资源说明:What You’ll Learn
Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack
Implement defensive and auditing strategies to mitigate the threats and risk
Understand a 12-step privileged access management Implementation plan
Consider deployment and scope, including risk, auditing, regulations, and oversight solutions
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。