Featured image
Truesec pattern
Training
$3,385

Cybersecurity Threats and Defenses

Share

All About Windows Enterprise Security

A Windows-oriented master class developed and presented by two of the world’s foremost experts in IT security: Marcus Murray and Hasain Alshakarti. Both are Microsoft Enterprise Security MVPs and top speakers at numerous TechEds and other conferences around the world.

A unique hands-on lab for IT Pros and IT Managers, that covers all aspects of Windows Enterprise Security in regards to cyber attacks and defenses.

The training is divided in two parts, one part covers threats including APTs, hacker tools, and techniques used by cybercriminals and malware authors. The second part will teach you how to defend and secure a modern Windows environment using the latest and greatest built-in features and components (more info, go to “Detaljer”).

By participating in this course, you will fully understand the threats of today, and be able to implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world.

Level:
300-400

Course Objectives:
By taking this course you will be able to fully understand the threats of today and implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world. World-leading experts Marcus Murray and Hasain Alshakarti, both enterprise Security MVPs and TechEd top speakers will share their tools, tactics, strategies, and notes from the field.

Material:
Student manual
Tools

Details
This five-day course is the combination of the Cyber Sec Threats and Cyber Sec Defenses courses and the content is the same as described in both those courses below.

CyberSec Threats – Windows Platforms – 3 Days (Day 1-3)

In this course, we will cover recent tools and techniques used by cybercriminals and malware authors.
By taking this course you will understand the anatomy of current cyber attacks so which will give you an understanding on how to detect and prevent attacks on your infrastructure. An understanding of cyber attacks is also required in order to be able to implement the correct security controls.

As the instructors are true experts in Windows security, advanced techniques using custom PowerShell scripts, private tools etc. will be used and handed out during the course.

The course will cover the following modules:

Module 1: Introduction
• Intelligence report – the latest threats and notes from the field
• Anatomy of APT’s and targeted attacks

Module 2: Initial Recon
• Advanced information gathering
o Social engineering using social networking, emails and similar.
o Public and private harvesting using public resources and information leakage
• System reconnaissance
o Network and host-based enumeration
o System and service enumeration
o Vulnerability analysis

Module 3: Remote Attacks
• The anatomy of exploitation
o Buffer owerflows
• Attack frameworks
• Password based attacks, passive and active
• Man in the middle attacks

Module 4: Web/SQL-based Attacks
• The anatomy of web/SQL-exploitation
• Basic web/SQL injections
• Advanced web/SQL injections
• File upload attacks
• Various other web-based attacks

Module 5: Client-Side Attacks
• Web-browser-based attacks
o Cross-site scripting attacks
o Cross-site request forgery
o DOM-based attacks
• Exploit-based attacks using attack frameworks

Module 6: Lateral Movement
• Remote access tools and trojans
• Lateral movement using dependencies
o Passing the hash
o Passing the dutchie
o Credential extraction and reuse including certificate stealing.

Module 7: Cloud-Based Attacks
• The anatomy of cloud-based-exploitation
• Invisible virtualized guest attacks and data theft.

Module 8: Miscellaneous Attacks
• Wireless attacks
• Physical attacks including attacks on encrypted laptops.
• Mobile platforms

CyberSec Defenses – Windows Platforms – 2 Days (Day 4-5)

In this course, we will cover the latest features, tools, and components that are available for defending your windows infrastructure and preventing cybercriminals from successfully compromising your systems and data.

The experts will share the tactics and techniques that they have implemented in government agencies, financial institutions, and premier enterprises around the world.
By taking this course you will be armed with all the tools and knowledge needed to effectively defend your Windows infrastructure.

Module 1: Introduction
• Intelligence report – The latest features, tools and techniques from the field.
• Windows enterprise hardeing strategies.

Module 2: System Hardening
• Security Policy configuration, security compliance and enterprise distribution
• System Security update strategies – Patch management
• Implementing applocker in the real world
• Bitlocker

Module 3: Enterprise Authentication and Authorization
• PKI-based authentication
o Virtual Smartcards, smartscards
o Mechanism Authentication Assurance
• Active directoy autentication strategies
o RODC
o Kerberos proxy
o Fine grained Password policies
o Managed service accounts
o Claims based authentication
• Authorization
o Dynamic access control

Module 4: Secure Systems Administration
• WinRM
• Powershell remoting
• Secure RDP

Module 5: Network Security
• IPSEC
o Domain isolation
o Server/service isolation
• Network Access Protection
• Advanced firewall
• Direct access
• Restrict NTLM

Module 6: Auditing
• Advanced auditing

Enquire training

Online trainings

See all trainings
M365 Security Boost
Training
$750

M365 Security Boost

Application Security Testing and Mitigation for Developers and Testers
Training

Application Security Testing and Mitigation for Developers and Testers

Secure Coding Patterns
Training

Secure Coding Patterns

Implementing Microsoft 365 Security Solutions
Training
$1,895

Implementing Microsoft 365 Security Solutions

Managing Endpoints With Microsoft Intune
Training

Managing Endpoints With Microsoft Intune

Mobile Device Management Using Microsoft Intune
Training
$1,595

Mobile Device Management Using Microsoft Intune

Introduction to PowerShell
Training
$3,495

Introduction to PowerShell

Introduction to Windows 10 Management
Training

Introduction to Windows 10 Management

Social Engineering, the Human Side of Security [2 Days]
Training
$1,835

Social Engineering, the Human Side of Security [2 Days]

Cybersecurity Threats and Defenses in a Microsoft 365 Platform
Training
$4,995

Cybersecurity Threats and Defenses in a Microsoft 365 Platform

Stay ahead in cyber

Join 1000+ other cyber professionals that get monthly updates from us with the key things to know.

You might also like...

Go to Knowledge Hub