Masterclass: Hacking and Hardening Hybrid Environment

Warsaw, Poland
November, 12th – 14th 2018

Inquire Now

Why are we doing this?

Is it that easy to get into systems? What about Windows and hybrid environments – are all of these security features preventing all of the hacking attacks possible before?
Well no! And we need to know how to implement features properly in order to be on a safe side! Windows solutions and Azure are designed to protect against known and emerging security threats across the spectrum of attack vectors but this can be achieved only when configuring these settings properly!
A Hackers’ knowledge is considered to be valuable, both by system creators and common users. Administrators do not have
to be taught how to be a hacker; it is often enough to show them one simple, but a very interesting tool or technique, to change the point of view on their own IT environment. Topics covered in this seminar help you to walk in hacker’s shoes and evaluate your network from their point of view. Be careful – this workshop is designed for IT and Security professionals who want to take their skills and knowledge to the next level. After this workshop, you will be familiar with hacker techniques, which can be useful to protect yourself against. This is a two days training with demos and reasonable and smart explanations.

Course Syllabus

Module 1

Introduction to Incident Response and Handling

  • Types of Computer Security Incidents
  • Examples of Computer Security Incidents
  • Signs of an Incident
  • Incident Prioritization, Response and Handling

Module 2

System and Network Security Mechanisms

  • Anti-malware & Firewalls
  • Application Whitelisting, Application Virtualization
  • Whole Disk Encryption
  • Privileges, permissions and rights
  • Passwords security (techniques for getting and cracking passwords)
  • Network Infrastructure – Routers, Switches, DHCP, DNS

Module 3

Incident Response and Handling Steps

  • How to Identify an Incident
  • Handling Incidents Techniques
  • Incident Response Team Services
  • Defining the Relationship between Incident Response, Incident Handling, and Incident Management
  • Incident Response Best Practices, Policy and Plan Checklist

Module 4

Handling Network Security Incidents

  • Denial-of-Service Incidents
  • Unauthorized Access Incident
  • Inappropriate Usage Incidents
  • Multiple Component Incidents
  • Network Traffic Monitoring Tools

Module 5

Handling Malicious Code Incidents

  • Virus, Worms, Trojans and Spywares
  • Incident Handling Preparation and Prevention
  • Detection of Malicious Code
  • Evidence Gathering and Handling
  • Eradication and Recovery

Module 6

Securing Monitoring Operations

  • Industry Best Practices
  • Vulnerability Scanning
  • Monitoring Patching, Applications, Service Logs
  • Configuring Centralized Windows Event Log Collection
  • Scripting and Automation

Module 7

 Forensics Basics

  • Computer Forensics
  • Types of Computer Forensics
  • Computer Forensic Process
  • Forensic Analysis Guidelines and Tools
  • Finding data and activities in memory


Inquire Now

Click here to browse the modules:



You should have good hands-on experience in administering Windows infrastructure with at least 8 years in the field.


You should have good understanding of how operating system works.


Ideally you should have read “Windows Internals” by Mark Russinovich book.