Processing your application. Please be patient while we make sure we receive every piece of it.
Information Security
IDesign Master Class: Hacking Windows Infrastructure
3 Day(s)
Course OverviewIn this workshop you will investigate the critical tasks for a high-quality penetration test. Well look at the most efficient ways to map a network and discover target systems and services. Once the systems are discovered, we will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of the authored and commercial tools. In the attack summary we will always go through the securing techniques. But exploits are not the only way to get to systems! We will go through the operating systems' build in problems and how they can be beneficial for hackers! One of the most important things to conduct the successful attack is to understand how the target works. To the bones! After that everything is clear and tool is just a matter of our need. The course that covers all aspects of Windows infrastructure security from the hacker's mind perspective! Our goal is to show you and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get to operating systems. After the course you will gain penetration tester's knowledge and tools. We really want you to go out from the class with the practical, ready-to-use knowledge what are the ways to get into the infrastructure. This is a deep dive course. It is a must-go for enterprise administrators, security officers and architects. Delivered by one of the best people in the market in the security field - with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions! The course has a form of intense workshop and you MUST stay awake just not to miss a thing! Trainer Paula Januszkiewicz is the world-known Security Expert. Loves to perform Penetration Tests, IT Security Audits and after all she says: 'harden'em all'! Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. ObjectivesIn this course, you will: • Learn how to misuse service accounts• Learn how to play with Direct Kernel Object Modification technique• Learn how about the hacking tools• Learn which techniques are used by modern malware• Learn how to use Advanced Persistent Threats• Learn how to fool common protection mechanisms• Learn how to misuse USB and other ports• Learn how to use offline access techniquesObjectives cont’d from page 1• Learn how to unlock BitLocker• Learn how to communicate through firewalls• Learn how to misuse Remote Access • Learn about DNS based attacks• Learn how to detect unsafe servers• Learn how to hack HTTPS• Learn how to distribute Denial of Service attacks• Learn about file format attacks for Microsoft Office, PDF and other file types• Learn how to use incorrect file servers' configuration• Learn about database server attacks• Learn about pass-the-Hash attacks• Learn how to steal the LSA Secrets• Learn about script based scanning• And...learn how to hack, hack & hack!AudienceEnterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.PrerequisitesTo attend this training you should have good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
Price: $2,870
To find out more available information
about this course, please contact us:

To find out more available information
about this course, please contact us:

To find out more available information
about this course, please contact us:


IDesign Master Class: Hacking WindowsInfrastructure


Module 1: Hacking Windows Platform

· Detecting unnecessary services

· Misusing service accounts

· Implementing rights, permissionsand privileges

· Direct Kernel Object Modification

Module 2: Top 50 tools: the attacker's best friends

· Practical walkthrough throughtools

· Using tools against scenarios

Module 3: Modern Malware

· Techniques used by modern malware

· Advanced Persistent Threats

· Fooling common protectionmechanisms

Module 4: Physical Access

· Misusing USB and other ports

· Offline Access techniques

· BitLocker unlocking

Module 5: Intercepting Communication

· Communicating through firewalls

· Misusing Remote Access

· DNS based attacks

Module 6: Hacking Web Server

· Detecting unsafe servers

· Hacking HTTPS

· Distributed Denial of Serviceattacks

Module 7: Data in-Security

· File format attacks for MicrosoftOffice, PDF and other file types

· Using incorrect file servers'configuration

· Basic SQL Server attacks

Module 8: Password attacks

· Pass-the-Hash attacks

· Stealing the LSA Secrets

Module 9: Hacking automation

· Misusing administrative scripts

· Script based scanning