Learn a modern and secure way to manage your Active Directory infrastructure.
Identity is the last perimeter to protect. Through numerous security audits and intrusion investigations, we know how important it is to protect your privileged accounts in order to protect your entire IT infrastructure. With that experience, we have the knowledge of how to use the built-in security features of Windows and Active Directory to create a strong and effective defense-in-depth strategy. This is a two-day course where we do a deep dive into Active Directory Security and how to build a modern and strong defense with the built-in components of Active Directory. We will look at common issues and misconfigurations and how to mitigate them. Separate administration into a tiered level in the existing domain and extend it to a high security domain. Build Privilege Access Workstations (PAW) and strengthen the administrative channels. We will use different real scenarios from the field.
We will start by covering an existing environment with common attack scenarios and vulnerabilities. This will give us a good starting point on how companies are exposed to intrusions and gain an understanding of why we need to shift the focus of our delegation models to take control of our infrastructure.
This course has a strong focus on Active Directory Security Active Directory administrators and security professionals.
Basic understanding of Active Directory administration, PKI, PowerShell and system security.
No certification for this course.
Daniel Ulrichs is a senior IT security consultant working in a Directory Services Expert team at Enfo Sweden IAM as an architect – identity and security in enterprise environments. With a passion for Active Directory security and the Windows platform, Daniel performs security audits, health checks, design of large Active Directory environments, migrations and consolidations of Active Directory as well as building high security environments. With his deep understanding, Daniel has helped Swedish government agencies, banks and organizations in other industries and countries to improve the security and infrastructure of their core Active Directory.
Over two days we will look at new features and requirements of Active Directory and Windows and how to combine it to create a defense in depth. Creating a hardened and modern administration model in different scenarios. Threat model, what is good enough.
The reality is that there will always be legacy systems and we need to protect them too. We will go through how to combine old and new technologies during a transition period.
This lab will give you the knowledge to implement a modern security model.
Course Overview
2 days
Can’t find a (suitable) date, but are interested in the course? Send in an expression of interest and we will do what we can to find a suitable opportunity.
Customized Courses
The course can be adapted from several perspectives:
In interaction with the course leader, we ensure that the course meets your needs.
Send an expression of interest for the training
Send an expression of interest for the training