In this course we need to start off by thinking like an attacker and the attack phases. It will begin with a introduction to attacks, breaches and detection. Next, Users and User security with resources, authorization and credentials as well as controlling rights and privileges. It will round out with managing passwords and group managed service accounts. This course contains the following lessons:
Lesson 1:
Lesson 2:
Lesson 3:
Lesson 4:
Lesson 5:
Lesson 6:
Lesson 7:
Lesson 8: