Average users might never be safe from credential-theft on Windows, but security professionals are in a position (and have the appropriate threat model) to protect themselves beyond clicking on a few UAC prompts. Through some extreme hardening measures, a few custom tools, and somewhat unconventional security practices, you will learn to turn a leaky default Windows installation into a highly secure computing environment.
This isn't a hardening tutorial, this is about understanding the Windows security model, how it handles different types of credentials, and how you can protect those credentials.