Pure coolness with a value! This training shows how to overuse mistakes that are made nowadays in the infrastructures. It is great to learn from other people’s mistakes, right?
We connected the two of our most popular cybersecurity courses to create a totally new quality. While it is perfectly reasonable to take only one of these courses, when properly mixing the knowledge from both – penetration testing and forensics – you simply obtain added value! Extending penetration tests with stealth techniques? Trying to find your own traces during investigations? We have it covered. Taking both courses together maybe won’t give you more knowledge about the tools or techniques than taking them separately, but you’ll be able to look at these topics from the significantly wider perspective.
You will enjoy it! The course teaches infrastructure security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around professional penetration testing and security awareness in the business and IT fields. To make sure that all participants gain the necessary infrastructure security knowledge, our classes have an intensive hands-on format.
All labs are always up to date and have 3 levels of difficulty. They can be easily adjustable to the overall level of the group. Every exercise is supported with lab instructions and multiple tools, both traditional and specialized. CQURE trainers recommend students have some knowledge of security concepts, such as operating system services and architecture. However, all required concepts will be covered throughout the course.
The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, people, the most valuable resource, are not always aware of the level of security in their companies, possible points of entry, how operating systems are attacked, and how to protect the infrastructure from successful attacks which are sometimes caused by configuration mistakes. Understanding internal OS protection mechanisms and services/roles completely provides a huge impact on the whole infrastructure security level. Unfortunately, the problem is... rarely anyone has this impact!
This is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indicators of the attack, incident handling also daily servicing on SIEM platform. We will also walk through the advanced access rights, password mechanisms, windows internals, PowerShell usage for security purposes, gaining unauthorized access, advanced DNS configuration and common configuration mistakes, forensics techniques, Active Directory security, IIS Security, debugging, advanced monitoring and troubleshooting and much more! Topics covered during this training will help you to walk in hackers’ shoes and evaluate your infrastructure from their point of view.
The training focuses on detecting, responding, and resolving computer security incidents and covers the following security techniques:
It is a must-go for enterprise administrators, security officers and architects. Delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.
To attend this training you should have a good hands-on experience in administering Windows infrastructure. At least 8 years in the field is recommended.
Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
Author’s unique tools, over 300 pages of exercises and presentations slides with notes.