Download pdf
What about places where credentials are stored? The technology weaknesses in credential security and specific misused actions will be demonstrated within the operating system. You will learn the unexpected places your passwords reside, how the password attacks are performed, the typical paths where credentials can be leaked and how to prevent these by implementing various solutions.

Learning Objectives:
1: Learn the technology weaknesses in credential security.
2: Learn the unexpected places your passwords reside, how the password attacks are performed.
3: Learn typical paths where credentials can be leaked and how to prevent those.

Pre-Requisites:
They should have a good hands-on experience in the IT department; at least eight years in the field is recommended.