Seminarinhalt
Programm
- Introduction to the current and future state of IT security
- The showcase of how Windows really gets hacked!
- Cornerstones of Windows Security – How the Security Subsystem really works
- Using Baselines to protect clients and servers (and how to fix Microsoft/CIS broken default ones)
- Implementing hard disk encryption – Building a BulletProof BitLocker!
- Realistic hacks of BitLocker
- Virtual TPMs
- Blocking/Controlling USB-devices
- Mitigating Pass-The-Hash attacks and what ever Mimikatz can do to you
- Implementing LAPS
- If you RDP, you MFA!
- Windows Hello
- Phishing Resistant MFA
- VSM - Secure Kernel
- Implementing Credential Guard and other Secure Kernel technologies
- Getting rid of lateral movement of admin accounts – Implementing Directory tiering (AD/EntraID)
- Correct use of different levels of admin accounts in an enterprise
- Implementing the PAW – Privileged Access Workstation (Physical/Virtual)
- Why and How to use UAC effectively
- Privileged Identity Management (PIM)
- Privileged Access Management (PAM)
- Implementing the principle of least privilege – getting rid of admin rights!
- Securely managing Servers
- Protecting infrastructure services like DHCP, DNS and AD DCs
- Windows Firewall and IPsec
- Zero Trust Networking
- Implementing Allowlisting in Windows (AppLocker/WDAC/3rd Party)
- Implementing REALISTIC Security in REAL life – comparing Office desktops to workstations that can launch missiles
Zielgruppen
You are not a traditional IT professional? No problem — Sami also teaches medical staff, aid workers, and CSOs.
Vorkenntnisse
- Grundkenntnisse in der Windows-Verwaltung, in Active Directory und der Netzwerkinfrastruktur.

