A Windows oriented master class developed and presented by two of the world’s foremost experts in Windows security Marcus Murray and Hasain Alshakarti. This unique hands-on training covers all aspects of Windows enterprise security in regards to attacks and defenses.
Marcus Murray and Hasain Alshakarti are both Microsoft Enterprise Security MVP's and Top Speakers at several TechEd’s and other conferences around the globe.
God kunskap om it-system i enterprise-miljö samt goda kunskaper om Windows-system.
- Student manual
IT-tekniker, administratörer, arkitekter och IT-ansvariga som vill lära sig mer om it-säkerhet och då med fokus på Windows säkerhet.
The course is divided in two parts, one is covering threats including APT's, hacker tools and techniques used by cybercriminals and malware authors. The second part will teach you how to defend and secure a modern Windows environment using the latest and greatest built-in features and components.
By taking this course you will be able to fully understand the threats of today and implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world.
By taking this course you will be able to fully understand the threats of today and implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world. World leading experts Marcus Murray & Hasain Alshakarti, both enterprise Security MVP's and TechEd top speakers will share their tools, tactics, strategies and notes from the field.
This 5 day course is the combination of the Cyber Sec Threats and Cyber Sec Defenses courses and the content is the same as described in both those courses below..
CyberSec Threats - Windows Platforms
3 days (Day 1-3)
In this course we will cover recent tools and techniques used by cybercriminals and malware authors.
By taking this course you will understand the anatomy of current cyber-attacks so which will give you an understanding on how to detect and prevent attacks on your infrastructure. The understanding of cyber-attacks are also required in order to be able to implement the correct security controls.
As the instructors are true experts in Windows security, advanced techniques using custom PowerShell scripts, private tools etc. will be used and handed out during the course.
The course will cover the following modules:
Module 1: Introduction
• Intelligence report - the latest threats and notes from the field
• Anatomy of APT's and targeted attacks
Module 2: Initial Recon
• Advanced information gathering
o Social engineering using social networking, emails and similar.
o Public and private harvesting using public resources and information leakage
• System reconnaissance
o Network and host-based enumeration
o System and service enumeration
o Vulnerability analysis
Module 3: Remote attacks
• The anatomy of exploitation
o Buffer owerflows
• Attack frameworks
• Password based attacks, passive and active
• Man in the middle attacks
Module 4: Web/SQL-based attacks
• The anatomy of web/SQL-exploitation
• Basic web/SQL injections
• Advanced web/SQL injections
• File upload attacks
• Various other web-based attacks
Module 5: Client-Side attacks
• Web-browser-based attacks
o Cross-site scripting attacks
o Cross-site request forgery
o DOM-based attacks
• Exploit-based attacks using attack frameworks
Module 6: Lateral Movement
• Remote access tools and trojans
• Lateral movement using dependencies
o Passing the hash
o Passing the dutchie
o Credential extraction and reuse including certificate stealing.
Module 7: Cloud based attacks
• The anatomy of cloud-based-exploitation
• Invisible virtualized guest attacks and data theft.
Module 8: Miscellaneous attacks
• Wireless attacks
• Physical attacks including attacks on encrypted laptops.
• Mobile platforms
CyberSec Defenses - Windows Platforms
2 days (Day 4-5)
In this course we will cover the latest features, tools and components that are available for defending your windows infrastructure and preventing cybercriminals from successfully compromising your systems and data.
The experts will share the tactics and techniques that they have implemented in government agencies, financial institutions and premier enterprises around the world.
By taking this course you will be armed with all the tools and knowledge needed to effectively defend your Windows infrastructure.
Module 1: Introduction
• Intelligence report - The latest features, tools and techniques from the field.
• Windows enterprise hardeing strategies.
Module 2:System hardening
• Security Policy configuration, security compliance and enterprise distribution
• System Security update strategies - Patch management
• Implementing applocker in the real world
Module 3: Enterprise Authentication and autorization
• PKI-based authentication
o Virtual Smartcards, smartscards
o Mechanism Authentication Assurance
• Active directoy autentication strategies
o Kerberos proxy
o Fine grained Password policies
o Managed service accounts
o Claims based authentication
o Dynamic access control
Module 4: Secure systems administration
• Powershell remoting
• Secure RDP
Module 5: Network security
o Domain isolation
o Server/service isolation
• Network Access Protection
• Advanced firewall
• Direct access
• Restrict NTLM
Module 6: Auditing
• Advanced auditing
Här kan du välja och läsa mer om vilka tillval som finns
Informator är ett utbildningsföretag som stärker individens, gruppens och organisationens konkurrensförmåga genom att underhålla, uppdatera och tillföra relevant kunskap inom IT. Sedan 1990 har informator utbildat många av de ledande företagen på den Nordiska marknaden. Tillsammans med vårt finska ägarbolag Soprano...