TypeClassroom Training
REGISTER

Contact Us

Fields marked with an * are required

 

CAST616-portfolio

Description

Audience & Prerequisites

Course Outline

Schedule & Fees

Certification

CAST 616 Securing Windows Infrastructure

This 3 day technical course focuses on the key aspects of Windows Infrastructure Security, applying best practices to secure interconnected information systems within your organization providing a holistically reliable framework to support an entire enterprise structure.
The CAST 616: Securing Windows Infrastructure is designed with the single purpose of providing Info-Sec professionals with complete knowledge and practical skills necessary to secure their network infrastructure which is fast becoming if already not a top priority plus a major tech challenge for most security conscious organizations.

Objectives

  • Breaking down the intricacies involved in a Windows Hardening process to little manageable bits
  • Attacking various infrastructure solutions to configure appropriate advanced security settings and defense
  • Hardening a Windows Environment by securing Windows objects and creating solution-related implementations
  • Analyzing and monitoring infrastructure performance and security
  • Examining the ways how data can be protected on a corporate user’s desktops and on file servers
  • Applying security settings to virtual private networks
  • Familiarizing the boot process and all the related investigation techniques
  • Exposing multiple methods to hacking operating systems, stealing information and getting malware into the network
  • Securing vital communications between servers

Intended Audience

  • Information Security Professionals
  • Government Agents
  • IT Administrators
  • IT Architects
  • Risk Assessment Professionals
  • Penetration Testers

Prerequisites

Candidates must have CEH or CEH (ANSI) credential to receive the CEH (Practical) credential.
Successful candidates can represent both of their credentials as CEH (ANSI) and CEH (Practical) credentials.

Course Outline                                       Duration: 3 Days

Unit 1: Windows 7 & 8 Hardening

This module covers a detailed deep-dive into Windows internal security mechanisms and their practical usage and adjustment.

  • Windows Kernel role
    • Kernel functionality
    • Kernel debugging (useful techniques)
    • Kernel security mechanisms and their practical implementation
    • Lab: Kernel digging
  • Securing operating system objects
    • Influencing the security of processes & threads
    • User account security (elevation of privileges, permissions, functionality, passwords, hardening)
    • Functionality and hardening of rights, permissions, privileges
    • Services security
    • Registry settings and activity
    • Lab: Securing system objects
    • Lab: Improving services security
    • Lab: Verifying the meaning of rights, permissions and privileges
    • Lab: System security bypass techniques and countermeasures
  • Modern malware and threats
    • Sensitive operating system areas
    • Techniques used by modern malware
    • Cases of the real attacks on sensitive areas (with the practical examples)
    • Protection mechanisms and countermeasures
    • Lab: Malware hunting
    • Lab: Stuxnet / other malware cases
  • Device Drivers
    • Types of drivers and their security considerations
    • Managing device drivers
    • Lab: Monitoring drivers
    • Lab: Driver Isolation
    • Lab: Signing drivers
  • Group Policy Settings
    • Useful GPO Settings for hardening
    • Customized GPO Templates
    • AGPM
    • Lab: Advanced GPO features
    • Lab: Implementing AGPM
  • Practical Cryptography
    • EFS
    • Deep-dive to BitLocker
    • 3rd party solutions
    • Lab: Implementing and managing BitLocker

After completing this module, students will be familiar with:

  • Threats and their effects
  • Points of entry to the client operating system
  • Secure configuration of the client operating system
  • Security management in the client operating system

Unit 2: Windows Server 2008 R2 / Windows Server 8 Hardening

This module focuses on server architecture, security issues an hardening

  • Securing Server Features
  • Public Key Infrastructures
    • Design considerations
    • Hardening techniques
    • Lab: PKI implementation
  • Active Directory
    • Design considerations for Windows Server 2008 R2 and Windows Server 8
    • Securing Domain Services
    • Schema configuration
    • New security features in Windows Server 8
    • Lab: Active Directory security in the single domain environment
    • Lab: Active Directory security in the multiple domains environment
  • Microsoft SQL Server hardening/li>
  • Installation considerations/li>
  • Configuring crucial security features/li>
  • Lab: Hardening Microsoft SQL Server

After completing this module, students will be familiar with:

  • Threats for servers and countermeasures
  • Points of entry to the server operating system
  • Solutions for server security
  • Hardening of the Windows related roles

Unit 3: Hardening Microsoft Network Roles

This module focuses on hardening and testing network related roles. Very intensive!

  • Hardening minor network roles
  • DNS Hardening
    • Improving DNS functionality
    • Hardening and designing DNS Role
    • Lab: Hardening DNS role
    • Lab: Testing the DNS configuration
  • Internet Information Security 7.5 / 8
    • Implementing secure web server
    • Implementing web site security
    • Monitoring security and performance
    • Lab: IIS Server Hardening
    • Lab: Web site security settings
    • Lab: Monitoring IIS under attack
  • IPSec
    • Implementing IPSec
    • Security polices in IPSec
    • Lab: Implementing Domain Isolation
    • Lab: Network Access Protection with IPSec
  • DirectAccess
    • Implementation Considerations
    • DirectAccess Security and Hardening
    • Lab: DirectAccess secure configuration demo
  • Remote Access
    • VPN Protocols
    • RDP Gateway
    • Unified Access Gateway
    • Network Access Protection
    • Lab: Configuring security settings in Network Policy Server
    • Lab: Configuring security settings in RDP Gateway
    • Lab: Securing UAG Configuration for applications
    • Lab: Network Access Protection implementation scenario
  • Firewall
    • Customizing the rules
    • Hardening Client and Server for Rule-Specific scenario
    • Lab: Managing Windows Firewall with Advanced Security

After completing this module, students will be familiar with:

  • Configuring secure remote access
  • Implementing Network Access Protection
  • Protocol misusage techniques and prevention actions
  • DNS advanced configuration
  • Hardening the Windows networking roles and services – in details
  • Building the secure web server

Unit 4: Windows High Availability

This module covers business continuity support technologies

  • Network Load Balancing design considerations and best practices
  • iSCSI configuration
  • Failover Clustering internals and security
  • Lab: Building IIS Cluster with NLB
  • Lab: Building the failover cluster

After completing this module, students will be familiar with:

  • High Availability technologies

Unit 5: Data and Application Security

This module covers solutions that greatly support information and data security

  • File Classification Infrastructure
  • Designing security for File Server
  • Active Directory Rights Management Services
  • AppLocker and Software Restriction Policy
  • Lab: Building secure solution with FCI and ADRMS
  • Lab: Securing and auditing a File Server
  • Lab: Restricting access to applications with Applocker and SRP
  • Lab: Software Restriction Policy (in) security

After completing this module, students will be familiar with:

  • Information and data protection solutions
  • Best practices of implementing data security solutions
  • Techniques for restricting access to data
  • Techniques of avoiding misusage of applications

Unit 6: Monitoring, Troubleshooting and Auditing Windows

This module covers all best practices regarding to monitoring, troubleshooting and auditing Windows. It is a prefect module for Windows investigators

  • Advanced logging and subscriptions
  • Analyzing and troubleshooting the boot process
  • Crash dump analysis
  • Auditing tools and techniques
  • Monitoring tools and techniques
  • Professional troubleshooting tools
  • Lab: Event logging and subscriptions
  • Lab: Monitoring the boot process
  • Lab: Blue Screen scenario

After completing this module, students will be familiar with:

  • Troubleshooting methodologies
  • Collecting data methodologies
  • Monitoring Windows after / during the attack and during situation specific events
  • Windows forensics

Unit 7: Automating Windows hardening

This module covers all best practices regarding to monitoring, troubleshooting and auditing Windows. It is a prefect module for Windows investigators

  • Advanced logging and subscriptions
  • Analyzing and troubleshooting the boot process
  • Crash dump analysis
  • Auditing tools and techniques
  • Monitoring tools and techniques
  • Professional troubleshooting tools
  • Lab: Event logging and subscriptions
  • Lab: Monitoring the boot process
  • Lab: Blue Screen scenario

After completing this module, students will be familiar with:

  • Troubleshooting methodologies
  • Collecting data methodologies
  • Monitoring Windows after / during the attack and during situation specific events
  • Windows forensics

Please write to us at info@itstechschool.com & contact us at +91-9870480053 for the course price & certification cost, schedule & location

Drop Us a Query

 

Certification

For more info kindly contact us.


Reviews