Reviewing Threats of Today and Tomorrow

Join this exclusive one day workshop for IT Pros and get ready for a deep-dive and super intense time hosted by Paula Januszkiewicz! Seats are limited so be fast!

Private course inquiry

  • This course is offered only for corporations privately. Please contact to sales by calling +358 42 42 2121 or by filling the form below.

Join this exclusive one day workshop with Paula Januszkiewicz

We want to show you ways of preventing execution of malicious code and in case it got executed, we want to show you how to limit the impact. Also, we will talk about how and what to monitor in your environment, in order to be able effectively discover malicious activity as it is not that uncommon for companies to be under attack for quite a long time before realizing you have been hacked.

Join first level of this workshop for IT Pros and get ready for a deep-dive and super intense time!

As CQURE, we are performing countless penetration tests and audits and because of that we acquired quite unique and comprehensive view on how security posture across many different companies looks like. From those experiences we have been able to derive what the biggest threats and common misconfigurations are and obtain quite clear view on what kind of impacts your company can expect. We also see many misconfigurations when it comes to code execution prevention and in many cases, we can see employees using privileged accounts for their daily work. This is exactly what we want to talk about during this training!

Who is this workshop recommended

Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.

Materials

Authors’ unique tools, presentation slides with notes, workshop instructions.

Certification

At the end participants will receive the online Certificate of attendance signed by the CQURE Speaker.

 

PAULA says: Pure coolness with a value! This training shows how to overuse mistakes that are made nowadays in the infrastructures. It is great to learn from other people’s mistakes, right?

Full Agenda for the workshop

Module 1: Threats of today and tomorrow

This module demonstrates the importance of security mechanisms on real life examples and allows for better understanding of the impact that these attacks may have on your organization.
1. Devastating cyber incidents and how to learn from them
2. Impact of advanced malware on the enterprise
3. Security trends for 2020
4. Attack kill-chain and techniques
5. Techniques used by modern malware
6. Social engineering
7. Attacks on identity
8. Microsoft Intune

Module 2: Building Cybersecurity Strategy – Bridging the Gap Between Security and IT to Build Better Security Response

Security Operations teams are dependent on IT and supporting systems to provide them with the required information and processes enabling quick security response. In practice, executing the investigation around the kill chain requires lots of resources. Especially because the idea of a whole kill chain has changed over years to reach its current form. In this part you will learn how to improve the cooperation in between the teams and how to stop the attack before it even happens and how to identify is after it happens.
1. Incident Handling, and Incident Management
2. Incident Response Policy and Plan Checklist
3. Incident Management with Microsoft Defender Advanced Threat Protection (MD ATP)

Module 3: Office 365 Advanced Security for GDPR and Compliance

GDPR is a regulation in EU law on data protection and privacy that affects organizations all over the world. Huge fines for non-compliance or violation pushes companies to adopt to new standards. Join us and explore advanced security features which Office 365 offers. Understand how you can get even more out of your existing subscription in this demo intense module. Everything with an importance of GDPR and Compliance with the law and standards in the background. In this module we will focus on:
1. Office 365 advanced security – Office 365 ATP
2. Office 365 data protection
3. GDPR requirements overview
4. Office 365 features for GDPR
5. Office 365 Data Loss Prevention
6. Azure Information Protection

Module 4: Infrastructure Security – attacking and Securing Windows Network Solutions

Starting from simple network sniffing, ending up with advanced network monitoring.
1. Port scanning techniques
2. Vulnerability scanning
3. Lateral movement
4. Internal network attacks
5. Password attacks
6. Multi Factor Authentication with Azure
7. Detecting attacks with Machine Learning
8. Advanced Threat Analytics (ATA)

 

Keywords: ,

 

Places left:
No participant limit
Ask for an offer

Related products

The course teaches infrastructure security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. To make sure that all participants gain the necessary infrastructure security knowledge, our classes have an intensive hands-on format.
This course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them! Course is a great workshop that teaches how to implement securing technologies one at a time. Learn online with Paula Januszkiewicz! Be fast and secure your seat - with a code KESA10 - you get 10% discount. 
It is a must-go for enterprise administrators, security officers and architects. Delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions. Join Paula Januszkiewiczc in this exclusive Masterclass!

Responsible person


Mika Seitsonen

Mika Seitsonen

  • mika.seitsonen@sovelto.fi