Effective Implementation of the Application Whitelisting

by CQURE Expert Mike Jankowski-Lorek

The CyberBytes are virtual trainings developed to provide practical skills required of cybersecurity professionals. Take the CyberByte from world-class cybersecurity pros and stand up to the pace of fast-changing cybersecurity landscape.

GET THE ACCESS NOW

PROACTIVELY PROTECT A NETWORK’S INFRASTRUCTURE

 

The goal of most cyberattacks is to gain access to a system through the exploitation of vulnerabilities. Once access is gained, the attacker will install malware to give them remote access to the system.

The most effective way to block the malicious code from infiltrating a network’s infrastructure is with application whitelisting. A whitelisting strategy is a proactive strategy that goes beyond protecting your data—it protects your network’s environment.

However, even when you have enabled application whitelisting, there is still quite an easy way for knowledgable hackers to bypass it.

This is why it’s important to gain clarity on the weak links of the whitelisting process and how to overcome it with our advanced cybersecurity training: “Effective Implementation of the Application Whitelisting.”

This advanced training, which requires familiarity with Application Control for Windows and AppLocker, is a recorded training extracted from our AWSC 2020 edition. In just two hours, you’ll learn two effective strategies to implement application whitelisting.

We highly recommend this advanced training to security administrators and any cybersecurity expert eager to develop their skill set and advance their career.

How is this training different?

Short and Intense

Time is precious, that’s why we squeezed the best from the topic into a format designed to feed you with knowledge in short time. Effective solution designed to maximize learning.

Level: Advanced

Going deep and straight to the advanced stuff. Expect a bit of steam coming out of your ears as we’ll be covering: reasons for Application Whitelisting, AppLocker basics and bypassing example, AaronLocker, WDAC vs AppLocker, key scenarios for Windows Advanced Firewall and much more!

Hands-on Training

The training is extensively hands-on as it has been designed by passionate practitioners and obsessive researchers from CQURE Team.

World-Class Experts

We’re bringing you our expert Mike Jankowski-Lorek as your teacher.

Training Formula

Intense Deep-dive

New format for busy professionals that enables you to skill up in a specific area quickly.

Action Packed

You’ll learn about: reasons for Application Whitelisting, AppLocker basics and bypassing example, AaronLocker, WDAC vs AppLocker, key scenarios for Windows Advanced Firewall and much more!

Full Year Access

You’ll get one year of access to all the materials.

Extra Materials

We’ve prepared slides and video recording for students to keep.

From Reasons to Next Steps

Get the full insight into how to effectively implement Application Whitelisting in your organisation.

Training Syllabus

Module 1

Effective Implementation of the Application Whitelisting

 

In this training we will focus on AppLocker and WDAC implementation which can be done on large scale. Mike Jankowski-Lorek will give you clarity on the most critical questions: How to do it properly? How not to make simple mistakes? How not to forget about crucial dependencies?

 

Topics covered:

  1. Reasons for Application Whitelisting
  2. AppLocker basics and bypassing example
  3. AaronLocker
  4. WDAC vs AppLocker
  5. key scenarios for Windows Advanced Firewall
  6. WDAC / Device guard

Please note that this training is one of the modules of the Advanced Windows Security Course 2020. And it is recommended for cybersecurity specialists and requires a requires familiarity with Application Control for Windows and AppLocker.

Your teacher

Michał Jankowski-Lorek

CLOUD SOLUTIONS & CYBERSECURITY EXPERT

Mike Jankowski-Lorek, PhD, is a Cloud Solutions & Machine Learning Expert at CQURE. He is data scientist, solution architect, developer and consultant.

Mike designs and implements solutions for Databases, data analysis and natural language processing. He is interested in Big data, High Availability and real-time analytics especially when combined with machine learning and artificial intelligence or NLP.

Mike has recently defended his PhD thesis in which he combined academic knowledge, professional experience and strong technical skills!

Holder of many IT certificates such as MCT, MCP and MCDBA.

Who Is It For

Intermediate to Advanced
Windows Security Professionals

If you want to level up in a specific area fast, this training is for you. We promise to challenge your ways of thinking and executing.

Cybersecurity Specialists
(Security Admins)

You are a cybersecurity specialist familiar with Application Control for Windows and AppLocker.

Brave Newbies

If you are a newbie bear in mind that the training WILL NOT cover the basics — so it might be a bit challenging for you. The cool thing is that you will be granted lifetime access to the materials so you can learn the topic in your own pace whenever you want.

BENEFITS SUMMARY:

  • Access to 2-hour recorded practical lesson
  • Training materials to download
  • The virtual training covers: reasons for Application Whitelisting, AppLocker basics and bypassing example, AaronLocker, WDAC vs AppLocker, key scenarios for Windows Advanced Firewall and much more!
  • One year of access to video recording and training materials for you to keep and get back to whenever needed.

GET COMPLETE ACCESS TO
“Effective Implementation of the Application Whitelisting”
FOR $199 ONLY

WATCH NOW

×