Skip to content

Details

Active Directory (AD) is the Windows directory service and many organizations now use it to centrally manage many security-related resources. This makes AD an enticing target for attackers seeking to gain access to an organization's domain controllers. Today we'll discuss how to protect AD from attack and how to use event logs and other forensic tools to investigate possible breaches.

Presenter: Mr. Tyrone E. Wilson is a passionate information security professional with 25 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. As a former cybersecurity analyst for the United States Army, Wilson developed security structures to ensure American intelligence systems were protected from foreign threats. Aside from being a Sr. InfoSec Engineer at Equinix Wilson is also the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.

Please consider our free Essentials Series of courses which provide a path to develop the essential skills for tomorrow’s careers in cybersecurity. These courses educate students in a range of techniques such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.

  • Network Defense Essentials

https://www.cover6solutions.com/courses/ec-council-network-defense-essentials-nde-training-course-v1/

  • Ethical Hacking Essentials

https://www.cover6solutions.com/courses/ec-council-ethical-hacking-essentials-ehe-training-course-v1/

  • Digital Forensics Essentials

https://www.cover6solutions.com/courses/ec-council-digital-forensics-essentials-dfe-training-course-v1/

If you would like to present to our group, please fill out a submission form:

Leave a Review of the @DCCyberWarriors:

Donate to the Group

We look forward to having you join our community!

Computer Security
Penetration Testing
New Technology
Ethical Hacking
Information Security

Members are also interested in