EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

Similar documents
AV-006: Installing, Administering and Configuring Windows Server 2012

Windows 7, Enterprise Desktop Support Technician

Training Name Installing and Configuring Windows Server 2012

MCSA: Windows Server 2012 Boot Camp

Administering Windows Server 2012

Configuring Advanced Windows Server 2012 Services 5 Days

Configuring Advanced Windows Server 2012 Services

COURSE 20411D: ADMINISTERING WINDOWS SERVER 2012

LEARNING SOLUTIONS website milner.com/learning phone

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Administering Windows Server 2012

Course 20411D: Administering Windows Server 2012

Administering Windows Server 2012

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

6445A - Implementing and Administering Windows Small Business Server 2008

Administering Windows Server 2012

Course 20412A: Configuring Advanced Windows Server 2012 Services

NE-20411D Administering Windows Server 2012

Administering Windows Server 2012

Planning and Administering Windows Server 2008 Servers

Configuring Advanced Windows Server 2012 Services MOC 20412

Administering Windows Server 2012

Administering Windows Server 2012

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Configuring Advanced Windows Server 2012 Services Course# 20412D

Configuring Advanced Windows Server 2012 Services

Planning and Administering Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days

"Charting the Course... MOC D Configuring Advanced Windows Server 2012 Services Course Summary

MCSA Windows Server Eğitimi İçeriği

Preliminary Course Syllabus

"Charting the Course... MOC D Administering Windows Server Course Summary

CAST Center for Advanced Security Training

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2

Designing and Implementing a Server Infrastructure

411-Administering Windows Server 2012

MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Planning and Implementing Windows Server 2008

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Administering Windows Server 2012

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Course 20413: Designing and Implementing a Server Infrastructure

MS Configuring Advanced Windows Server 2012 Services

Course Outline. Course 20412B: Configuring Advanced Windows Server 2012 Services. Duration: 5 Days

Windows 7, Enterprise Desktop Support Technician

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

Fundamentals of a Windows Server Infrastructure MOC 10967

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)

Course Syllabus. Planning and Administering Windows Server 2008 Servers. Key Data. Audience. At Course Completion. Prerequisites. Recommended Courses

Configuring Advanced Windows Server 2012 Services Course 20412

Configuring Advanced Windows Server 2012 Services

Designing and Implementing a Server Infrastructure

70-647: Windows Server Enterprise Administration

Implementing Active Directory Rights Management Services with Exchange and SharePoint

Administering Windows Server 2012

The course covers Windows server 2008, Windows Server 2008 R2 and Windows Server 2008 R2 sp1.

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure

MCSA: Windows 2012 Server

Course Active Directory Services with Windows Server

Microsoft Technologies

Administering Windows Server 2012

20413C: Designing and Implementing a Server Infrastructure

LEARNING SOLUTIONS website milner.com/learning phone

Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

20417-Upgrading Your Skills to MCSA Windows Server 2012

MS 20417B: Upgrading Your Skills to MCSA Windows Server 2012

Course 20688A: Managing and Maintaining Windows 8

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Course 20411B: Administering Windows Server 2012

Desingning and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure

Course Description. Course Page - Page 1 of 9. Administering Windows Server 2012 M Length: 5 days Price: $2,795.00

Troubleshooting and Supporting Windows 7 in the Enterprise

Microsoft Private Cloud

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Course Outline. Course 6421B : Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

6421B - Windows Server 2008 R2 Network Infrastructure

Configuring, Managing, and Maintaining Server 2008 R2

MS Managing and Maintaining Windows 8

Transcription:

CENTER FOR ADVANCED SECURITY TRAINING 616 Securing Windows Infrastructure Make The Difference

About Center of Advanced Security Training () The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies. was created to address the need for quality advanced technical training for information security professionals who aspire to acquire the skill sets required for their job functions. courses are advanced and highly technical training programs co-developed by and well-respected industry practitioners or subject matter experts. aims to provide specialized training programs that will cover key information security domains, at an advanced level.

Securing Windows Infrastructure Course Description Windows Infrastructure Hardening has become a mandatory step performed on a regular basis by any organization that sees security as a priority. Businesses nowadays are almost fully dependent on IT services, making the hardening and securing processes even more intense. The number of possible attack surfaces has emerged exponentially in direct relation to the increasingly competitive field of current technology we are witnessing where developers try to achieve more and more functionality from implemented solutions and applications. The 616: Securing Windows Infrastructure is designed with the single purpose of providing Info-Sec professionals with complete knowledge and practical skills necessary to secure their network infrastructure which is fast becoming if already not a top priority plus a major tech challenge for most security conscious organizations. This 3 day training deep dives into the key aspects of solving infrastructure-related problems by appreciating the key elements of how Windows Internal Security mechanisms actually work and how it can be further optimized without jeopardizing or easing an organization s IT Environment configuration settings which becomes common as time passes. Some of the highlights of this course are techniques used in Kernel Debugging, Malware hunting, deep diving into BitLocker and the automation of the whole hardening process.

Why You Should Attend? There s a lot more to Windows Security than just applying patches and changing passwords: 01 02 03 04 05 06 07 08 09 10 11 Gain knowledge on how to apply Windows Server 2008 R2 and Windows Server 2012 features to secure your infrastructure Learn how to setup the appropriate rights, privileges and permissions to operating system objects Learn the key functionalities of IPSec (domain isolation, securing network traffic) Learn now to configure, monitor and troubleshoot Microsoft infrastructure services Gain knowledge how to implement Network Access Protection Learn how Windows operating systems work Learn how to implement BitLocker Learn how to deal with insecure or incompatible drivers Gain knowledge how to investigate Blue Screens Learn how to build the failover cluster and NLB used in the Web Server scenario Learn how to use Public Key Infrastructure in the everyday task

Who Should Attend? Passionate IT Professionals, including: Information Security Professionals Government Agents IT Administrators IT Architects Risk Assessment Professionals Penetration Testers PRE-requisites: An understanding of infrastructure management It s recommended that students have MCTS certification on server or client technologies

Course Outline Unit 1: Windows 7 & 8 Hardening Securing operating system objects This module covers a detailed deep-dive into Windows internal security mechanisms and their practical usage and adjustment. Windows Kernel role Kernel functionality Kernel debugging (useful techniques) Influencing the security of processes & threads User account security (elevation of privileges, permissions, functionality, passwords, hardening) Functionality and hardening of rights, permissions, privileges Kernel security mechanisms and their practical implementation Lab: Kernel digging Services security Registry settings and activity Lab: Securing system objects Lab: Improving services security Lab: Verifying the meaning of rights, permissions and privileges Lab: System security bypass techniques and countermeasures

Modern malware and threats Sensitive operating system areas Techniques used by modern malware Cases of the real attacks on sensitive areas (with the practical examples) Protection mechanisms and countermeasures Lab: Malware hunting Lab: Stuxnet / other malware cases Device Drivers Types of drivers and their security considerations Managing device drivers Lab: Monitoring drivers Lab: Driver Isolation Lab: Signing drivers Practical Cryptography EFS Deep-dive to BitLocker 3rd party solutions Lab: Implementing and managing BitLocker After completing this module, students will be familiar with: Threats and their effects Points of entry to the client operating system Secure configuration of the client operating system Security management in the client operating system Group Policy Settings Useful GPO Settings for hardening Customized GPO Templates AGPM Lab: Advanced GPO features Lab: Implementing AGPM

Unit 2: Windows Server 2008 R2 / Windows Server 8 Hardening This module focuses on server architecture, security issues and hardening Securing Server Features Public Key Infrastructures Design considerations Hardening techniques Lab: PKI implementation Active Directory Design considerations for Windows Server 2008 R2 and Windows Server 8 Securing Domain Services Schema configuration New security features in Windows Server 8 Lab: Active Directory security in the single domain environment Lab: Active Directory security in the multiple domains environment Microsoft SQL Server hardening Installation considerations Configuring crucial security features Lab: Hardening Microsoft SQL Server After completing this module, students will be familiar with: Threats for servers and countermeasures Points of entry to the server operating system Solutions for server security Hardening of the Windows related roles

Unit 3: Hardening Microsoft Network Roles This module focuses on hardening and testing network related roles. Very intensive! Hardening minor network roles DNS Hardening Improving DNS functionality Hardening and designing DNS Role Lab: Hardening DNS role Lab: Testing the DNS configuration Internet Information Security 7.5 / 8 Implementing secure web server Implementing web site security Monitoring security and performance Lab: IIS Server Hardening Lab: Web site security settings Lab: Monitoring IIS under attack IPSec Implementing IPSec Security polices in IPSec Lab: Implementing Domain Isolation Lab: Network Access Protection with IPSec Direct Access Implementation Considerations Direct Access Security and Hardening Lab: Direct Access secure configuration demo Remote Access VPN Protocols RDP Gateway Unified Access Gateway Network Access Protection Lab: Configuring security settings in Network Policy Server Lab: Configuring security settings in RDP Gateway Lab: Securing UAG Configuration for applications Lab: Network Access Protection implementation scenario Firewall Customizing the rules Hardening Client and Server for Rule- Specific scenario Lab: Managing Windows Firewall with Advanced Security After completing this module, students will be familiar with: Configuring secure remote access Implementing Network Access Protection Protocol misusage techniques and prevention actions DNS advanced configuration Hardening the Windows networking roles and services in details Building the secure web server

06. Protecting Web Applications Unit 4: Windows High Availability This module covers business continuity support technologies Network Load Balancing design considerations and best practices iscsi configuration Failover Clustering internals and security Lab: Building IIS Cluster with NLB Lab: Building the failover cluster After completing this module, students will be familiar with: High Availability technologies

Unit 5: Data and Application Security This module covers solutions that greatly support information and data security File Classification Infrastructure Designing security for File Server Active Directory Rights Management Services AppLocker and Software Restriction Policy Lab: Building secure solution with FCI and ADRMS Lab: Securing and auditing a File Server Lab: Restricting access to applications with Applocker and SRP Lab: Software Restriction Policy (in) security After completing this module, students will be familiar with: Information and data protection solutions Best practices of implementing data security solutions Techniques for restricting access to data Techniques of avoiding misusage of applications

Unit 6: Monitoring, Troubleshooting and Auditing Windows This module covers all best practices regarding to monitoring, troubleshooting and auditing Windows. It is a prefect module for Windows investigators Advanced logging and subscriptions Analyzing and troubleshooting the boot process Crash dump analysis Auditing tools and techniques Monitoring tools and techniques Professional troubleshooting tools Lab: Event logging and subscriptions Lab: Monitoring the boot process Lab: Blue Screen scenario After completing this module, students will be familiar with: Troubleshooting methodologies Collecting data methodologies Monitoring Windows after / during th attack and during situation specific events Windows forensics

Unit 7: Automating Windows hardening This module covers all best practices regarding to monitoring, troubleshooting and auditing Windows. It is a prefect module for Windows investigators Advanced logging and subscriptions Analyzing and troubleshooting the boot process Crash dump analysis Auditing tools and techniques Monitoring tools and techniques Professional troubleshooting tools Lab: Event logging and subscriptions Lab: Monitoring the boot process Lab: Blue Screen scenario After completing this module, students will be familiar with: Troubleshooting methodologies Collecting data methodologies Monitoring Windows after / during the attack and during situation specific events Windows forensics

Master Trainer: Paula Januszkiewicz Paula Januszkiewicz is an IT Security Auditor and Penetration Tester, Enterprise Security Most Valuable Professional, Microsoft Certified Trainer and Microsoft Security Trusted Advisor. She is a familiar face at international events and conferences such as TechEd North America, TechEd Middle East and TechEd Europe, RSA worldwide, CyberCrime and others worldwide. Her passion for Windows & IT Security allows her to spread her expertise via her trainings and consulting services focusing on areas such as Infrastructure Security & Design, Penetration Testing, IT Security Audits, Networking Security, Windows Internals and Forensics and through her writing regarding Windows Security. Her distinct specialization is definitely on Microsoft security solutions in which she holds multiple Microsoft certifications (MCITP, MCTS, MCSE, MCDBA etc.) besides being familiar and possessing certifications with other related technologies. She proudly holds the role of the Security Architect in idesign and has conducted hundreds IT security audits and penetration tests. When she s not driving her own company CQURE, she enjoys researching new related technologies, which she converts to authored trainings and describes them on her blog. She is also a co-author of the Microsoft Forefront Threat Management Gateway 2010 book and is currently working on her new book under the same subject.