All About Windows Enterprise Security
A Windows-oriented master class developed and presented by two of the world’s foremost experts in IT security: Marcus Murray and Hasain Alshakarti. Both are Microsoft Enterprise Security MVPs and top speakers at numerous TechEds and other conferences around the world.
A unique hands-on lab for IT Pros and IT Managers, that covers all aspects of Windows Enterprise Security in regards to cyber attacks and defenses.
The training is divided in two parts, one part covers threats including APTs, hacker tools, and techniques used by cybercriminals and malware authors. The second part will teach you how to defend and secure a modern Windows environment using the latest and greatest built-in features and components (more info, go to “Detaljer”).
By participating in this course, you will fully understand the threats of today, and be able to implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world.
Level:
300-400
Course Objectives:
By taking this course you will be able to fully understand the threats of today and implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world. World-leading experts Marcus Murray and Hasain Alshakarti, both enterprise Security MVPs and TechEd top speakers will share their tools, tactics, strategies, and notes from the field.
Material:
Student manual
Tools
Details
This five-day course is the combination of the Cyber Sec Threats and Cyber Sec Defenses courses and the content is the same as described in both those courses below.
CyberSec Threats – Windows Platforms – 3 Days (Day 1-3)
In this course, we will cover recent tools and techniques used by cybercriminals and malware authors.
By taking this course you will understand the anatomy of current cyber attacks so which will give you an understanding on how to detect and prevent attacks on your infrastructure. An understanding of cyber attacks is also required in order to be able to implement the correct security controls.
As the instructors are true experts in Windows security, advanced techniques using custom PowerShell scripts, private tools etc. will be used and handed out during the course.
The course will cover the following modules:
Module 1: Introduction
• Intelligence report – the latest threats and notes from the field
• Anatomy of APT’s and targeted attacks
Module 2: Initial Recon
• Advanced information gathering
o Social engineering using social networking, emails and similar.
o Public and private harvesting using public resources and information leakage
• System reconnaissance
o Network and host-based enumeration
o System and service enumeration
o Vulnerability analysis
Module 3: Remote Attacks
• The anatomy of exploitation
o Buffer owerflows
• Attack frameworks
• Password based attacks, passive and active
• Man in the middle attacks
Module 4: Web/SQL-based Attacks
• The anatomy of web/SQL-exploitation
• Basic web/SQL injections
• Advanced web/SQL injections
• File upload attacks
• Various other web-based attacks
Module 5: Client-Side Attacks
• Web-browser-based attacks
o Cross-site scripting attacks
o Cross-site request forgery
o DOM-based attacks
• Exploit-based attacks using attack frameworks
Module 6: Lateral Movement
• Remote access tools and trojans
• Lateral movement using dependencies
o Passing the hash
o Passing the dutchie
o Credential extraction and reuse including certificate stealing.
Module 7: Cloud-Based Attacks
• The anatomy of cloud-based-exploitation
• Invisible virtualized guest attacks and data theft.
Module 8: Miscellaneous Attacks
• Wireless attacks
• Physical attacks including attacks on encrypted laptops.
• Mobile platforms
CyberSec Defenses – Windows Platforms – 2 Days (Day 4-5)
In this course, we will cover the latest features, tools, and components that are available for defending your windows infrastructure and preventing cybercriminals from successfully compromising your systems and data.
The experts will share the tactics and techniques that they have implemented in government agencies, financial institutions, and premier enterprises around the world.
By taking this course you will be armed with all the tools and knowledge needed to effectively defend your Windows infrastructure.
Module 1: Introduction
• Intelligence report – The latest features, tools and techniques from the field.
• Windows enterprise hardeing strategies.
Module 2: System Hardening
• Security Policy configuration, security compliance and enterprise distribution
• System Security update strategies – Patch management
• Implementing applocker in the real world
• Bitlocker
Module 3: Enterprise Authentication and Authorization
• PKI-based authentication
o Virtual Smartcards, smartscards
o Mechanism Authentication Assurance
• Active directoy autentication strategies
o RODC
o Kerberos proxy
o Fine grained Password policies
o Managed service accounts
o Claims based authentication
• Authorization
o Dynamic access control
Module 4: Secure Systems Administration
• WinRM
• Powershell remoting
• Secure RDP
Module 5: Network Security
• IPSEC
o Domain isolation
o Server/service isolation
• Network Access Protection
• Advanced firewall
• Direct access
• Restrict NTLM
Module 6: Auditing
• Advanced auditing