Introduction to Incident Response and Handling
- Types of Computer Security Incidents
- Examples of Computer Security Incidents
- Signs of an Incident
- Incident Prioritization, Response and Handling
Why are we doing this?
Is it that easy to get into systems? What about Windows and hybrid environments – are all of these security features preventing all of the hacking attacks possible before?
Well no! And we need to know how to implement features properly in order to be on a safe side! Windows solutions and Azure are designed to protect against known and emerging security threats across the spectrum of attack vectors but this can be achieved only when configuring these settings properly!
A Hackers’ knowledge is considered to be valuable, both by system creators and common users. Administrators do not have
to be taught how to be a hacker; it is often enough to show them one simple, but a very interesting tool or technique, to change the point of view on their own IT environment. Topics covered in this seminar help you to walk in hacker’s shoes and evaluate your network from their point of view. Be careful – this workshop is designed for IT and Security professionals who want to take their skills and knowledge to the next level. After this workshop, you will be familiar with hacker techniques, which can be useful to protect yourself against. This is a two days training with demos and reasonable and smart explanations.
Click here to browse the modules:
You should have good hands-on experience in administering Windows infrastructure with at least 8 years in the field.
You should have good understanding of how operating system works.
Ideally you should have read “Windows Internals” by Mark Russinovich book.