Geek Week - Cyber Security Threats and Defenses

Understand the cyber threats of today, and be able to implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world.

Geek Week: Cyber Security Threats and Defenses A five days Geek Week with cyber security experts Hasain Alshakarti and Marcus Murray.

Book lab

  • Duration:
  • Price:
  • We don´t have this training scheduled right now. Let us know that you´re interested in this training using the form below.

All about Windows Enterprise Security.

A Windows oriented master class, developed and presented by two of the world’s foremost experts in IT security, Marcus Murray and Hasain Alshakarti. Both Microsoft Enterprise Security MVP’s and Top Speakers at several TechEd’s and other conferences around the world.

A Geek Week for IT Pro’s and IT Manager

All aspects of Windows Enterprise Security in regards to cyber attacks and defenses.

The training is divided in two parts, one is covering threats including APT’s, hacker tools and techniques used by cyber criminals and malware authors. The second part will teach you how to defend and secure a modern Windows environment using the latest and greatest built-in features and components.

Tailored training or a scheduled course?

We can help you or your team understand your specific skills and development needs. Send us a request, and we’ll guide you, or reserve a spot on our next scheduled course below.

 

Level:
300-400

Target goals:
By taking this course you will be able to fully understand the threats of today and implement security controls that are proven to effectively defend your Microsoft infrastructure in the real world. World leading experts Marcus Murray & Hasain Alshakarti, both enterprise Security MVP’s and TechEd top speakers will share their tools, tactics, strategies and notes from the field.

Material:
Student manual
Tools

Details
This 5 day course is the combination of the Cyber Sec Threats and Cyber Sec Defenses courses and the content is the same as described in both those courses below..

CyberSec Threats – Windows Platforms
3 days (Day 1-3)

In this course we will cover recent tools and techniques used by cybercriminals and malware authors.
By taking this course you will understand the anatomy of current cyber-attacks so which will give you an understanding on how to detect and prevent attacks on your infrastructure. The understanding of cyber-attacks are also required in order to be able to implement the correct security controls.

As the instructors are true experts in Windows security, advanced techniques using custom PowerShell scripts, private tools etc. will be used and handed out during the course.

The course will cover the following modules:

Module 1: Introduction
• Intelligence report – the latest threats and notes from the field
• Anatomy of APT’s and targeted attacks

Module 2: Initial Recon
• Advanced information gathering
o Social engineering using social networking, emails and similar.
o Public and private harvesting using public resources and information leakage
• System reconnaissance
o Network and host-based enumeration
o System and service enumeration
o Vulnerability analysis

Module 3: Remote attacks
• The anatomy of exploitation
o Buffer owerflows
• Attack frameworks
• Password based attacks, passive and active
• Man in the middle attacks

Module 4: Web/SQL-based attacks
• The anatomy of web/SQL-exploitation
• Basic web/SQL injections
• Advanced web/SQL injections
• File upload attacks
• Various other web-based attacks

Module 5: Client-Side attacks
• Web-browser-based attacks
o Cross-site scripting attacks
o Cross-site request forgery
o DOM-based attacks
• Exploit-based attacks using attack frameworks

Module 6: Lateral Movement
• Remote access tools and trojans
• Lateral movement using dependencies
o Passing the hash
o Passing the dutchie
o Credential extraction and reuse including certificate stealing.

Module 7: Cloud based attacks
• The anatomy of cloud-based-exploitation
• Invisible virtualized guest attacks and data theft.

Module 8: Miscellaneous attacks
• Wireless attacks
• Physical attacks including attacks on encrypted laptops.
• Mobile platforms

CyberSec Defenses – Windows Platforms
2 days (Day 4-5)

In this course we will cover the latest features, tools and components that are available for defending your windows infrastructure and preventing cybercriminals from successfully compromising your systems and data.
The experts will share the tactics and techniques that they have implemented in government agencies, financial institutions and premier enterprises around the world.
By taking this course you will be armed with all the tools and knowledge needed to effectively defend your Windows infrastructure.

Module 1: Introduction
• Intelligence report – The latest features, tools and techniques from the field. 
• Windows enterprise hardeing strategies.

Module 2:System hardening
• Security Policy configuration, security compliance and enterprise distribution
• System Security update strategies – Patch management
• Implementing applocker in the real world
• Bitlocker

Module 3: Enterprise Authentication and autorization
• PKI-based authentication
o Virtual Smartcards, smartscards
o Mechanism Authentication Assurance
• Active directoy autentication strategies
o RODC
o Kerberos proxy
o Fine grained Password policies
o Managed service accounts
o Claims based authentication
• Authorization
o Dynamic access control

Module 4: Secure systems administration
• WinRM
• Powershell remoting
• Secure RDP

Module 5: Network security
• IPSEC
o Domain isolation
o Server/service isolation
• Network Access Protection
• Advanced firewall
• Direct access
• Restrict NTLM

Module 6: Auditing
• Advanced auditing

Book lab

  • Duration:
  • Price:
  • We don´t have this training scheduled right now. Let us know that you´re interested in this training using the form below.