Windows security

Formations Windows security

OBJECTIF

This course will confront you with the implementation of the security of Windows systems. It will allow you to define an effective security policy based on the components of the corporate network.
The main vulnerabilities of the system and configuration problems will be studied and the corrections and good practices to be applied will be seen.
Protections put in place by the operating system will be studied and analyzed.

In particular, the objectives of the training are:

  • Define an effective security policy
  • Put in place an effective security policy
  • Evaluate its configuration

PREREQUISITES

• Knowledge in Windows administration

• Mastery of virtualization tools

GENERAL INFORMATION

• Code : SW
• Durée : 3 Days
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord, Tunis

TARGETED AUDIENCE

  • • Engineers / Technicians
  • • administrators
  • RESOURCES

    • Course materials
    • 40% demonstration
    • 40% of theory
    • 20% practical exercises

PROGRAM OF TRAINING

  • Days 1
  • Windows system overview
  • BIOS / UEFI protection
  • System protection
  • • Updates
    • Windows event logs
    • The Sysinternals tool suite
    • The SAM database and the storage of passwords
    • Authentication methods under Windows
    • Disk encryption with Bit locker
    • Powershel Administration
    • Deployment of the LAPS solution
    • ATA technology
    • Certificate Deployment
    • Test the configuration of its
    • infrastructure (BTA, Blood Hound, etc.)
    • Segmentation in silos• Windows memory protection
    • DEP
    • ASLR
    • Stackcanary
    • SEH

  • Powershell Administration
  • Days 2
  • User Protection
  • • Rights management
    • Smart Screen
    • Applocker
    • Device Guard
    • UAC
    Deploying a secure domain Essential Group Strategy

  • Days 3
  • Protection of services
  • • Deploy a certification authority
    • Public key infrastructure
    • Hardening the LDAP service
    • Hardening SMB Service
    • Hardening Microsoft SQL Service
    • Hardening Remote Desktop Service
    • Hardening the DNS service
    • Hardening IIS service

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.