Featured image
Truesec pattern
Training

Secure IT Administration-Privileged Access Management Using JIT and JEA

Share

Through countless security tests and intrusion investigations, we know how critical it is to protect highly privileged accounts in order to protect the IT environment.

In this two-day lab, we will teach you to set up a modern, safe, and effective methodology for managing your AD as well as infrastructure. Take advantage of the newest security features offered in Active Directory hardening your domain and gaining login control in your infrastructure. How to design and model with Just in Time (JIT), Remote Management tools, and the Basics of Just Enough Administration (JEA).

The security expert Daniel Ulrich at Truesec examines the various security models for curing AD, Shadow Forest’s design, and time-based access, combined with a modern role-based model with PowerShell.

Tailored Training or a Scheduled Course?

We can help you or your team understand your specific skills and development needs. Send us a request, and we’ll guide you, or reserve a spot on our next scheduled course below.

Target Audience
Administrators of Active Directory and Identity Management

Prerequisite Knowledge
Basic knowledge of AD, Windows & PowerShell

Course Objectives
You will learn a modern, safe, and efficient IT administration through the implementation of Microsoft’s latest methodology and technology. Just in Time (JIT) and Just Enough Administration (JEA).

Material
Lab manual

Details
In the introduction, we review how a classic management model looks. We start with an existing AD environment and look at how previously used delegation and management of the environment to highlight the shortcomings in this and how attackers utilize this model to take control of the environment.

In two days, we will review and identify what you can use in Windows Server 2016 and use in an existing environment to achieve a safer management model with modern technologies such as Time-based Access and PowerShell delegation model.

You will also learn how to combine the old and new models in a transition period to eventually phase out the old role-based access model.

• News in Windows Server 2016 AD
• Classical delegation
• Just in Time Administration (JIT)
• Just Enough Administration (JEA)
• Local Administrator Password Solution (LAPS)
• Hardening of DCs and High-Priv groups
• Secure Workstations

This lab provides you with everything you need to implement a modern, safe, and efficient management model.

Enquire training

Online trainings

See all trainings
M365 Security Boost
Training
$750

M365 Security Boost

Application Security Testing and Mitigation for Developers and Testers
Training

Application Security Testing and Mitigation for Developers and Testers

Secure Coding Patterns
Training

Secure Coding Patterns

Implementing Microsoft 365 Security Solutions
Training
$1,895

Implementing Microsoft 365 Security Solutions

Managing Endpoints With Microsoft Intune
Training

Managing Endpoints With Microsoft Intune

Mobile Device Management Using Microsoft Intune
Training
$1,595

Mobile Device Management Using Microsoft Intune

Introduction to PowerShell
Training
$3,495

Introduction to PowerShell

Introduction to Windows 10 Management
Training

Introduction to Windows 10 Management

Social Engineering, the Human Side of Security [2 Days]
Training
$1,835

Social Engineering, the Human Side of Security [2 Days]

Cybersecurity Threats and Defenses in a Microsoft 365 Platform
Training
$4,995

Cybersecurity Threats and Defenses in a Microsoft 365 Platform

Stay ahead in cyber

Join 1000+ other cyber professionals that get monthly updates from us with the key things to know.

You might also like...

Go to Knowledge Hub