Processing your application. Please be patient while we make sure we receive every piece of it.
Information Security
IDesign Master Class: Securing Windows Infrastructure
3 Day(s)
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
Course OverviewFor so many years we have been asked to create a course like that! The course that is just a great workshop that teaches how to implement securing technologies one by one. The course that covers all aspects of Windows infrastructure security that everybody talks about, but during the course you will learn how to implement them! Our goal is to teach you how to design and implement secure infrastructure based on the reasonable balance between security and comfort with great knowledge attacker's possibilities. We really want you to go out from the class with the practical, ready-to-use and holistic approach and skills to secure your infrastructure. This is a deep dive course on infrastructure services security. It is a must-go for enterprise administrators, security officers and architects. Delivered by one of the best people in the market in the security field - with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions. The course has a form of intense workshop! During these 3 days we provide the caffeine candies - the course is really intense and you MUST stay awake just not to miss a thing! Trainer Paula Januszkiewicz is the world-known Security Expert. Loves to perform Penetration Tests, IT Security Audits and after all she says: 'harden'em all'! Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. ObjectivesIn this course, you will: • Learn how to design secure Windows infrastructure• Learn where to secure Windows platform and implement protection mechanisms• Learn how to define and disable unnecessary services• Learn how to implement secure service accounts• Learn how to implement appropriate rights, permissions and privileges• Learn how to sign the drivers• Learn about malware protection• Learn about techniques used by modern malware• Learn about malware investigation techniques• Learn how to analyze cases of real malware• Learn how to manage physical security• Learn how to manage port security: USB, FireWire and other• Learn how to mitigate offline access• Learn how to implement and manage BitLocker• Learn how to deploy and configure Public Key Infrastructure • Learn about role and capabilities of the PKI in the infrastructureObjectives cont’d from page 1• Learn how to design PKI architecture• Learn about PKI Deployment - Best practices• Learn how to configure secure communication• Learn how to deploy and manage Windows Firewall - advanced and useful features • Learn how to deploy and configure IPsec• Learn how to deploy secure remote access (VPN, Direct Access, Workplace Join, RDS Gateway)• Learn how to correctly deploy DNS and DNSSEC• Learn how to secure Web Server and how to configure IIS features for security• Learn how to deploy Server Name Indication and Centralized SSL Certificate Support• Learn how to monitor Web Server resources and performance • Learn how to deploy Distributed Denial of Service attack prevention• Learn how to deploy Network Load Balancing and Web Farms• Learn how to provide Data Security and Availability• Learn how to design data protection for Microsoft Office, PDF and other file types• Learn how to deploy Active Directory Rights Management ServicesThis workshop is VERY intense - our motto is: get your hands into the infrastructure - now and get practice, more practice and even more practice! AudienceEnterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.PrerequisitesTo attend this training you should have good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
Price: $2,870
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com

IDesign Master Class: SecuringWindows Infrastructure

Topics

Module 1: Designing Secure WindowsInfrastructure

On the market there are thousandssolutions available to enrich security in our infrastructure. The idea of thismodule is to provide the complete knowledge and to gain the holistic approachfor the areas that can be secured and for the measures that can be implemented.

Module 2: Securing Windows Platform

  • Defining and disabling unnecessary services
  • Implementing secure service accounts
  • Implementing rights, permissions and privileges
  • Driver signing

Module 3: Malware Protection

  • Techniques used by modern malware
  • Malware investigation techniques
  • Analyzing cases of real malware
  • Implementing protection mechanisms

Module 4: Managing Physical Security

  • Managing port security: USB, FireWire and other
  • Mitigating Offline Access
  • Implementing and managing BitLocker

Module 5: Deploying and configuring Public KeyInfrastructure

  • Role and capabilities of the PKI in the infrastructure
  • Designing PKI architecture
  • PKI Deployment - Best practices

Module 6: Configuring Secure Communication

  • Deploying and managing Windows Firewall - advanced and useful features
  • Deploying and configuring IPsec
  • Deploying secure Remote Access (VPN, Direct Access, Workplace Join, RDS Gateway)
  • Deploying DNS and DNSSEC

Module 7: Securing Web Server

  • Configuring IIS features for security
  • Deploying Server Name Indication and Centralized SSL Certificate Support
  • Monitoring Web Server resources and performance
  • Deploying Distributed Denial of Service attack prevention
  • Deploying Network Load Balancing and Web Farms

Module 8: Providing Data Security and Availability

  • Designing data protection for Microsoft Office, PDF and other file types
  • Deploying Active Directory Rights Management Services
  • Deploying File Classification Infrastructure and Dynamic Access Control
  • Configuring a secure File Server
  • Hardening basics for Microsoft SQL Server
  • Clustering selected Windows services

Module 9: Mitigating the common password attacks

  • Performing Pass-the-Hash attack and implementing prevention
  • Performing the LSA Secrets dump and implementing prevention

Module 10: Automating Windows Security

  • Implementing Advanced GPO Features
  • Deploying Software Restriction: Applocker
  • Advanced Powershell for administration

SITE MAP