c. EASE Model and OU structure
d. Integrate ‘Zero Trust Model’ into your environment.
3. Authentication and Authorization
a. Different Authentication methods – LDAP/WDigest/Form based
b. How Kerberos Works
c. How NTLM Authentication works
4. Active Directory Replication and Sites and Services
a. How Active Directory Replication works?
b. Inter-site / Intra-site replication
5. Group Policies / Group Policy preferences
a. How group policy works
6. Active Directory Performance
a. Understanding important AD performance counters
b. Measuring the performance of Active Directory
c. Active Directory Database Maintenance
7. Active Directory Backup and Recovery
a. AD Recycle Bin
b. AD tombstone lifetime
c. DeletedObject Container
d. Restore authorative vs. Non-authorative
8. Active Directory Trust
a. Different types of trust and how authentication flow work
b. Trust security configurations (SIDHistory/SIDFiltering)
9. Active Directory Programming
a. Using .Net to write simple Active Directory programs.
10. Active Directory Security
a. Understanding common attack vectors ( Pass-the-hash)
b. Understanding AD delegations and impact on security by allowing wrong permissions
c. Understanding User Rights Assignment
d. SMBRelay Attack
e. NTLMv1 and v2 Auditing
f. DSSync Attack
Tools covered
11. Wireshark / network monitor
12. Sys internal tools – process explorer / PSEXEC / process monitor / procdump / handles
13. Dsacls / Subinacl
14. Perfmon / Xperf
15. PingCastle
16. BloodHound