This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols.
Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows.
AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets.
Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients.
Hands on Windows and Linux Kerberos.
The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO.
Hands on Using Wireshark to “see” Kerberos.
Approach, debugging tools, errors and solutions.
Hands on Kerberos troubleshooting.
Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos.
Hands on Kerberos logging.
Kerberos logins, Kerberos and web based applications, Directory services.
Cross realm authentication, Windows issues, Windows and UNIX interoperability,
Hands on Using a Windows DC for UNIX clients.
"Good content, good lecture, good venue."
"Course was a real eye-opener to some of the barriers we encounter."
This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning. Hands on sessions are used throughout to allow delegates to consolidate their new skills.