt 4.32 KB
05.Configuring Privileged Access Management and Administrative Forests/0507.Configuring PAM Roles.srt 4.28 KB
02.Detecting and Analyzing Attacks and Security Breaches/0204.How It Can Affect You.srt 4.09 KB
06.Analyzing Activity Using Auditing and Logs/0607.Course Wrap-up.srt 3.77 KB
04.Limiting Administrator Rights with Just Enough Administration/0402.Configuring JEA.srt 3.64 KB
04.Limiting Administrator Rights with Just Enough Administration/0406.Creating a JEA Endpoint.srt 2.8 KB
01.Course Overview/0101.Course Overview.srt 2.45 KB
Download Info
-
Tips
“Pluralsight Managing Privileged Identities in Windows Server 2016” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.