Speak to our team now +44 (0)1737 821590

Definitive Kerberos for engineers

A 2 day
training course

Definitive Kerberos for engineers training course description

This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Describe what Kerberos is.
  • Explain how Kerberos works.
  • Install Kerberos.
  • Configure Kerberos.
  • Troubleshoot Kerberos.

Definitive Kerberos for engineers training course details

Who will benefit:
Engineers interested in security.
TCP/IP foundation for engineers
2 days

Training approach

This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning. Hands on sessions are used throughout to allow delegates to consolidate their new skills.

Overall rating:

Customer reviews

"Good content, good lecture, good venue. "
S. C. QuinetiQ
"Course was a real eye-opener to some of the barriers we encounter. "
T. E. FP Mailing

Definitive Kerberos for engineers training course contents

What is Kerberos?
Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows.

Kerberos concepts and technology
AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets.

Installation and administration of Kerberos
Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on: Windows and Linux Kerberos.

Kerberos protocols
The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on: Using Wireshark to “see” Kerberos.

Troubleshooting Kerberos
Approach, debugging tools, errors and solutions. Hands on: Kerberos troubleshooting.

Kerberos security concerns
Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on: Kerberos logging.

Software which uses Kerberos
Kerberos logins, Kerberos and web based applications, Directory services.

Advanced Kerberos issues
Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on: Using a Windows DC for UNIX clients.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online