In this video, Tim Medin from Red Siege Information Security discusses the fundamentals and intricacies of Kerberos authentication within Windows environments. He explains how Kerberos functions as the main authentication mechanism in Windows Active Directory, detailing its components and the process of ticket granting.
In this video, the speakers discuss the implementation and benefits of using AppLocker and Sysmon for enhancing security in IT environments. They demonstrate how to set up and configure both tools, and explain how they can prevent unauthorized applications from running and provide detailed logging of system activity.
In this video, John and Alyssa discuss advanced memory analysis techniques. They delve into the use of tools like Volatility and Rekall for dissecting memory dumps, and demonstrate how to extract critical data from a Windows operating system.
In this video, the speakers discuss the powerful capabilities of the ELK stack (Elasticsearch, Logstash, and Kibana) for handling and analyzing Sysmon logs to improve cybersecurity measures.
In this video, the speaker discusses their journey and insights into the field of computer security, emphasizing the importance of foundational knowledge and hands-on experience. They detail their career progression, from initial roles in technical support to specialized positions in security, highlighting key learning moments and decisions.