Event Profile

Hardening Windows Networks - POSTPONED

Date(s):
August 24 — 27, 2021
Venue:
Online
Description:

Note:

This event has been postponed. For questions or to find out about future training opportunities, please contact Yara Amberson at (360) 816-1445 or yara@nwppa.org.

Who Should Attend:

Network, server, desktop, and security administrators as well as management-level individuals interested in this topic.

Webinar Overview:

This is a four-day, hands-on security course that teaches students how to harden, monitor, and protect Microsoft Windows-based networks.

Based on more than 15 years of security assessment and penetration testing experience, this course goes beyond theory and best practices and delivers proven, field-tested solutions for mitigating, monitoring, and protecting Microsoft Windows-based networks.

This course takes place in a hands-on environment that resembles a real-world network consisting of Windows servers and workstations, Microsoft Exchange, Microsoft SQL Server, Active Directory, Kali Linux, and more. You will learn effective countermeasures to defend against common attack tools and techniques. Upon completion of the course, you will be able to apply operating system and Active Directory hardening techniques, mitigate legacy software risks, and design tolerant networks that are resistant to present and future threats.

On the first day, you will learn the most common attack techniques. Digital Boundary Group's custom, free, and open source tools are used to enumerate, and exploit Windows hosts found in our virtual network.

Days 2 and 3 will focus on attack mitigation using field-proven hardening techniques found in Windows, Active Directory Group Policy and implementation of free mitigation tools published by Microsoft and Oracle. You will install and configure a host and network intrusion detection system utilizing Syslog, Snort, and Windows Events. You will be able to export the configuration files for easy deployment in your own networks.

On the last day, you will take part in a final lab scenario consisting of two phases. Phase One will test your ability to implement a host and network intrusion detection system on a virtual Windows network. You will need to identify intrusion attempts by running a set of automated attacks. Phase Two will test your ability to harden a virtual Windows network using the various techniques learned during the class. A set of automated attacks will attempt to break into the network, indicating success or failure of successful hardening.

Webinar Recordings:

The course is only available live; no recording will be made available.

Webinar Instructor:

Digital Boundary Group

Webinar Schedule:

The webinars will be held from 8 a.m. to 3:30 p.m. Pacific Time each day. Attendees will be admitted 15 minutes before each session begins.

How to Participate:

Instructions will be emailed to attendees within 12 hours of the webinar and we recommend that you test the link to the meeting as soon as you get the instructions. The webinar is best viewed using Chrome as your browser. We recommend that you use a landline for both your phone and your internet connections.

This registration is for one person to attend. We manage our webinars on an honor-system basis; if more than one person from a utility wishes to attend, each is to register separately.

Webinar Fees:

Utility Member Rate: $1,880
Associate Member Rate: $2,820
Non-Member Rate: $5,640

Cancellation Policy:

Cancellations are accepted with a full refund as follows:

For webinars and virtual classes, if the request is made at least five days prior to the course, then 100% of the registration fee will be refunded.

For in-person events, the following fee structure applies: cancellation at least 30 days prior to the event, full refund; within 15-29 days, $100 fee; and within 1-14 days or no show, 100% of the registration fee. When possible, please send a substitute instead of canceling because NWPPA does not charge a fee for substitutions.

Continuing Hours:

This course qualifies for 32 continuing hours. Certificates are issued upon full completion of the course.

The International Information Systems Security Certification Consortium, Inc. accepts Digital Boundary Group’s Security Training Program as credit toward meeting the Continuing Professional Education requirements to maintain the Certified Information Systems Security Professional (CISSP) designation (CISSP Constituents will earn 32 CPE Credits)

For More Information:

To find out more about this course, to register, or to learn about other events, view the Training and Event Catalog.