Featured image
Truesec pattern
Training

Computer Crime Training: Microsoft Network Attacks

Share

You will see how cybercriminals exploit vulnerabilities and misconfigurations in a modern Windows infrastructure and how to circumvent the latest security measures in the Windows platform.

This is a hands-on lab where you get to experiment with hacking techniques in a realistic Windows environment. The experts will guide you through the process and methodology followed during the attacks. You will use a combination of sophisticated attack platforms, public hacking tools, as well as Truesec's own internal tools.

Tailored Training or a Scheduled Course?

We can help you or your team understand your specific skills and development needs. Send us a request, and we’ll guide you, or reserve a spot on our next scheduled course below.

Level

300

Target Audience

Technicians and technical decision-makers with an interest in IT security and developers who want a deeper understanding of infrastructure-based attacks.

Prerequisite Knowledge

Basic TCP/IP and basic Windows administration.

Course Objective

To raise awareness regarding security threats and challenges in the Microsoft world as IT professionals. As a participant, you will get a good understanding of how criminals attack Microsoft networks, and what tools and techniques they use.

Material

2046,2015,2027,2068,2055

Details

Insight into how criminal attackers are compromised into systems is determined to maintain a secure IT environment.

During three intense days, you will carry out a large number of practical exercises against a realistic lab environment.

Examples of subtraction:
– Mapping of internet presence
– Network scanning
– Automated password attacks
– Take over systems by exploiting different types of deficiencies
– Avoiding traffic and passwords on switched networks
– Extract different types of password hashes from system
– Install backdoors, trojans and rootkits
– Manage keyloggers
– Manipulate logs
– Break into Active Directory
– Advanced password scrambling
– Take advantage of pass-the-hash technology
– Perform pass-the-dutchie technician
– Attack web servers
– Attack remotely services
….and much more.

Enquire training

Online trainings

See all trainings
M365 Security Boost
Training
$750

M365 Security Boost

Application Security Testing and Mitigation for Developers and Testers
Training

Application Security Testing and Mitigation for Developers and Testers

Secure Coding Patterns
Training

Secure Coding Patterns

Implementing Microsoft 365 Security Solutions
Training
$1,895

Implementing Microsoft 365 Security Solutions

Managing Endpoints With Microsoft Intune
Training

Managing Endpoints With Microsoft Intune

Mobile Device Management Using Microsoft Intune
Training
$1,595

Mobile Device Management Using Microsoft Intune

Introduction to PowerShell
Training
$3,495

Introduction to PowerShell

Introduction to Windows 10 Management
Training

Introduction to Windows 10 Management

Social Engineering, the Human Side of Security [2 Days]
Training
$1,835

Social Engineering, the Human Side of Security [2 Days]

Cybersecurity Threats and Defenses in a Microsoft 365 Platform
Training
$4,995

Cybersecurity Threats and Defenses in a Microsoft 365 Platform

Stay ahead in cyber

Join 1000+ other cyber professionals that get monthly updates from us with the key things to know.

You might also like...

Go to Knowledge Hub