TRSGW1902

Ladda ner som PDF

Cybersecurity attacks and defenses – Red vs. blue team!

We regularly work hands-on, knee-deep, with Cyber Incidents, where we help mid- to enterprise-sized companies and organizations who are victims of Cyberattacks. That gives us a unique insight into how attackers operate, and the most common mistakes IT departments and humans do. 

Audience

IT technicians, administrators, architects, and “technically focused” IT managers who want to learn more about Cybersecurity with a focus on Microsoft security.

Prior knowledge

Good IT knowledge in enterprise environments and in Windows systems, with some experience administrating cloud services. 

Certification

You will receive an Education Certificate after graduation.

Class Overview

During this week, you will participate in simulated attack and defense exercises as Blue and Red Team members with the task of attack and defend your enterprise lab environment. This will give you the insights into how an attacker thinks, operates and their tooling as well as how to detect, protect and respond to Cyberattacks.  

Traditional security approaches have focused on using the organization’s network as the primary security perimeter. However, in today’s world, network security is often bypassed, primarily when data and resources are hosted outside the traditional network boundary. Or when the adversaries obtain access on workstations inside the network boundary through phishing and other attacks. Cyberattackers target accounts and other elements of privileged access to rapidly gain access to targeted data and systems using various tools and skillsets to perform credential theft and reuse attacks like token manipulation, pass-the-hash, and pass-the-ticket.  

In this training, you learn the modus operandi of attackers, how they identify vulnerabilities and exploit them to take control of your enterprise environment, for example, to steal data or launch ransomware attacks. You will also learn how to detect hackers’ activities and how to protect your environment using built-in security features in Windows Client and Server, as ... Läs mer

Class Overview

During this week, you will participate in simulated attack and defense exercises as Blue and Red Team members with the task of attack and defend your enterprise lab environment. This will give you the insights into how an attacker thinks, operates and their tooling as well as how to detect, protect and respond to Cyberattacks.  

Traditional security approaches have focused on using the organization’s network as the primary security perimeter. However, in today’s world, network security is often bypassed, primarily when data and resources are hosted outside the traditional network boundary. Or when the adversaries obtain access on workstations inside the network boundary through phishing and other attacks. Cyberattackers target accounts and other elements of privileged access to rapidly gain access to targeted data and systems using various tools and skillsets to perform credential theft and reuse attacks like token manipulation, pass-the-hash, and pass-the-ticket.  

In this training, you learn the modus operandi of attackers, how they identify vulnerabilities and exploit them to take control of your enterprise environment, for example, to steal data or launch ransomware attacks. You will also learn how to detect hackers’ activities and how to protect your environment using built-in security features in Windows Client and Server, as well as those in Azure and Microsoft 365, maximizing your investments in the Microsoft platform.  

It is a unique hands-on lab for IT pros and IT managers that covers all aspects of Windows Enterprise security regarding cyberattacks and defenses.  

Instructors discuss protection and mitigation strategies for each attack scenario covered in the training, based on their extensive real-world experience and knowledge. Using examples from incidents, attacks, and red team assignments, they demonstrate the importance of governing privileged access and how it minimizes your organization’s attack surface and thwarts in-progress attacks.  

Key players of the Truesec Cybersecurity team, consisting of both red and blue team members and other security experts, developed this unique training based on real-world experience from numerous incident response cases, penetration tests, security health-checks, red team activities, and security design and architecture projects. They include some of the world’s leading security experts, Cloud and Enterprise Security MVPs, and recognized Microsoft Ignite speakers.  

After taking this course, you will fully understand the threats of today and be able to swiftly implement security controls that are proven to defend your Microsoft infrastructure effectively in the real world. You will take home key knowledge based on the instructors’ many years of experience helping customers in the field investigate and mitigate security challenges.  

Utbildningen levereras i samarbete med

Kursfakta

Kurs-ID: TRSGW1902
Längd: 5 dagar
Pris exkl moms: 44 900 kr
Inregistrering: 09.00
Kursstart: 09.30
Kursslut (ca): 17.00

Frågor om kursen?

Har du frågor om kursens innehåll, leveransdatum/ort eller behöver en företagsanpassad variant? Fyll i formuläret nedan!


Kan betalas med:
TRAINING CARD

Avtalsrabatter och kampanjer kan ej nyttjas på denna kurs.


Ort och datum

Stockholm
2 mar-6 mar
Boka nu!

Tipsa