Processing your application. Please be patient while we make sure we receive every piece of it.
Information Security
Advanced Windows Security
3 Day(s)
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
Course OverviewThis is a 3-days deep dive! The course teaches advance Windows operating system security, based on Windows 7, Windows 8 and Windows Server 2008 R2, with comparison to older Microsoft operating systems.ObjectivesDuring Advancing Windows Security Master Classes you will learn how to: • Configure Windows Internals security (advanced) • Perform advanced troubleshooting • Configure efficient monitoring and what are the monitoring points • Establish an operating system protection • Get access to Windows in unauthorized way AudienceAny experienced network administrator and infrastructure architect, developer that would like to become familiar with security internals.Prerequisites - none
Price: $2,757
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com

AdvancedWindows Security

Topics

Module 1:Windows Internals

· Introduction to the Windows 7/ Windows "8"/ WindowsServer security concepts

· Operating system files security

· Passwords security (techniques of getting passwords andtechniques of cracking)

· Process Monitoring (Advancing Process Explorer, Process Monitorand other tools)

· Integrity Levels

· Session Zero

· Priorities in operating system (influencing the operating systemcontinuity)

· Kernel Mode vs. User-Mode Execution

· Driver Signing (Windows Driver Foundation)

· Advanced privileges for operating system objects and rights

· User Account Control Virtualization

· Registry Internals

· Auditing privileges with PowerShell

· PowerShell for Security (deep-dive into Windows Internals) +Windows "8" update

· WMI for Security



Module 2:Infrastructure Security Solutions

· AppLocker & implementation techniques

· BitLocker & implementation techniques

· Advancing Security Configuration Wizard

· Advancing IPSec

· Advancing GPO

· Practicing Diagnostic and Recovery Toolkit

· Networking Services Security (DNS, DHCP, SNMP, SMTP and other)

· Volume Shadow Copy Service from the security perspective

· Tools


Module 3: Debugging & auditing

· Available Debuggers

· Working with Symbols

· Process Debugging

· Kernel-ModeDebugging

· User-Mode Debugging

· Setting up kernel debugging with a virtual machine as the target

· Debugging the booting process

· Crash Dump Analysis

· Auditing tools and techniques

· Monitoring Registry Activity

· Rootkit Detection


Module 4: Points of Entry Analysis

· Offline Access

· Linux BackTrack /other tools vs. Windows Security: "Letshave fun!"

· Unpatched Windows and assigned attacks

· Advanced Network Sniffing

· Fingerprinting Techniques

· Enumeration Techniques

· Domain Controller Attacks

· Services Security

· Man-in-The Middle Attacks


Module 5: Wireless Hacking

· Wireless technology recognition

· Wireless fingerprinting

· Wireless hacking ideas and demos

· Optimizing wireless hacking

· Protecting wireless networks

SITE MAP