BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20200512T143000Z
DTEND:20200515T213000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Hardening Windows Networks Training Program
DESCRIPTION:For more information and to register for this training\, please email training@digitalboundary.net. \n\n\n"Investing in current team members can be a highly cost-effective way to shore up cybersecurity skills in an organization."   (ISC)  Cybersecurity Workforce Study\, 2018 (page 21). \n\n\n\nBased on more than 15 years of security assessment and penetration testing experience\, Digital boundary Group's Hardening Windows Networks Training Program goes beyond theory and best practices to deliver proven\, field-tested solutions for mitigating\, monitoring\, and protecting Microsoft Windows based networks.  \n\n\n\nStudents will learn effective countermeasures to defend against common attacks and exploit techniques in a hands-on virtual environment that resembles a real-world network. Upon completion of the course\, students will be able to apply operating system and active directory hardening techniques\, mitigate legacy software risks\, and design tolerant networks that are resistant to present and future threats.\n\n\n\nFEATURES\n\nStudents will harden a network consisting of:\n\n\n	\n		\n			\n			\n				\n				Microsoft Exchange\n				\n			\n			\n			\n			\n				\n				MS Windows Server 2016\, 2012R2\n				\n			\n			\n		\n		\n			\n			\n				\n				Outlook Web Access\n				\n			\n			\n			\n			\n				\n				Microsoft Windows SQL Server\n				\n			\n			\n		\n		\n			\n			\n				\n				Proxy Server\n				\n			\n			\n			\n			\n				\n				Microsoft Software Update Services\n				\n			\n			\n		\n		\n			\n			\n				\n				Microsoft IIS\n				\n			\n			\n			\n			\n				\n				Firewall\n				\n			\n			\n		\n		\n			\n			\n				\n				Microsoft Windows 7/10\n				\n			\n			\n			\n			 \n			\n		\n	\n\n\nHIGHLIGHTS\n\n\n	\n		\n			\n			\n				\n				Common Exploitation Techniques\n				\n			\n			\n			\n			\n				\n				Host Firewall Configuration\n				\n			\n			\n		\n		\n			\n			\n				\n				Active Directory Group Policies\n				\n			\n			\n			\n			\n				\n				Network Traffic Analysis\n				\n			\n			\n		\n		\n			\n			\n				\n				Authentication Mechanisms\n				\n			\n			\n			\n			\n				\n				Proxy Server\n				\n			\n			\n		\n		\n			\n			\n				\n				Windows Auditing\n				\n			\n			\n			\n			\n				\n				File System Security\n				\n			\n			\n		\n		\n			\n			\n				\n				Log Monitoring and Alerting\n				\n			\n			\n			\n			\n				\n				Microsoft LAPS\n				\n			\n			\n		\n		\n			\n			\n				\n				Oracle Java Deployment Ruleset\n				\n			\n			\n			\n			\n				\n				Microsoft EMET\n				\n			\n			\n		\n		\n			\n			\n				\n				Windows AppLocker/Software Restriction\n				\n			\n			\n			\n			\n				\n				SNORT intrusion detection\n				\n			\n			\n		\n	\n\n\nFINAL LAB\n\nFINAL LAB\n\n\n	 Students will deploy host and network intrusion detection in a virtual windows network (SNORT\, syslog\, Windows events)\n	\n	Run automated attacks and identify the source\, destination\, and type of attack\n	\n	\n	Harden a virtual Windows network\n	\n	\n	Run automated attacks to test windows hardening\n\n	 \n	\n\n\n\nCONTINUING EDUCATION CREDITS \n\n(ISC)  accepts DBG's Security Training Program as credit toward meeting the Continuing Professional Education requirements to maintain the CISSP designation. \n\n\n	\n	CISSP Constituents will earn 32 CPE credits\n	\n\n\n\n\n\nThis training course is supported by:
X-ALT-DESC;FMTTYPE=text/html:<span style="font-size:18px\;"><span style="font-family:verdana\;"><strong>For more information and to register for this training\, please email training@digitalboundary.net.&nbsp\;</strong></span></span>\n<p><br />\n<span style="font-size:14px\;"><span style="font-family:verdana\;"><em>&ldquo\;Investing in current team members can be a highly cost-effective way to shore up cybersecurity skills in an organization.&rdquo\; &ndash\; (ISC)&sup2\; Cybersecurity Workforce Study\, 2018 (page 21). </em><br />\n<br />\nBased on more than 15 years of security assessment and penetration testing experience\, Digital boundary Group&rsquo\;s Hardening Windows Networks Training Program goes beyond theory and best practices to deliver proven\, field-tested solutions for mitigating\, monitoring\, and protecting Microsoft Windows based networks. &nbsp\;<br />\n<br />\nStudents will learn effective countermeasures to defend against common attacks and exploit techniques in a hands-on virtual environment that resembles a real-world network. Upon completion of the course\, students will be able to apply operating system and active directory hardening techniques\, mitigate legacy software risks\, and design tolerant networks that are resistant to present and future threats.<br />\n<br />\n<strong>FEATURES</strong><br />\nStudents will harden a network consisting of:</span></span></p>\n\n<table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse\;">\n	<tbody>\n		<tr style="height:19px\;">\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Microsoft Exchange</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">MS Windows Server 2016\, 2012R2</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr style="height:19px\;">\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Outlook Web Access</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Microsoft Windows SQL Server</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr style="height:19px\;">\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Proxy Server</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Microsoft Software Update Services</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr style="height:19px\;">\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Microsoft IIS</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Firewall</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr style="height:19px\;">\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Microsoft Windows 7/10</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;height:19px\;vertical-align:top\;">\n			<p><span style="font-size:14px\;"><span style="font-family:verdana\;">&nbsp\;</span></span></p>\n			</td>\n		</tr>\n	</tbody>\n</table>\n\n<p><span style="font-size:14px\;"><span style="font-family:verdana\;"><strong><span style="color:white\;">HIGHLIGHTS</span></strong></span></span></p>\n\n<table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse\;">\n	<tbody>\n		<tr>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Common Exploitation Techniques</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Host Firewall Configuration</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Active Directory Group Policies</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Network Traffic Analysis</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Authentication Mechanisms</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Proxy Server</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Windows Auditing</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">File System Security</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Log Monitoring and Alerting</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Microsoft LAPS</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Oracle Java Deployment Ruleset</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Microsoft EMET</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n		<tr>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Windows AppLocker/Software Restriction</span></span></p>\n				</li>\n			</ul>\n			</td>\n			<td style="width:319px\;padding:0cm 5.4pt 0cm 5.4pt\;vertical-align:top\;">\n			<ul>\n				<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;">\n				<p><span style="font-size:14px\;"><span style="font-family:verdana\;">SNORT intrusion detection</span></span></p>\n				</li>\n			</ul>\n			</td>\n		</tr>\n	</tbody>\n</table>\n\n<p><span style="font-size:14px\;"><span style="font-family:verdana\;"><strong><span style="color:white\;">FINAL LAB</span></strong></span></span></p>\n\n<p style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;"><strong style="font-family: verdana\; font-size: 14px\;">FINAL LAB</strong></p>\n\n<ul>\n	<li style="margin-bottom: 0.0001pt\; text-align: justify\;"><strong style="font-family: verdana\; font-size: 14px\;">&#8203\;</strong><span style="font-size:14px\;"><span style="font-family:verdana\;">Students will deploy host and network intrusion detection in a virtual windows network (SNORT\, syslog\, Windows events)</span></span></li>\n	<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n	<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Run automated attacks and identify the source\, destination\, and type of attack</span></span></p>\n	</li>\n	<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n	<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Harden a virtual Windows network</span></span></p>\n	</li>\n	<li style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n	<p><span style="font-size:14px\;"><span style="font-family:verdana\;">Run automated attacks to test windows hardening</span></span><br />\n	&nbsp\;</p>\n	</li>\n</ul>\n\n<div style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;">\n<p><span style="font-size:14px\;"><span style="font-family:verdana\;"><strong>CONTINUING EDUCATION CREDITS </strong><br />\n(ISC)&sup2\; accepts DBG&rsquo\;s Security Training Program as credit toward meeting the Continuing Professional Education requirements to maintain the CISSP designation. </span></span></p>\n\n<ul>\n	<li style="margin-top:3.0pt\;margin-right:0cm\;margin-bottom:0cm\;margin-bottom:.0001pt\;text-autospace:none\;">\n	<p><span style="font-size:14px\;"><span style="font-family:verdana\;">CISSP Constituents will earn 32 CPE credits</span></span></p>\n	</li>\n</ul>\n</div>\n\n<p style="margin-bottom: 0.0001pt\; text-align: justify\;"><br />\n<span style="font-family:arial\,sans-serif\;"><span style="font-size:10.0pt\;"><span style="font-size:14px\;"><span style="font-family:verdana\;"><strong>This training course is supported by:&nbsp\;</strong><br />\n<br />\n<img alt="" height="41" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9429/Image/zaNTEK.png" style="width: 310px\; height: 41px\;" width="310" /></span></span></span></span></p>\n\n<div style="margin-bottom:0cm\;margin-bottom:.0001pt\;text-align:justify\;"><br />\n<br />\n<br />\n&nbsp\;</div>\n
LOCATION:435 Ellice Ave\, Herzberg Room
UID:e.9429.1152
SEQUENCE:3
DTSTAMP:20260407T032018Z
URL:https://members.techmanitoba.ca/events/details/hardening-windows-networks-training-program-1152
END:VEVENT

END:VCALENDAR
