During this 5-day course in 35 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of hacking and securing Windows infrastructure. Moreover, you will be able to:
(9:00am – 4:00pm CEST/CET Monday to Friday)
€3500
This is a 5-day deep dive course on infrastructure services security, a must-go for enterprise administrators, security officers and architects. It is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!
This is a 5-day deep dive course on infrastructure services security, a must-go for enterprise administrators, security officers and architects. It is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!
We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.
Grab this deal before it’s gone. The lowest price only now!
Join our course at a competitive and fair price. This is the last chance!
Grab this deal before it’s gone. The lowest price only now!
Join our course at a competitive and fair price. This is the last chance!
You will receive a Student Guide with instruction on how to prepare for the training, information regarding all the technical requirements and your own individual login credentials to the virtual environment.
You will be able to exercise and review all learned content on an ongoing basis.
You will receive a Certificate of Completion, all the materials which have been created and presented by the trainer as well as an access to our community on the Discord server.
We are Experts in remote delivery. In the past year, we have organized over 200 days of trainings and we have tested many solutions.
You will be granted a lab access for the duration of the training and a complementary access for additional 3 weeks after the training concludes with new challenging exercise instructions.
What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same.
The course is packed with the newest cybersecurity findings, insights and tools.
We are Experts in remote delivery. In the past year, we have organized over 200 days of trainings and we have tested many solutions.
You will be granted a lab access for the duration of the training and a complementary access for additional 3 weeks after the training concludes with new challenging exercise instructions.
What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same.
The course is packed with the newest cybersecurity findings, insights and tools.
In this workshop you will investigate the critical tasks for a high-quality penetration test. We will look at the most efficient ways to map a network and discover target systems and services. Once it has been done, we will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of authored and commercial tools. In the attack summary we will always go through the securing techniques.
Exploits are not the only way to get to systems! We will go through the operating systems’ build in problems and explore how they can be beneficial for hackers! One of the most important things to conduct a successful attack is to understand how the targets work. To the bones! Afterwards everything is clear and the tool is just a matter of our need.The course covers all aspects of Windows infrastructure security from the hacker’s mind perspective! Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into operating systems. After the course you will gain penetration tester’s knowledge and tools.
Covering all aspects of Windows infrastructure security that everyone talks about, this workshop will teach you how to implement securing technologies one by one. During this course you will learn how to design and implement secure infrastructures based on the reasonable balance between security and comfort with a deep understanding of a cyber attacker’s capabilities. The course is limited to 12 participants, so reserve your spot today!
During the course you will be provided with a bunch of materials such as lab exercises, presentations, intriguing articles and useful tools to make your tasks a little bit easier!
All exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux. To top it all of, the labs in which you will be practicing during the course will stay online for an extra 3 weeks so you may practice even more after the training is completed!
You will be granted access to our closed Discord community server where you will be able to share your thoughts with other IT specialists.
After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!
This Live Virtual Class consists of 13 Modules in terms of Hacking and Securing Windows Infrastructure. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.
a. Processes, Threads and Jobs
b. Services, Functions and
Routines
c. Sessions
d. Objects and Handles
e. Registry
a. Phishing – rev shell mail
phishing bob
b. Valid Credentials– password
spray exc.
c. Spoofing – DSN Twist
d. Vulnerable Components (drive
by download)
e. Weak Defaults
f. Other Vectors
a. Unquoted Service Path
b. Image and DLL Manipulation
a. SeImpersonate
b. SeTcb
c. Create User Token
a. Windows Logon
b. Windows Logon Types
c. LSASS Architecture
d. NTLM
e. Kerberos
f. Token Based Authentication -PRT
a. Pass the ticket
b. Golden and silver ticket
c. Pass the PRT
d. Shadow Credentials / NGC
This is an advanced course on Hacking and Securing Windows Infrastructure for Cybersecurity Specialists.
The course is perfect for enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
To fully benefit from this training, we recommend having a good hands-on experience in administering Windows infrastructure and at least 8 years experience in the field.
All the exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux.
To participate in the course you need a stable internet connection. For best learning experience we also need you to have a webcam, headphones and a microphone. Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.
Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.
You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.
Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.
Completed course with personal certification may be the perfect advantage when it comes to business.
Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.
Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.
After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.
You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.
Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.
Completed course with personal certification may be the perfect advantage when it comes to business.
Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.
Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.
After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.
During this 35-hour super intensive training you will gain crucial cybersecurity knowledge and skills in terms of hacking and securing Windows infrastructure. Moreover, you will be able to:
This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.
Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!
Cybersecurity Expert, solution architect, consultant, penetration tester, and developer with more than 20 years of experience in the field. Mike holds multiple certifications, in security, database and software development. He also holds a Ph.D. in Computer Science.
Do you want to receive the geekiest cybersecurity solutions, tools, and tricks, straight to your inbox?
Learn more about our offer in terms of Consulting. Our Cybersecurity Experts perform consulting work on a daily basis, hence we are fully prepared for any challenge.
Learn more about our offer in terms of Consulting. Our Cybersecurity Experts perform consulting work on a daily basis, hence we are fully prepared for any challenge.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.