On This Page

Hacking and Securing Windows Infrastructure

Paula Januszkiewicz, CQURE Inc. | August 4-5 & August 6-7



Overview

The only workshop delivered by someone who has access to a source code of Windows! It is a part of CQURE Academy and provides certification. In this workshop you will investigate the critical tasks for a high-quality penetration test. We'll look at the most efficient ways to map a network and discover target systems and services. Once it has been done, we will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of authored and commercial tools. One of the most important things to conduct a successful attack is to understand how the targets work. In the attack summary we will always go through the securing techniques. We will go through the operating systems' build in problems and how they can be beneficial for hackers!

One of the most important things to conduct a successful attack is to understand how the targets work. To the bones! After that everything is clear and the tool is just a matter of our need. To complement that CQURE has written over 200 hacking tools (CQTools) that we are sharing during the training.

The course that covers all aspects of Windows infrastructure security from the hacker's mind perspective!
Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into operating systems. After the course you will gain penetration tester's knowledge and tools. And to get more practice we offer one extra week of labs online!
We really want you to leave from the class with practical, ready-to-use knowledge of how to get into the infrastructure.
This is a deep dive course. It is a must-go for enterprise administrators, security officers and architects. Delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions!

The course has a form of intense workshop and you MUST stay awake just not to miss a thing!

CQURE Tools are included.

All exercises are based on Windows Server 2012 R2 /2016 and Windows 8.1 / Windows 10. Some examples are also shown on Windows Server 2012 to accommodate the difference.

Who Should Take this Course

Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.

Student Requirements

Bring your own device.

No requirements but training is very intense.

What Students Should Bring

Bring your own device

What Students Will Be Provided With

  • CQTools
  • Lab Instructions
  • Workshop slides
  • Access to virtual environment for 3 weeks.

Trainers

Paula Januszkiewicz is the Founder and CEO of CQURE Inc. and CQURE Academy. She is also the world renowned IT Security Consultant and Penetration Tester, Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She has her heart and soul in the company, having deep belief that high quality and positive thinking are key to success. She devoted herself to her passion: Security Consulting performing penetration tests, architecture consulting, trainings and seminars. She did hundreds of security projects, including those for governmental organizations, she is also is also a top speaker at many well- known conferences including Black Hat 2017 USA, Microsoft Ignite (she was rated No 1 Speaker among 1100 other Speakers), RSA (in 2017 in San Francisco here session was one of the 5 hottest sessions), TechEd North America, TechEd Europe, TechEd Middle East, TechDays, CyberCrime etc., and is often rated as No 1 speaker. Paula is engaged as a keynote speaker for various cybersecurity events and she writes blog on Windows Security. Paula is passionate about sharing her knowledge with others. In private, she enjoys working with her research team, which she converts to authored trainings and tools used in practice in projects. She wrote a book about Threat Management Gateway 2010, and is working on her next book. She has access to a source code of Windows! Every year she makes over 200 flights and provides security consulting for the Customers around the world. Paula is a type that suffers when doing nothing, you can always expect some thoughtful ideas and interesting arguments!

Video Preview (Training Description Above - Top of Page)