Who Should Attend:
Network, server, desktop, and security administrators as well as management-level individuals interested in this topic.
This is a four-day online, hands-on security course that teaches you how to harden, monitor, and protect Microsoft Windows-based networks. Based on more than 15 years of security assessment and penetration testing experience, this course goes beyond theory and best practices and delivers proven, field-tested solutions.
You will learn in a hands-on environment that resembles a real-world network consisting of Windows servers and workstations, Microsoft Exchange, Microsoft SQL Server, Active Directory, Kali Linux, and more. You will learn effective countermeasures to defend against common attack tools and techniques. Upon completion of the course, students will be able to apply operating system and Active Directory hardening techniques, mitigate legacy software risks, and design tolerant networks that are resistant to present and future threats.
On the first day, through hands-on exercises, you will learn the most common attack techniques. Digital Boundary Group's custom, free, and open source tools are used to enumerate and exploit Windows hosts found in our virtual network. Days 2 and 3 focus on attack mitigation using field-proven hardening techniques found in Windows, Active Directory Group Policy, and implementation of free mitigation tools published by Microsoft and Oracle.
You will install and configure a host and network intrusion detection system utilizing Syslog, Snort, and Windows events. You will be able to export the configuration files for easy deployment in your own networks.
On the last day, you will take part in a final lab scenario consisting of two phases. Phase One tests your ability to implement a host and network intrusion detection system on a virtual Windows network. You must identify intrusion attempts by running a set of automated attacks. Phase Two tests your ability to harden a virtual Windows network using the various techniques learned during the class. A set of automated attacks will attempt to break into the network, indicating success or failure of successful hardening.
The course is only available live; no recording will be made available.
Digital Boundary Group
The webinars will be held from 8 a.m. to 3:30 p.m. Pacific Time each day. Attendees will be admitted 15 minutes before each session begins.
How to Participate:
Instructions will be emailed to attendees within 12 hours of the webinar and we recommend that you test the link to the meeting as soon as you get the instructions. The webinar is best viewed using Chrome as your browser. We recommend that you use a landline for both your phone and your internet connections.
This registration is for one person to attend. We manage our webinars on an honor-system basis; if more than one person from a utility wishes to attend, each is to register separately.
Utility Member Rate: $2,100
Associate Member Rate: $3,150
Non-Member Rate: $6,300
Cancellations are accepted with a full refund as follows:
For webinars and virtual classes, if the request is made at least five days prior to the course, then 100% of the registration fee will be refunded.
For in-person events, the following fee structure applies: cancellation at least 30 days prior to the event, full refund; within 15-29 days, $100 fee; and within 1-14 days or no show, 100% of the registration fee. When possible, please send a substitute instead of canceling because NWPPA does not charge a fee for substitutions.
This course qualifies for 32 continuing hours. Certificates are issued upon full completion of the course.
The International Information Systems Security Certification Consortium, Inc. accepts Digital Boundary Group’s Security Training Program as credit toward meeting the Continuing Professional Education requirements to maintain the Certified Information Systems Security Professional (CISSP) designation (CISSP Constituents will earn 32 CPE Credits)