From the course: GIAC Security Essentials (GSEC) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Enforcing Windows security - Google Cloud Platform Tutorial
From the course: GIAC Security Essentials (GSEC) Cert Prep
Enforcing Windows security
- Users can find themselves in a heap of trouble. This is especially true in Windows Land. How can we make sure that people stay safe? Stay tuned to find out. - [Narrator] You are watching ITProTV. (bright music) - Greetings everyone, and I'm glad you could make it back for more GSEC. We're talking about enforcing Windows security and luckily I say we in a collective sense, but I'm not actually running the show. Daniel's going to tell us all about it. So I think we're going to be talking about group policies and a bunch of other stuff that doesn't apply anymore, right? (speakers laughing) - Nailed it. - Oh yeah. I'm pretty good. - He's smart. - Yeah. - He's smart. I like how he thinks. I like the cut of your jibs, sir. - Yeah, I try. - But yes, group policy, if you're thinking about Windows group policy is where, or the defacto end all be all to how do we make sure that things are locked down in a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
Overview4m 31s
-
(Locked)
Access control and password management20m 21s
-
(Locked)
Active defense18m 40s
-
(Locked)
Contingency plans22m 50s
-
Critical controls14m 3s
-
(Locked)
Basic cryptography21m 7s
-
(Locked)
Cryptography algorithms and deployment21m 35s
-
(Locked)
Cryptography application25m 49s
-
(Locked)
Defense in depth16m 38s
-
Defensible network architecture18m 34s
-
(Locked)
Endpoint security17m 22s
-
(Locked)
Enforcing Windows security15m 15s
-
(Locked)
Incident handling and response17m 49s
-
(Locked)
IT risk management20m 48s
-
(Locked)
Linux security: Structure, permissions, and access22m 29s
-
(Locked)
Linux hardening and securing18m 1s
-
(Locked)
Linux monitoring and attack detection21m 4s
-
(Locked)
Linux security utilities20m 33s
-
(Locked)
Log management and SIEMs20m 21s
-
(Locked)
Common attack methods19m 14s
-
(Locked)
Mitigation strategies19m 46s
-
(Locked)
Network device security16m 34s
-
(Locked)
Network security devices20m 22s
-
(Locked)
Networking and protocols20m 40s
-
(Locked)
Securing Windows network services21m 26s
-
(Locked)
Security policies15m 54s
-
(Locked)
Virtualization and cloud security20m 49s
-
(Locked)
Web communication vulnerabilities17m 53s
-
(Locked)
Vulnerability scanning and penetration testing22m 21s
-
(Locked)
Windows access controls18m 49s
-
(Locked)
Windows updates24m 37s
-
(Locked)
Windows auditing and forensics13m 33s
-
(Locked)
Windows security infrastructure18m 54s
-
(Locked)
Wireless network security15m 28s
-