Subscribe

Microsoft debuts a security masterclass

The workshop has been designed for IT and security professionals who want to take their skills and knowledge to the next level.


Johannesburg, 13 Mar 2018
Microsoft debuts a security masterclass.
Microsoft debuts a security masterclass.

In a time where stories about major security breaches litter the headlines on a daily basis, everyone has heard about hackers.

However, what if instead of destroying a business's environment, they visit the business with the aim of identifying where the business is vulnerable, and where its security is weakest.

With this in mind, Microsoft, in conjunction with Kystian Zieja from the Cqure Academy, is hosting a real white hat hacking experience.

The Microsoft Security Masterclass will be held on 26 March 2018, from 8am to 4pm, at Microsoft Johannesburg, Auditorium 1 and 2, at 3012 William Nicol Dr, Bryanston, Johannesburg.

Things hackers do in their darkened rooms are highly interesting and worth knowing, particularly if after a couple of hours spent with them, you will know how you make less friendly hackers' lives significantly harder.

The workshop has been designed for IT and security professionals, including network administrators, infrastructure architects, security professionals, systems engineers and network administrators, who want to take their skills and knowledge to the next level.

It will cover topics to help delegates step into a hacker's shoes, and evaluate their network from that perspective, and will feature live hacking and demonstrations, to familiarise attendees with the most crucial vulnerabilities in their environment.

It will also showcase various hacking techniques, and most importantly, technologies that can be used to defend against them.

Participants who complete the course will receive an online certificate of attendance signed by the CQURE Speaker.

Agenda:

Module 1: Identity and access management

User and administrator identity is one of the most typical attack targets. This module covers variants of such attacks, and the techniques used by operating systems to prevent them.

* Performing identity attacks.
* Performing the LSA Secrets dump and implementing prevention.
* Cached logons (credentials).
* Data protection API (DPAPI) for user's secrets protection.
* Credential Guard in details.

Module 2: Threat protection and information protection

The module covers different types of attacks (including ransomware) and most up-to-date ways of preventing them.

* Malicious software techniques.
* Ransomware techniques.
* Supporting attack detection with machine learning.
* Application whitelisting (AppLocker, Device Guard).
* Windows Defender Advanced Threat Protection.
* Microsoft Advanced Threat Analytics.
* Windows Defender Exploit Guard.
* Office 365 Advanced Threat Protection and Office 365 Threat Intelligence.
* Windows Information Protection and BitLocker.
* Microsoft Cloud App Security.

To register, click here.

Share