{"id":7116,"date":"2022-09-21T12:03:16","date_gmt":"2022-09-21T10:03:16","guid":{"rendered":"https:\/\/edu.itcoregroup.com\/?p=7116"},"modified":"2022-09-21T16:29:35","modified_gmt":"2022-09-21T14:29:35","slug":"la-gestione-di-active-directory-e-i-meccanismi-di-difesa","status":"publish","type":"post","link":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/","title":{"rendered":"La gestione di Active directory e i meccanismi di difesa"},"content":{"rendered":"\n

Continua la serie di video che abbiamo realizzato insieme a Francesco Guiducci, che il 30 settembre terr\u00e0 il corso “Hands on Hacking avanzato, gestione e protezione di Active Directory<\/a>“, essenziale per approfondire i meccanismi di difesa di Active directory, scoprire i vettori di attacco pi\u00f9 utilizzati ed elaborare strategie difensive efficaci. <\/p>\n\n\n\n

Nel primo video<\/a>, abbiamo definito Active Directory il cuore di un\u2019infrastruttura, l\u2019insieme di servizi e dati legati all\u2019identit\u00e0 di una societ\u00e0. Spesso per\u00f2, seppur centrale in quanto ad importanza, il cuore viene spesso trascurato. Nel discorso sulla Cybersecurity assumono un ruolo predominante le strategie di difesa perimetrale a discapito del \u201ccore\u201d di un\u2019infrastruttura di rete.<\/p>\n\n\n\n

Come verr\u00e0 strutturato il corso per la gestione di Active Directory?<\/h2>\n\n\n\n

L’esperienza di Francesco Guiducci \u00e8 ricca di lezioni importanti, utili a comprendere uno strumento “soggettivo” come Active Directory, ma anche per testimoniare le diverse esigenze delle aziende, e per fornire strumenti concreti<\/strong> ai partecipanti. Una cosa sulla quale siamo stati d\u2019accordo fin da subito con Francesco, \u00e8 stata la necessit\u00e0 di dare un taglio pratico ed operativo a questo corso.<\/p>\n\n\n\n

Approfondiremo la parte degli attacchi, ma discuteremo anche degli strumenti che possono essere utilizzati per prevenirli.<\/p>\n\n\n\n

E per quanto riguarda le best practices?<\/h3>\n\n\n\n

Sicuramente le password rappresentano il problema pi\u00f9 diffuso, non solo per gli utenti singoli ma per intere infrastrutture,<\/strong> esposte a pericoli dovuti alla scarsa efficacia di alcune password tra gli account con privilegi aziendali di alto livello.<\/p>\n\n\n\n

Si tratta di cercare un equilibrio.<\/p>\n\n\n\n

Se facciamo riferimento alle best practice da un punto di vista di comportamento da parte degli utenti, allora le strategie sono molteplici, ma si rifanno tutte ad un\u2019educazione alla sicurezza.<\/strong>
Da un punto di vista tecnico, lavorando sui permessi delle diverse utenze e sulla \u201cstratificazione\u201d<\/strong> (per semplificare il concetto) di Active Directory \u00e8 possibile intervenire per limitare le potenziali criticit\u00e0 dell\u2019infrastruttura.<\/p>\n\n\n\n

Il 30 settembre 2022 tirati su le maniche e\u2026 Hands on Hacking!<\/h3>\n\n\n\n

Partecipa al corso “Hands on Hacking avanzato, gestione e protezione di Active Directory”<\/p>\n\n\n\n

30 Settembre 2022 dalle 09:00 alle 18:00<\/p>\n\n\n\n

Il corso si terr\u00e0 da remoto, riceverai una mail all\u2019indirizzo indicato nel form d\u2019iscrizione<\/a>, con il link per collegarti all\u2019aula.<\/p>\n\n\n\n

Per qualsiasi informazione, puoi contattarci all’indirizzo educational@itcoregroup.com<\/a><\/p>\n\n\n\n

\n
Partecipa al corso<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Struttura del corso e best practices: continuano gli approfondimento con Francesco sul corso hands on Hacking-avanzato.<\/p>\n","protected":false},"author":21,"featured_media":7132,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":""},"categories":[199],"tags":[],"acf":[],"yoast_head":"\nLa gestione di Active directory e i meccanismi di difesa | ITCore Business Group - Educational<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La gestione di Active directory e i meccanismi di difesa | ITCore Business Group - Educational\" \/>\n<meta property=\"og:description\" content=\"Struttura del corso e best practices: continuano gli approfondimento con Francesco sul corso hands on Hacking-avanzato.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/\" \/>\n<meta property=\"og:site_name\" content=\"ITCore Business Group - Educational\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-21T10:03:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-21T14:29:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/edu.itcoregroup.com\/wp-content\/uploads\/2022\/09\/gestione-di-active-directory.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marketing ITCore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing ITCore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/\"},\"author\":{\"name\":\"Marketing ITCore\",\"@id\":\"https:\/\/edu.itcoregroup.com\/#\/schema\/person\/9b4c9fa54b05af28cfc081eab0d19c8b\"},\"headline\":\"La gestione di Active directory e i meccanismi di difesa\",\"datePublished\":\"2022-09-21T10:03:16+00:00\",\"dateModified\":\"2022-09-21T14:29:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/\"},\"wordCount\":378,\"publisher\":{\"@id\":\"https:\/\/edu.itcoregroup.com\/#organization\"},\"articleSection\":[\"News\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/\",\"url\":\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/\",\"name\":\"La gestione di Active directory e i meccanismi di difesa | ITCore Business Group - Educational\",\"isPartOf\":{\"@id\":\"https:\/\/edu.itcoregroup.com\/#website\"},\"datePublished\":\"2022-09-21T10:03:16+00:00\",\"dateModified\":\"2022-09-21T14:29:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/edu.itcoregroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La gestione di Active directory e i meccanismi di difesa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/edu.itcoregroup.com\/#website\",\"url\":\"https:\/\/edu.itcoregroup.com\/\",\"name\":\"ITCore Business Group - Educational\",\"description\":\"Corsi di formazione per aziende e privati\",\"publisher\":{\"@id\":\"https:\/\/edu.itcoregroup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/edu.itcoregroup.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/edu.itcoregroup.com\/#organization\",\"name\":\"ITCore Group Educational\",\"url\":\"https:\/\/edu.itcoregroup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/edu.itcoregroup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/edu.itcoregroup.com\/wp-content\/uploads\/2020\/06\/logo-edu.png\",\"contentUrl\":\"https:\/\/edu.itcoregroup.com\/wp-content\/uploads\/2020\/06\/logo-edu.png\",\"width\":1626,\"height\":558,\"caption\":\"ITCore Group Educational\"},\"image\":{\"@id\":\"https:\/\/edu.itcoregroup.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/showcase\/itcore-business-group-educational\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/edu.itcoregroup.com\/#\/schema\/person\/9b4c9fa54b05af28cfc081eab0d19c8b\",\"name\":\"Marketing ITCore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/edu.itcoregroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b8c1686a038d5d230c7c68d0dde6c450?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b8c1686a038d5d230c7c68d0dde6c450?s=96&d=mm&r=g\",\"caption\":\"Marketing ITCore\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La gestione di Active directory e i meccanismi di difesa | ITCore Business Group - Educational","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/","og_locale":"it_IT","og_type":"article","og_title":"La gestione di Active directory e i meccanismi di difesa | ITCore Business Group - Educational","og_description":"Struttura del corso e best practices: continuano gli approfondimento con Francesco sul corso hands on Hacking-avanzato.","og_url":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/","og_site_name":"ITCore Business Group - Educational","article_published_time":"2022-09-21T10:03:16+00:00","article_modified_time":"2022-09-21T14:29:35+00:00","og_image":[{"width":800,"height":500,"url":"https:\/\/edu.itcoregroup.com\/wp-content\/uploads\/2022\/09\/gestione-di-active-directory.png","type":"image\/png"}],"author":"Marketing ITCore","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Marketing ITCore","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/#article","isPartOf":{"@id":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/"},"author":{"name":"Marketing ITCore","@id":"https:\/\/edu.itcoregroup.com\/#\/schema\/person\/9b4c9fa54b05af28cfc081eab0d19c8b"},"headline":"La gestione di Active directory e i meccanismi di difesa","datePublished":"2022-09-21T10:03:16+00:00","dateModified":"2022-09-21T14:29:35+00:00","mainEntityOfPage":{"@id":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/"},"wordCount":378,"publisher":{"@id":"https:\/\/edu.itcoregroup.com\/#organization"},"articleSection":["News"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/","url":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/","name":"La gestione di Active directory e i meccanismi di difesa | ITCore Business Group - Educational","isPartOf":{"@id":"https:\/\/edu.itcoregroup.com\/#website"},"datePublished":"2022-09-21T10:03:16+00:00","dateModified":"2022-09-21T14:29:35+00:00","breadcrumb":{"@id":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/edu.itcoregroup.com\/blog\/la-gestione-di-active-directory-e-i-meccanismi-di-difesa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/edu.itcoregroup.com\/"},{"@type":"ListItem","position":2,"name":"La gestione di Active directory e i meccanismi di difesa"}]},{"@type":"WebSite","@id":"https:\/\/edu.itcoregroup.com\/#website","url":"https:\/\/edu.itcoregroup.com\/","name":"ITCore Business Group - Educational","description":"Corsi di formazione per aziende e privati","publisher":{"@id":"https:\/\/edu.itcoregroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/edu.itcoregroup.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/edu.itcoregroup.com\/#organization","name":"ITCore Group Educational","url":"https:\/\/edu.itcoregroup.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/edu.itcoregroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/edu.itcoregroup.com\/wp-content\/uploads\/2020\/06\/logo-edu.png","contentUrl":"https:\/\/edu.itcoregroup.com\/wp-content\/uploads\/2020\/06\/logo-edu.png","width":1626,"height":558,"caption":"ITCore Group Educational"},"image":{"@id":"https:\/\/edu.itcoregroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/itcore-business-group-educational\/"]},{"@type":"Person","@id":"https:\/\/edu.itcoregroup.com\/#\/schema\/person\/9b4c9fa54b05af28cfc081eab0d19c8b","name":"Marketing ITCore","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/edu.itcoregroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b8c1686a038d5d230c7c68d0dde6c450?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8c1686a038d5d230c7c68d0dde6c450?s=96&d=mm&r=g","caption":"Marketing ITCore"}}]}},"_links":{"self":[{"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/posts\/7116"}],"collection":[{"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/comments?post=7116"}],"version-history":[{"count":6,"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/posts\/7116\/revisions"}],"predecessor-version":[{"id":7154,"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/posts\/7116\/revisions\/7154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/media\/7132"}],"wp:attachment":[{"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/media?parent=7116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/categories?post=7116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edu.itcoregroup.com\/wp-json\/wp\/v2\/tags?post=7116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}