Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Password Intelligence Project - Advanced Password Recovery and Modern Mitigation Strategies

via YouTube

Overview

This course aims to provide an advanced understanding of password intelligence, recovery techniques, and modern mitigation strategies. The learning outcomes include understanding recent enterprise password failures, how modern passwords work, and the dynamics of dictionary and brute force attacks. Students will learn about recovery sequencing, brute force techniques, and the importance of password length over complexity. The course teaches skills such as obtaining and dumping Windows credentials, using password vault services, and implementing strong multi-factor authentication. The teaching method involves a combination of theoretical explanations, practical demonstrations, and real-world case studies. This course is intended for cybersecurity professionals, IT professionals, and individuals interested in enhancing their knowledge of password security and mitigation strategies.

Syllabus

DerbyCon 2013
Objectives
Recent Enterprise Password Fails
The Historic Password Problem
How Modern Passwords Work
How Password Complexity Works
How Password Length Works
How Passwords Are Compromised
Obtain and Dump Windows Credentials into Password Cracking Program
Inherent Password Problems
Recovery Sequencing
Dictionary Attack Dynamics
Dictionary Recovery Tricks
Brute Force Recovery (10)
Brute Force Lowercase (26)
Brute Force Advance Techniques
Removing Restricted Password Lengths
Reducing the key Space "Wheel of Fortune" Recovery Methodology . abcdefghijklmnopqrstuvwxyz - 8 Characters - 217,180,147,158
Presumed vs. Guaranteed Key Space Complexity
Brute Force Password Resistance
Length Trumps Complexity
Establish Multiple Passwords
Consider a Password Vault Service
Fixing the Problem
Salt and Encrypt Stored Credentials
Compromise Detection Strategies
Strong Multi-Factor Authentication 3 Types of Authentication
2Step != 2Factor Authentication
Hard Tokens -Strongest Most Expensive Protection
Soft Tokens - Good Protection at a Reasonable Price
2FA Application Development
The Future of 2FA?
Conclusion: 2FA - Knowledge is Power!

Reviews

Start your review of Password Intelligence Project - Advanced Password Recovery and Modern Mitigation Strategies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.