This course combines two intensive courses that are focused on the security of a windows infrastructure, Part one covers the Hacking of a Windows Infrastructure and part 2 the Securing of a Windows Infrastructure. During the first two days you will investigate the critical tasks for a high- quality penetration test. We will look at the most efficient ways to map a network and discover target systems and services.
We will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of authored and commercial tools. Exploits are not the only way to get to systems! We will go through the operating systems problems and how they can be beneficial for hackers! One of the most important things to conduct a successful attack is to understand how the targets work.
After that everything is clear we will have the tools to our disposal. This course covers all aspects of Windows infrastructure security from the hacker's mind perspective.
The final three days teaches you how to implement securing technologies one at a time. During the course you will learn how to implement them.
Our goal is to teach you how to design and implement secure infrastructures based on the reasonable balance between security and comfort. We really want you to leave the class with the practical, ready-use knowledge and skills to secure your Windows infrastructure.