
Please access this website using a laptop / desktop or tablet for the best experience

Log Analysis and Tracking Lateral Movement in Using Event IDs
Pages Count
8 Pages
Links for the courses
For Understanding Lateral Movement Checkout below link
--------------------------------------------------------------------------------------------------------------------------
Article Name | Link |
Log Analysis – It’s Not About Knowing, It’s About Correlating | |
Tracking Kerberos & NTLM Authentication Failures and Investigation | |
Understanding Where Windows Authentication Logs Actually Live — From AD to Entra ID | |
Event Log Clearing and Malware Execution: Evidence from Windows Logs | |
PowerShell Logging: Making the Invisible Visible | |
Tracking Lateral Movement — Named Pipes, Scheduler, Services, Registry, and DCOM (Event IDs) | |
Tracking Lateral Movement: PowerShell Remoting, WMIC, Explicit Credentials, NTLM Relay Attacks, Credential Theft and Reuse (Event IDs) |
Your Instructor
Dean

