Windows Infrastructure Security

Become an Expert in Windows Infrastructure Security with Certification!

Are you ready to elevate your cybersecurity skills in Windows environments? Our course offers in-depth insights into Windows Operating Systems and Active Directory, all from a cybersecurity perspective. This course is the culmination of 8 years of dedicated knowledge gathering and expertise.

Whether you are a Security Engineer looking for unique knowledge, a System Administrator seeking career advancement, or an IT Manager wanting to provide your team with the necessary training to protect against cyber threats, this course is designed to meet your needs.

14-Day Money-Back Guarantee, if you are not satisfied with the course.

$249

Key Highlights:
  • Course Duration: Over 16 hours of content
  • Pre-recorded Demonstrations: Almost 5 hours of practical examples
  • Certification Included: Upon successful completion, receive a certificate recognizing your expertise.
  • Free Content: Guides, Learning Path, AD Scanner, …,
  • Free Notification Service: Get notified about Zero Days and what to do about it.
  • 14-Day Money-Back Guarantee: If you are not satisfied, no requirements
  • Main Chapters:
    • Windows Security: Learn essential security practices for Windows systems.
    • Active Directory Security: Explore strategies to protect Active Directory.
    • Infrastructure Security: Discover how to integrate technical and organizational security measures to protect Windows infrastructure.

Ready to enhance your expertise? Check out the detailed syllabus and video samples below!


 
What You’ll Learn

From the fundamentals to advanced and unique topics of Windows OS and Active Directory, you will:

  • Understand Windows OS and its crucial components.
  • Gain in-depth knowledge of Active Directory.
  • Learn what attackers are after and how to protect against them.
  • Stand in the hacker’s shoes to understand their tactics.
  • Learn how to natively detect attackers.
  • Identify vulnerabilities in Active Directory.
  • Search for escalation paths using BloodHound.
  • Build a Tiering Model and implement Security Baselines.
  • Integrate process security-related controls into your infrastructure.

 
Who Is This Course For?

This course caters to a diverse audience, including:

  1. Onboarding Programs: Speed up your onboarding process and get your engineers working faster and more effectively.
  2. Cybersecurity Enthusiasts: If you’re intrigued by the world of cybersecurity, this course is perfect for you.
  3. Career Advancers: Whether you’re looking to boost your career or transition into cybersecurity, we’ve got you covered.
  4. Specific Roles:
    • Helpdesk Operators: Advance your career by transitioning into cybersecurity.
    • Windows Administrators: Enhance your skills in securing Windows environments.
    • Active Directory Specialists: Dive deep into AD security practices.
    • System Engineers: Learn how to protect critical infrastructure.
    • Cybersecurity Experts and Architects: Strengthen your expertise in safeguarding organizations.
    • IT Managers and Companies: Utilize our courses for onboarding programs and validating administrators’ skills.


Course video samples:

Agenda

Theory

Demo


Course Syllabus

This chapter delves into the Windows Operating System from a cybersecurity perspective. Explore essential topics to bolster your understanding of securing Windows environments.

Basics:

    • Explore different Windows OS editions, including Windows Server Core and Nano.
    • Understand security boundaries such as User Account Control (UAC), Access Control Lists (ACL), and various entities.

System Protection:

    • Discover system security features in Windows OS, such as Secure Boot and Trusted Boot.
    • Learn about application allowlisting and other protective measures.

Secrets Location:

    • Investigate where user, computer, and service secrets are stored.
    • Understand both potential risks (how they can be stolen) and protective strategies.

Remote Access:

    • Learn how to manage Windows operating systems remotely.
    • Explore benefits and considerations for remote management.

Windows Firewall:

    • Gain insights into how Windows Firewall operates.
    • Discover ways to work with it effectively without disabling it entirely.

Windows Event Log:

    • Understand when and how to use Windows Event log.
    • Configure it to obtain relevant information.
    • Explore the extension of Windows event log through Sysmon.

Gain a deep understanding of Active Directory, uncover vulnerabilities, and explore relevant services.

Basics:

    • Understand how Active Directory works and explore its components.
    • Topics include hierarchy, trusts, FSMO roles, RODC (Read-Only Domain Controller), and service accounts.

Authentication:

    • Dive into the background of authentication protocols Kerberos and NTLM.
    • Learn how to configure and enhance their security.
    • Explore authentication policies.

Group Policy Objects (GPO):

    • Master the proper usage of GPOs and understand how they function.

Active Directory Certificate Services (AD CS):

    • Explore asymmetric cryptography within the Windows Infrastructure.
    • Understand the architecture of AD CS and best practices for its administration.

Vulnerabilities:

    • Investigate common vulnerabilities and persistent attack methods in Active Directory.
    • Learn how to search for vulnerabilities and perform security scans.
    • Topics include AD certificate services ESC vulnerabilities, Kerberos delegation, Entrust ID Connect server, misconfigured ACLs, DCSync, hidden accounts, and more.

Attack Paths:

    • Utilize BloodHound to discover escalation paths within Active Directory.
    • Observe how attackers proceed in the attack process.

This chapter explores the integration of technical and organizational security measures to protect Windows infrastructure. It covers essential strategies like the Tiering Model, Security Baselines, and key organizational processes.

Tiering Model:

    • Understand what a tiering model is and why it’s crucial for effective security.
    • Learn how to implement it within your infrastructure.

Security Baselines:

    • Explore the concept of security baselines and their significance.
    • Discover practical steps for implementing security baselines effectively.

Organizational Measures:

    • Recognize that security isn’t just about technical controls—it also involves organizational processes.
    • Dive into process security, covering risk assessment, access control, monitoring, patching, and more.
    • Highlight the critical role of end users (people) in maintaining security.