Seminarinhalt
The Expert will also guide students through planning migrations to modern authentication, implementing technical remediation and compatibility strategies, and ensuring monitoring, fallback options, and operational continuity throughout the transition.
Programm
- Understanding NTLMv2 risks and Microsoft’s deprecation roadmap
- Discovering and auditing NTLMv2 dependencies in your environment
- Planning migration to Kerberos and modern authentication mechanisms
- Technical remediation strategies and compatibility considerations
- Monitoring, fallback options and operational continuity
Zielgruppen
- Ambitious beginners in cybersecurity - If you are a beginner with 1-2 years experience in cybersecurity, challenges define who you are. This training will hone your skills to detect today’s sophisticated cyberattacks and accelerate your career prospects in the field.
- Specialists in IT - If you have 4-5 years experience in IT and want to spin off into cybersecurity, this training will give you all the relevant foundation and specialist skillsets to carve an exciting new career in cybersecurity.
- Cybersecurity Specialists - This program is relevant for specialists with 3-5 years and more. You will polish up your skills, learn the most current tools and techniques relevant for the newest systems, and boost your reputation.

