fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course
  • #livevirtualclass

Windows Security and Infrastructure Management with Windows Internals

Live Virtual Class - Super Intensive Remote Training with Labs!
March 24, 2025, 9:00 am
Days
Hours
Min.
Sec.

During this 4-day course in 28 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in Windows Security and Infrastructure Management with Windows Internals. Moreover, you will be able to:

    • Get the highest quality and unique learning experience – the class is limited to 12 participants by default.
    • Get the opportunity to interact with our world-renowned Experts.
    • Go through CQURE’s custom lab exercises and practice them after the course.
    • Receive a lifelong certification after completing the course!

 

(9:00am – 4:00pm CEST/CET Monday to Thursday)

3000

/Lowest price within 30 days €2550 (net)

Why this course?

This is a 4-day deep dive course on Windows Security and Infrastructure Management with Windows Internals, ideal for Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants, and other people responsible for implementing network and perimeter security.

It is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!

This is a 4-day deep dive course on Windows Security and Infrastructure Management with Windows Internals, ideal for Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants, and other people responsible for implementing network and perimeter security.

It is delivered by one of the best people in the market in the security field and what is more, this is an international Live Virtual Class so you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office!

Pricing plan

We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.

Course timeline

  • 1. Before the course

    You will receive a Student Guide with instruction on how to prepare for the training, information regarding all the technical requirements and your own individual login credentials to the virtual environment.

  • 2. During the course

    You will be able to exercise and review all learned content on an ongoing basis.

  • 3. After the course

    You will receive a Certificate of Completion, all the materials which have been created and presented by the trainer as well as an access to our community on the Discord server.

Course benefits

How our lessons look like

  • Loads of Knowledge
  • Implementation workshop
  • Course materials
  • Unique exercises
  • Social & Network
  • Certification

Loads of Knowledge

The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, people, the most valuable resource, are not always aware of the level of security in their companies, possible points of entry, how operating systems are attacked, and how to protect the infrastructure from successful attacks which are sometimes caused by configuration mistakes. Understanding internal OS protection mechanisms and services/roles completely provides a huge impact on the whole infrastructure security level.

Unfortunately, the problem is… rarely anyone has this impact!

Implementation workshop

Advanced access rights, password mechanisms, windows internals, PowerShell usage for security purposes, gaining unauthorized access, advanced DNS configuration and common configuration mistakes, Active Directory security, IIS Security, debugging, advanced monitoring and troubleshooting, and much more!

Course materials

During the course you will be provided with a bunch of materials such as lab exercises, presentations, intriguing articles and useful tools to make your tasks a little bit easier!

Unique exercises

This course is packed with unique labs exercises! All exercises are based on Windows Server, Windows 10 and Kali Linux. To get more practice we offer three extra weeks of labs online!

After the training concludes, you may practice even more and repeat to consolidate newly gained skills and knowledge.

Social & Network

You will be granted access to our closed Discord community server where you will be able to share your thoughts with other IT specialists.

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Course syllabus

This Live Virtual Class consists of 11 Modules in terms of Windows Security and Infrastructure Management with Windows Internals. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.

  • Module 1:Windows Internals & System Architecture

    • 1. Introduction to the Windows 10 and Windows Server 2019 security concepts
    • 2. Architecture overview and terms
    • 3. Key System Components
      1. Processes, Threads and Jobs
      2. Services, Functions and Routines
      3. Sessions
      4. Objects and Handles
      5. Registry
    • 4. Advanced Local Procedure Call
    • 5. Information gathering techniques
      1. Windows Debugging
      2. Performance Monitor
      3. Windows Driver Kit
      4. Other useful tools
  • Module 2: Process and Thread Management

    • 1. Process and thread internals
    • 2. Protected processes
    • 3. Process priority management
    • 4. Examining Thread Activity
    • 5. Process and thread monitoring and troubleshooting techniques (advanced usage of Process Explorer, Process Monitor, and other tools)
  • Module 3: System Security Mechanisms

    • 1. Integrity Levels
    • 2. Session Zero
    • 3. Privileges, permissions and rights
    • 4.Passwords security (techniques for getting and cracking passwords)
    • 5. Registry Internals
    • 6. Monitoring Registry Activity
    • 7. Driver signing (Windows Driver Foundation)
    • 8. User Account Control Virtualization
    • 9. System Accounts and their functions
    • 10. Boot configuration
    • 11. Services architecture
    • 12. Access tokens
    • 13. Biometric framework for user authentication
  • Module 4: Debugging & Auditing

    • 1. Available debuggers
    • 2. Working with symbols
    • 3. Windows Global Flags
    • 4. Process debugging
    • 5. Kernel-mode debugging
    • 6. User-mode debugging
    • 7. Setting up kernel debugging with a virtual machine as the target
    • 8. Debugging the boot process
    • 9. Crash dump analysis
    • 10. Direct Kernel Object Manipulation
    • 11. Finding hidden processes
    • 12. Rootkit Detection
  • Module 5: Memory Analysis

    • 1. Memory acquisition techniques
    • 2. Finding data and activities in memory
    • 3. Step-by-step memory analysis techniques
    • 4. Tools and techniques to perform memory forensic
  • Module 6: Storage Management

    • 1. Securing and monitoring Files and Folders
    • 2. Protecting Shared Files and Folders by Using Shadow Copies
    • 3. Implementing Storage Spaces
    • 4. Implementing iSCSI
    • 5. Implementing FSRM, managing Quotas, File Screens, and Storage Reports
    • 6. Implementing Classification and File Management Tasks, Dynamic Access Control
    • 7. Configuring and troubleshooting Distributed File System
  • Module 7: Startup and Shutdown

    • 1. Boot Process overview
    • 2. BIOS Boot Sector and Bootmgr vs. the UEFI Boot Process
    • 3. Booting from iSCSI
    • 4. Smss, Csrss, and Wininit
    • 5. Last Known Good configuration
    • 6. Safe Mode capabilities
    • 7. Windows Recovery Environment (WinRE)
    • 8. Troubleshooting Boot and Startup Problems
  • Module 8: Infrastructure Security Solutions

    • 1. Windows Server Core Improvements in Windows Server 2019
    • 2. AppLocker implementation scenarios
    • 3. Advanced BitLocker implementation techniques (provisioning, Standard User Rights and Network Unlock﴿
    • 4. Advanced Security Configuration Wizard
    • 5. IPSec
    • 6. Advanced GPO Management
    • 7. Practicing Diagnostic and Recovery Toolkit
    • 8. Tools
  • Module 9: Layered Network Services

    • 1. Network sniffing techniques
    • 2. Fingerprinting techniques
    • 3. Enumeration techniques
    • 4. Networking Services Security (DNS, DHCP, SNMP, SMTP and other)
    • 5. Direct Access
    • 6. High Availability features: cluster improvements and SMB ﴾Scale – Out File Server)
    • 7. Network Load Balancing
  • Module 10: Monitoring and Event Tracing

    • 1. Windows Diagnostic Infrastructure
    • 2. Building auditing
    • 3. Expression‐based audit policies
    • 4. Logging Activity for Accounts and processes
    • 5. Auditing tools, techniques and improvements
    • 6. Auditing removable storage devices
  • Module 11: Points of Entry Analysis

    • 1. Offline access
    • 2. Kali Linux /other tools vs. Windows Security
    • 3. Unpatched Windows and assigned attacks
    • 4. Domain Controller attacks
    • 5. Man‐in‐the Middle attacks
    • 6. Services security

Who is it for?

Audience

The course is perfect for enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants.

Recommendations

To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 5 years in the field is recommended.

 

Exercises

All exercises are based on Windows Server, Windows 10 and Kali Linux.

To participate in the course you need a Stable internet connection. For best learning experience we also need you to have a webcam, headphones and a microphone. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.

How to persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power—it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

During this 28-hour super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Windows Security and Infrastructure Management with Windows Internals. Moreover, you will be able to:

  • get the highest quality and unique learning experience
  • get the opportunity to interact with our world-renowned Experts
  • go through CQURE’s custom lab exercises and practice them after the course

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Paula

Januszkiewicz

Founder & CEO, Microsoft Regional Director, MVP, MCT

Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!

Mike

Jankowski-Lorek, Ph.D.

Cybersecurity Expert, MCT

Cybersecurity Expert, solution architect, consultant, penetration tester, and developer with more than 20 years of experience in the field. Mike holds multiple certifications, in security, database and software development. He also holds a Ph.D. in Computer Science.

Michael

Grafnetter

Windows Security Expert, MVP, MCT, CEI, MCP

Cybersecurity Expert on Windows Security, Microsoft Azure and PowerShell with over 11 years of experience in teaching IT professionals, the author of the DS Internals PowerShell module.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form