The Most Addictive Python and SQL Courses
Learn the Skills Netflix, Meta, and Capital One Actually Hire For
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn to identify and counter Microsoft Configuration Manager attack vectors in this 38-minute conference talk that explores detection mechanisms and evasion techniques used by threat actors targeting SCCM environments. Discover how attackers exploit Configuration Manager infrastructure to move laterally through networks, escalate privileges, and maintain persistence while examining defensive strategies and monitoring approaches to protect against these sophisticated attack paths. Gain practical insights into the security implications of Configuration Manager deployments and develop skills to implement effective detection rules and security controls that can identify malicious activity within SCCM systems before attackers can achieve their objectives.
Syllabus
Detections and Evasions for Configuration Manager Attack Paths - Joshua Prager
Taught by
BSides SATX