Seminarinhalt
This comprehensive program consists of 16 modules, and you can enroll in the entire course or select any individual modules that suit your needs – the decision is yours!
This course is a live, online certification program divided into 16 modules and spread over 12 months.
All workshops are interactive and demo-intensive and eventually equip you with essential cybersecurity skills for Windows systems. Everything based on the newest content to give you relevant industry knowledge.
Programm
Expert: Paula Januszkiewicz
Date: 22.01.2026
Agenda:
a) Introduction to threat hunting and AI in cybersecurity
b) Leveraging AI to detect anomalies and threats
c) Automating threat hunting with machine learning
d) Using AI-powered tools for real-time threat detection
Module 2: Boosting your penetration skills
Expert: Artur Kalinowski
Date: 12.02.2026
Agenda:
a) From zero to domain admin almost always working exploitation techniques and discovery
b) Advanced network penetration testing
c) Bypassing modern security controls
d) Reporting and remediation strategies in penetration testing
Module 3: Hardening Active Directory Infrastructure
Expert: Peter Kloep
Date: 05.03.2026
Agenda:
a) Modern Identity Attack Techniques
b) Preventing Credential Theft and Misuse
c) Recommended AD Configuration Options
d) OS-Level Credential Protection Features: LSA Protected Process, Credential Guard, and RDP Restricted Admin Mode
e) Detecting Backdoors in Active Directory
Module 4: Privileged Access Workstations (PAW) in 2026
Expert: Sami Laiho
Date: 02.04.2026
Agenda:
a) On-prem & cloud PAWs
b) Hardware vs. VM trade-offs
c) Just-enough admin
d) Break-glass paths
Module 5: Malware Investigation & Yara Rules
Expert: Amr Thabet
Date: 16.04.2026
Agenda:
a) Malware Investigation Fundamentals
b) Static & Dynamic Analysis
c) Building Effective YARA Rules
d) Testing & Operationalizing YARA
Module 6: Become a Hunter: configuring and perfecting monitoring with Sentinel + MDE Design
Expert: Norbert Krzepicki
Date: 07.05.2026
Agenda:
a) Signals that matter
b) Cost-aware data plans
c) Advanced hunting
d) Incident workflows across SIEM + EDR
Module 7: Securing SQL Server
Expert: Damian Widera
Date: 28.05.2026
Agenda:
a) SQL Server Security Baseline Concepts
b) SQL Server Instance Security
c) Managing Logins & Passwords
Module 8: Mastering Public Key Infrastructure (PKI), Certificate Services and FIDO2
Expert: Peter Kloep
Date: 18.06.2026
Agenda:
a) Cryptography basics
b) Essence of PKI
c) Best practices for PKI Architecture
d) Active Directory Certificate Services Migration
e) Attacks on Certificates Infrastructure & Mitigations
Module 9: Identity Under Fire: Entra ID, Conditional Access & MFA Configuration
Expert: Marcin Krawczyk
Date: 09.07.2026
Agenda:
a) Secure Entra ID at scale
b) Token protection
c) Phishing-resistant MFA
d) Session risk & workload identities
Module 10: PowerShell for Digital Investigation & Triage
Expert: Amr Thabet
Date: 30.07.2026
Agenda:
a) PowerShell Essentials for Investigators
b) Collecting System & User Artifacts
c) Analyzing Evidence with PowerShell
Module 11: Mastering Code Security
Expert: Ronald Harmsen
Date: 20.08.2026
Agenda:
a) Introduction to OWASP Secure Coding
b) Authentication and Access Control
c) Hardening your API and Web application
Module 12: Cloud Post-Exploitation Mitigation: Azure & Microsoft 365
Expert: Marcin Krawczyk
Date: 10.09.2026
Agenda:
a) Abusing app registrations
b) Compromised service principals
c) OAuth consent
d) Mailbox exfiltration paths
e) SharePoint exfiltration paths
Module 13: Modern Windows Security Baselining: Standards, Settings and Solutions for Managing Safe Environment
Expert: John O’Neill
Date: 01.10.2026
Agenda:
a) Harden Windows 11/Server 2025
b) Secure AD/Entra ID hybrid joins
c) Local admin controls
d) New auditing baselines
Module 14: Configuring Application Whitelisting
Expert: Sami Laiho
Date: 15.10.2026
Agenda:
a) Whitelisting in general
b) Implementing AppLocker
c) Managing AppLocker
d) Troubleshooting AppLocker
Module 15: Deprecation NTLMv2 – Technical Preparation and Infrastructure Considerations
Expert: Peter Kloep
Date: 19.11.2026
Agenda:
a) Understanding NTLMv2 risks and Microsoft’s deprecation roadmap
b) Discovering and auditing NTLMv2 dependencies in your environment
c) Planning migration to Kerberos and modern authentication mechanisms
d) Technical remediation strategies and compatibility considerations
e) Monitoring, fallback options and operational continuity
Module 16: Steps for Building Incident Response Readiness
Expert: Paula Januszkiewicz
Date: 10.12.2026
Agenda:
a) Defining IR readiness: scope, roles and responsibilities
b) Building effective detection and response playbooks
c) Integrating tooling, automation and communication channels
d) Validating readiness with tabletop and purple-team exercises
e) Continuous improvement: metrics, after-action reviews and roadmap
Zielgruppen
- Ambitious Beginners in Cybersecurity - If you are a beginner with 1-2 years experience in cybersecurity, challenges define who you are. This training will hone your skills to detect today’s sophisticated cyberattacks and accelerate your career prospects in the field.
- Specialists in IT - If you have 4-5 years experience in IT and want to spin off into cybersecurity, this training will give you all the relevant foundation and specialist skillsets to carve an exciting new career in cybersecurity.
- Cybersecurity Specialists - This program is relevant for specialists with 3-5 years and more. You will polish up your skills, learn the most current tools and techniques relevant for the newest systems, and boost your reputation.
Vorkenntnisse
Basic understanding of the IT technologies is something that you should have; however, all the skills come with the pre-work materials that will level your knowledge before taking part in each module.
Enthaltene Module
Wichtige Information
(Start of the modules see detailed contents)
WITH “CYBERSECURITY MASTER ANNUAL PROGRAM” YOU WILL GET:
- A LIVE, online certification program divided into 16 modules and spread over 12 months.
- 16 x 8-hour workshops conducted LIVE every month.
- The syllabus covers 16 modules to equip you with 16 essential cybersecurity skills for Windows systems: Securing the Windows platforms, Hardening Active Directory infrastructure, Cloud-based incident response in Azure and Microsoft 365, Detecting and hunting for malware activities and prevention, Implementing privileged access workstations, Advancing PowerShell for security and administration, Everything you need to know about application whitelisting, High-priority security features in Azure, Secure monitoring of SQL Server integrated with SIEM solutions, Techniques for effective automation with PowerShell, Threat hunting supported by AI, Cyber threat intelligence, Mastering monitoring operations in Azure, Boosting penetration testing skills, Defending against threats using SIEM and XDR, and Implementing secure Entra ID.
- The workshops are interactive and demo-intensive. You’ll have the opportunity to ask questions after every workshop.
- All live workshops will be recorded and accessible for students any time in case you miss a live workshop or want to review what you’ve learned. You will have access to each workshop recording for 12 months after the live training.
- During the 12-month training, you’ll gain access to our exclusive Discord community server, where you can connect with other learners for networking activities, support for home assignments, motivation, and more.
- Official CQURE certificate for “Cybersecurity Master Annual Program”.
- With the flexibility to learn these certifiable skills online from qualified experts, there’s no excuse not to dive in and take your future into your own hands.

