User & System Secrets: Cybersecurity Data Extraction

Brand NEW Virtual Training by Paula Januszkiewicz

The CyberBytes are virtual trainings developed to provide practical skills required of cybersecurity professionals. Take the CyberByte from world-class cybersecurity pros and stand up to the pace of fast-changing cybersecurity landscape.

 

GET THE ACCESS NOW

Don't take the bait - take CyberByte - and skill up!

Your Secret History Isn’t So Secret

 

Credential caching and storage are great authentication time-savers. If it wasn’t for them, you would have to type in your username and password every time you wanted to log in to an account.

But does this convenience come at a cost? Passwords, secrets, and other sensitive information you think is secure may be accessible to hackers who possess the right extraction techniques.

In this new high-impact course, Security MVP Paula Januszkiewicz reveals what kind of data is being stored on your disk drive and why it is vulnerable.

In just 2 hours, you’ll discover how user and system secrets can be accessed and exploited by hackers and develop an understanding of RSA Key Containers and DPAPI flow.

How is this training different?

Short and Intense

Time is precious, that’s why we squeezed the best from the topic into a format designed to feed you with knowledge in short time. Effective solution designed to maximize learning.

Level: Advanced

Going deep and straight to the advanced stuff.  Expect a bit of steam coming out of your ears as we’ll be covering: how user and system secrets can be easily revealed and used by real hackers, RSA Key Containers, DPAPI flow and CQURE way to retrieve Golden Key from LSA. Brace yourself!

Hands-on Training

The training is extensively hands-on as it has been designed by passionate practitioners and obsessive researchers from CQURE Team.

World-Class Expert

We’re bringing you the best of the best: MVP, MCT and Microsoft Reginal Director with 15 years of experience in cybersecurity, Paula Januszkiewicz, as your teacher.

Training Formula

Intensive Deep-dive

New format for busy professionals that enables you to skill up in a specific area quickly.

Action Packed

You’ll learn to understand the RSA Key Containers, become familiar with DPAPI flow and CQURE way to retrieve Golden Key from LSA and get to know how user and system secrets can be easily revealed and used by hackers.

Full Year Access

You’ll get one year of access to all the materials.

Extra Materials

We’ve prepared demos and slides for students to keep.

2 Data Extraction Demos Included

The secret is out! Watch your disk drive go from safe haven to weak link as you learn from one demo on KeePass and DPAPI and another one on RDP Connections.

Training Syllabus

Module 1

User & System Secrets: Cybersecurity Data Extraction

 

Do cached credentials bring any danger? Surprisingly, your disk drive contains a lot of juicy information that can reveal a lot of secrets, history, and passwords! Yep – that’s right, the history of your passwords is not secure!

Join Security MVP, Paula Januszkiewicz and see what kind of information is being stored on your disk drive and how hackers are able to extract information that we think is ‘locked’ but in actuality is not. Paula will look at cached credentials in detail and the mechanisms that use passwords…and then show how to extract them.

 

Topics covered:

  1. RSA Key Containers
  2. DPAPI flow
  3. CQURE way to retrieve Golden Key from LSA
  4. KeePass and DPAPI demo
  5. RDP Connections demo

This training is a completely NEW fresh from the oven release. Don’t miss out on the most recent knowledge from Paula.

Your teacher

Paula Januszkiewicz

FOUNDER AND CEO OF CQURE

Paula Januszkiewicz, MVP, MCT and Microsoft Regional Director has 15 years of experience in the cybersecurity field, performing penetration tests, architecture consulting, trainings and seminars.

She has performed hundreds of security projects, including those for governmental organizations and big enterprises, at the same time being a top speaker and a keynote speaker at many well-known conferences, including Microsoft Ignite (rated No 1 Speaker among 1100 speakers at a conference with 26000 attendees), RSA (in 2017 in San Francisco her session was one of the 5 hottest sessions), Black Hat, CyberCrime etc., where she is often rated as No 1 speaker.

Her presentations gather thousands of people. In 2019, Paula’s presentation was voted best of Black Hat Asia 2019 Briefings!

Who Is It For

Intermediate to Advanced
Windows Security Professionals

If you want to level up in a specific area fast, this training is for you. We promise to challenge your ways of thinking and executing.

Cybersecurity Specialists
(Forensics Specialists, Admins)

Attendee needs to be fluent in Windows environment. Meaning you are a cybersecurity specialists with in-depth experience with Windows 10 client and Windows Server Domain Controller. Recommended especially to Security Consultants, Enterprise Administrators, Infrastructure Architects, Security Professionals, Systems Engineers, Network Administrators and IT professionals.

Brave Newbies

If you are a newbie bear in mind that the training WILL NOT cover the basics — so it might be a bit challenging for you. The cool thing is that you will be granted lifetime access to the materials so you can learn the topic in your own pace whenever you want.

BENEFITS SUMMARY:

  • Access to 2-hour recorded practical lesson including 2 demos
  • Training materials to download
  • The virtual training covers: how user and system secrets can be easily revealed and used by real hackers, RSA Key Containers, DPAPI flow and CQURE way to retrieve Golden Key from LSA.
  • One year of access to video recording and training materials for you to keep and get back to whenever needed.

$299

WATCH NOW

×