Kód kurzu: SECDAY4« Krok zpět

Masterclass: Hack into your Environment

Everyone has heard about hackers – and what if instead of destroying your environment they will visit you to identify and show some risks and vulnerabilities? Live within your real system and not only explain every single step but also show how to protect your assets? Things hackers do in their darkened rooms are definitely interesting and worth knowing especially if after a couple of hours spent together you will know how you make less friendly hackers’ life significantly harder. Is it that easy to get into systems? Is Windows OS safe enough to use it in practice? Of course, administrators do not have to be taught how to be a hacker; it is often enough to show them one simple, but interesting tool or technique, to change the point of view on their own IT environment. Topics covered in this seminar will help you to step into hacker's shoes and evaluate your network from their perspective. Be careful – this workshop is designed for IT and Security professionals who want to take their skills and knowledge to the next level. Attend this course and get familiar with most important vulnerabilities in your environment, hacker techniques, and, what is most important, technologies which can be useful to protect yourself. This is a training with live hacking, demonstrations, concluding reasonable and smart explanations.

 DatumDnůCena kurzuCena materiálůJazyk výukyLokalita 
18.9.2018 1 9 990 CZK - Anglický jazyk Microsoft Czech Republic and Slovakia

PobočkaDnůCena kurzuCena materiálůITB
Praha1 9 990 CZK - 10

Termín: 18.9. 2018
Cena: 9 990 Kč bez DPH
Cena zahrnuje oběd (stravenky), slané a sladké občerstvení, nealko nápoje. Na akci se nevztahují žádné slevy, cena 9 990,- Kč bez DPH je konečná.

Lokalita: Microsoft – zasedací místnost Morava
Vyskočilova 1561/4a,140 00 Praha 4
autobus č. 118, 124, 170 – zastávky Vyskočilova / Brumlovka

Note: Seminar is BYOD type. There is a recommendation to participants to have some knowledge of security concepts, such as operating system services and architecture. However, all required concepts will be covered throughout the Security Day.

Materials: Authors’ unique tools, presentation slides with notes, workshop instructions. Materials will be sent till the end of October 2018.

Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.

Přednášející: Paula Januszkiewicz
Paula Januszkiewicz is a word-renowned Security Expert. Paula loves to perform Penetration Tests, IT Security Audits, and after all she says: ‘harden’em all’!
Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She did hundreds of security projects,including those for governmental organizations, she is also a top speaker at many well- known conferences including Microsoft Ignite, where she was rated No 1 Speaker among 1100 other Speakers.

At the end participants will receive the online Certificate of attendance signed by Paula.

08:30 - 09:00 Registration
09:00 - 10:00 Module 1
10:00 - 10:15 Coffee break (drinks & snack)
10:15 - 11:15 Module 1
11:15 - 12:15 Lunch
12:15 - 13:15 Module 2
13:15 - 13:30 Coffee break (drinks)
13:30 - 14:30 Module 2
14:30 - 14:45 Coffee break (drinks & snack)
14:45 - 15:45 Module 2
15:45 - 16:00 Coffee break (drinks)
16:00 - 16:30 Module 2


Module 1: Identity and access management
User and administrator identity is one of the most typical attack target. The Module 2 covers different variants of such attacks and techniques used by Operating Systems to prevent them.
1. Performing the identity attacks
2. Performing the LSA Secrets dump and implementing prevention
3. Cached logons (credentials)
4. Data Protection API (DPAPI) for user’s secrets protection
5. Credential Guard in details
Module 2: Threat protection and information protection
The module covers different types of attacks (including ransomware) and most up to date ways of preventing them.
1. Types of the attacks
2. Malicious software techniques
3. Ransomware techniques
4. Fileless threats
5. Supporting attacks detection with Machine Learning
6. Application Whitelisting (AppLocker, Device Guard)
7. Windows Defender Advanced Threat Protection
8. Microsoft Azure ATP
9. Windows Defender Exploit Guard
10. Office 365 Advanced Threat Protection and Office 365 Threat Intelligence
11. Windows Information Protection and BitLocker
12. Azure Information Protection (AIP)
13. Microsoft Cloud App Security

Předchozí kurzy

žádný předchozí kurz

Navazující kurzy

žádný navazující kurz
K tomuto kurzu není dostupná žádná literatura.
Uvedené ceny jsou bez DPH.