Hacking Windows Platform
- Detecting unnecessary services
- Misusing service accounts
- Implementing rights, permissions and privileges
- Direct Kernel Object Modification
Why are we doing this?
For so many years we have been asked to create a course like this.
The course that covers all aspects of Windows infrastructure security from the hacker’s mind perspective!
One of the most important things to conduct a successful attack is to understand how the targets work. We will go through the operating systems’ built in problems and how they can be beneficial for hackers.
Our goal is to teach you how to design and implement secure infrastructures based on the reasonable balance between security and comfort with great knowledge of attacker’s possibilities.
We really want you to go out from the class with the practical, ready-to-use and holistic approach and skills to secure your infrastructure.
On the market there are thousands of solutions available to enrich security in our infrastructure. Idea of this module is to provide the complete knowledge and to gain the holistic approach to the areas that can be secured and the measures that can be implemented.
Click here to browse the modules:
Paula has extensive experience in security projects and has conducted
hundreds of security analyses (even for government organizations).
Within CQURE she devoted herself to her passions: Penetration Tests,
Audits, Architecture Consulting and creating Trainings & Seminars.
You should have good hands-on experience in administering Windows infrastructure with at least 8 years in the field.
You should have good understanding of how operating system works.
Ideally you should have read “Windows Internals” by Mark Russinovich book.
This deep dive course is a must-go for enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
We’ll be taking on board 30 students only.