Certified Windows Defender

Microsoft windows operating systems are widely deployed in corporate environments; due to this it is favorite attack choice for hackers.

What is Certified Windows Defender?

The Certified Windows Defender training is a full day advanced instructor-led training course which is specially designed for corporates running Windows Server as well as Client operating systems. This course teaches actionable security; which corporate team members can immediately implement in their organization and significantly increase the security posture of their company.
The course is designed around watching the attack realization and implementing defenses around it.

Real World Benefits

Certified Windows Defender will gain sufficient skills to understand vulnerabilities in windows networks and how to mitigate the. Course will cover live demonstration of APT level organized attacks in a controlled and focused manner and explain how attackers exploit windows vulnerabilities and gain access to enterprise networks. Based on this understanding Certified Windows Defenders can easily plan how to defeat hackers in their own game.

Target Audience

This course is intended for:

  • CIO/CISOs/Senior IT Executives – Who want to witness the real world of hacking
  • Corporate IT teams
  • Systems Administrators
  • Network Administrators
  • IT/IS Managers
  • ISMS Professionals
  • Information Security Professionals
  • Penetration Testers - CEH Professionals

SecureRapid

At Course Completion

After course completion participants will have clear understanding of -

  1. Threats & Countermeasures – Pruning the Low Hanging Fruit
  2. Understanding how hackers breach Windows networks
  3. Phishing to Lateral Movement to data exfiltration – how to detect and respond
  4. Ransomware – How to secure windows environment
  5. Deep look inside windows components / applications attacked by hackers
  6. Exploit windows services/components to get clarity on hack process
  7. Top controls to secure windows networks
  8. Group policies to secure windows environments
  9. Strategies for defending legacy applications in windows environment
  10. Tools and strategies to manage complex windows environment

Are You Ready for the Challenge?

Sign Up