fbpx
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

cybersecurity
education
€ EUR
  • $ USD
  • € EUR

AWSC SNEAK PEEK- Attacks on Credentials & Prevention Solutions

https://youtu.be/sp0YVflL_Pw

We are giving you a unique opportunity to take the Advanced Windows Security Course for a test ride!

Take a sneak peek into the first part of the module we recorded during the live session by Paula at AWSC17.

In Attacks on Credentials & Prevention Solutions module, we will focus on files that are inaccessible to you. Not because you have no permissions but because they are locked by someone else. If a process opens the file it has to declare two things:

● How it plans to use the file (write, read, etc),

● How others can use the file when the file is still open.

This means that some processes can actually open a file in a way that makes the file locked from any other form of access. Sometimes it is necessary (for example no one should open SQL Server database files when SQL server is working) and sometimes it is a real problem if we need to access the file and someone is blocking it. The practical question here is “what to do?”. Watch the video to have a look at a couple of ways we can use in practice.

Stay tuned for parts 2 and 3 of this amazing session. We will release them shortly, together with tools, slides, and homework… in other words everything crucial to every AWSC module.

If you want to know more about this year’s edition of the Advanced Windows Security Course for 2020, check here.

 

You may also be interested in: