Home / Training / Windows Security

Windows Security

Master Windows system security, policy definition, and service protection.

Objective

This course will confront you with the implementation of Windows system security. It will allow you to define an effective security policy based on the components of the enterprise network.
The main system vulnerabilities and configuration problems will be studied, and corrections and best practices to apply will be reviewed.
Protections implemented by the operating system will be studied and analyzed.

Specific Objectives:

  • Define an effective security policy
  • Implement an effective security policy
  • Evaluate its configuration

Prerequisites

  • Knowledge of Windows administration
  • Proficiency in virtualization tools

General Information

  • Code: SW
  • Duration: 3 days
  • Hours: 8:30 AM - 5:30 PM
  • Location: Training Center, North Urban Center

Target Audience

  • Engineers / Technicians
  • Administrators

Resources

  • Course material
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1
    • Introduction to the Windows system
    • BIOS/UEFI Protection
    • System Protection
    • Updates
    • Windows Event Logs
    • The Sysinternals suite of tools
    • The SAM database and password storage
    • Windows authentication methods
    • Disk encryption with BitLocker
    • Powershell Administration
    • LAPS solution deployment
    • ATA technology
    • Certificate deployment
    • Test infrastructure configuration (BTA, Blood Hound, etc.)
    • Silo segmentation
    • Memory protection in Windows
    • DEP
    • ASLR
    • Stack Canary
    • SEHOP
  • Day 2
    • User Protection
    • Rights Management
    • SmartScreen
    • AppLocker
    • Device Guard
    • UAC
    • Deployment of a secure domain Essential Group Policy
  • Day 3
    • Service Protection
    • Deploying a Certification Authority
    • Public Key Infrastructure
    • LDAP service hardening
    • SMB service hardening
    • Microsoft SQL service hardening
    • Remote Desktop service hardening
    • DNS service hardening
    • IIS service hardening

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.

Information security is essential for any company that needs to protect and improve its information assets.

Contact us