Spread the love

A good starting point for windows/Linux IT administrators to debut into Azure is to start with the below series – ” Inside Azure datacenter” , “Case of the Unexplained”. Having a mastery on SysAdmin tools(See Defrag tools section below) will be an added advantage.

Watch free on-demand recordings of Mark’s top-rated presentations from TechEd, BUILD and other conferences on Azure, security, Windows troubleshooting, malware hunting. If you have a question about a topic in any of these webcasts, please visit the Sysinternals Forum for answers and help from other users and moderators.

Inside Azure datacenter

Mark takes you on a tour of Azure’s datacenter architecture and implementation innovations, describing everything from Azure’s global infrastructure, to how we enable large-scale enterprise scenarios on both cloud and edge, to how we bring quantum computing to real-world scenarios today, and more.

Case of the Unexplained

Windows Internals

Security

  • TWC: Pass-the-Hash: How Attackers Spread and How to Stop Them
    Pass-the-hash transforms the breach of one machine into total compromise of infrastructure. The publication of attacks, and lack of tools to respond, have forced enterprises to rely on onerous and ineffective techniques. In this session, we deconstruct the PtH threat, show how the attack is performed, and how it can be addressed using new features and functionality recently introduced in Windows.
  • TWC: Malware Hunting with Mark Russinovich and the Sysinternals Tools
    Mark provides an overview of several Sysinternals tools, including Process Monitor, Process Explorer, and Autoruns, focusing on the features useful for malware analysis and removal. These utilities enable deep inspection and control of processes, file system and registry activity, and autostart execution points. He demonstrates their malware-hunting capabilities by presenting several current, real-world malware samples and using the tools to identify and clean malware.
  • License to Kill: Malware Hunting with the Sysinternals tools
    This session provides an overview of several Sysinternals tools, including Process Monitor, Process Explorer, and Autoruns, focusing on the features useful for malware analysis and removal. These utilities enable deep inspection and control of processes, file system and registry activity, and autostart execution points. You will see demos for their malware-hunting capabilities through several real-world cases that used the tools to identify and clean malware,and conclude by performing a live analysis of a Stuxnet infection’s system impact.
  • Zero Day: A Non-Fiction View
    Mark makes the case for how his hit cyberthriller, ZeroDay, is likely to be realized in non-fiction form in this 20-minute short version of his well-popular RSA Conference session.
  • Zero Day Malware Cleaning with the Sysinternals tools
    Slides from Mark’s highly-rated Blackhat US 2011 presentation how to use the Sysinternals tools to hunt down and eliminate malware.
  • Channel9: Mark Talks about Windows Security and Core Architecture
    Check out Mark’s Channel 9 interview where he talks about how he got started with Windows internals, new security features in Windows Vista, User Account Control,and what he’s doing at Microsoft.

Defrag Tools

Was this helpful?

0 0 vote
Article Rating
0