Windows Client: Securing the Windows Client

09/11/2020 - 11/11/2020
Kalender-Import: iCal

ETC Trainingcenter
Modecenterstrasse 22, 1030 - Wien

Für dieses Seminar werden folgende Kenntnisse empfohlen:

  • Security threats and vulnerabilities
  • Patch management
  • Group policy management
  • Windows Firewall
  • Network security concepts

Jetzt auch über ETC erhältlich: Microsoft Premier Workshops buchen!

Security threats are increasingly a focal point for many enterprises. Cybercrime, industrial espionage, and diversity of malware are expanding dramatically. There is no single tool that can protect your assets against all threats. However, by protecting your client infrastructure with defenses at different layers of security, you can significantly reduce the potential exposure.Corporate client machines and devices can introduce significant security risk. This WorkshopPLUS demonstrates Microsoft’s technologies, tools, and methods which can be used to design, deploy, and control client-side security by significantly decreasing several risks in Windows 7, 8, 8.1, and 10 environments. Understand the full story behind Credential Theft and Pass the Hash (PtH) attacks and know all the mitigations and countermeasures available for Windows 7 and later operating systems

The three-day Securing Windows Client WorkshopPLUS provides students with the skills required to protect Windows clients against unintended access or intrusion.

Nach Abschluss dieses Seminars haben die Teilnehmer Wissen zu folgenden Themen:

  • Vulnerabilities, threats and PtH attack overview
  • Securing Client in Application Layer
  • Securing Client in File/Data layer
  • Client Authentication Security Features
  • Protecting Client Network Communication
  • Dieses Seminar richtet sich an:

    • IT Administrators
    • Windows Infrastructure Engineers
    • Desktop administrators
    • IT Security staff and Administrators

    Module 1: Vulnerabilities, threats and PtH attack overview. 

    This module provides an overview of general vulnerabilities, threats and layered security protection. It covers PtH attack mitigation techniques. 

    Module 2: Security Features at OS Level.
    This module details tools that have been available since Windows 7 but are still not very well known (Address Space Layout Randomization (ASLR), User Account Control (UAC), Mandatory Integrity Control (MIC) , AppLocker) as well as some new features introduced in Windows 10.
    Module 3: Securing the Windows Boot Process.
    This module presents file and data layer security, and protections against offline attacks on client assets. The technologies reviewed in this module include BitLocker and Secure Boot.
    Module 4: Virtualization-based Security.
    This module covers Credential Guard and Device Guard. Module 6: User Authentication. During this module we will discuss alternatives to password-based authentication (virtual smart cards, Windows Hello for Business).
    Module 5: Protecting Client Network Communication:
    This module focuses on securing the network layer by providing a deep insight of built-in Windows Firewall and IPsec capabilities.
    Module 7: Protecting Client with Cloud-based Services.
    A lot of Cloud-based and security-related services are available today. During this module, we will discover Enterprise Data Protection (EDP) as well as Windows Defender.


Mehr Artikel

Stijn Bannier, Digital Product Manager, Open API.

Air France-KLM erklimmt mit API neue Höhen

Air France-KLM hat mit TIBCO Cloud Integration und TIBCO Cloud Mashery Software eine API-geführte, kundenzentrierte Strategie umgesetzt. Sie verknüpfte ihre riesige Anwendungs- und Datenumgebung, um Partnern, Entwicklern und Endbenutzern ein reibungsloses Erlebnis zu bieten – und dem Unternehmen die Fähigkeit zur agilen Veränderung. […]

Palo Stacho, Mitgründer und Head of Operations bei Lucy Security (c) Lucy Security

Die fünf Mythen von simulierten Phishing-Nachrichten

Das Schweizer Unternehmen Lucy Security hat in einer weltweiten Onlinestudie „Nutzen und Herausforderungen von Cybersecurity-Awareness 2020“ im Juni 2020 Unternehmen nach dem praktischen Nutzen und den Herausforderungen von Cybersecurity-Awareness befragt. Aufgrund dieser Studie räumt Palo Stacho, Mitgründer und Head of Operations bei Lucy Security, mit fünf Mythen auf. […]