Deep Inside Windows Security Day 2 – Part 2/2

DAY 2

Deep Inside Principle of Least Privilege

  • How to make your company understand that admin rights are no good
  • How to effectively remove admin rights easily
  • How to remove admin rights without budget
  • How this is done in real environments ranging from 10 to 350000 endpoints

Deep Inside Pass-the-Hash prevention

  • How to build a layered management system and Active Directory in real life
  • How to use PtH prevention techniques like protected LSASS, Credential Guard and Remote Credential Guard
  • How to build Privilege Access Workstations (PAW) effectively

What you don’t know about the future of Windows “10” that might change everything

  • Can’t tell you
  • Can’t tell you
  • Can’t tell you

Deep Inside Windows Security Day 2 – Part 1/2

DAY 2

Deep Inside Principle of Least Privilege

  • How to make your company understand that admin rights are no good
  • How to effectively remove admin rights easily
  • How to remove admin rights without budget
  • How this is done in real environments ranging from 10 to 350000 endpoints

Deep Inside Pass-the-Hash prevention

  • How to build a layered management system and Active Directory in real life
  • How to use PtH prevention techniques like protected LSASS, Credential Guard and Remote Credential Guard
  • How to build Privilege Access Workstations (PAW) effectively

What you don’t know about the future of Windows “10” that might change everything

  • Can’t tell you
  • Can’t tell you
  • Can’t tell you

Deep Inside Windows Security Day 1 – Part 1/2

DAY1

Deep Inside AppLocker

  • How AppLocker works
  • How to manage AppLocker
  • How to monitor AppLocker
  • AppLocker and PowerShell
  • AppLocker with Windows 10
  • AppLocker and MDM/Intune
  • How to use AppLocker in real life

Deep Inside Device Guard

  • How Device Guard really works
  • Setting up Device Guard
  • Monitoring Device Guard
  • Device Guard vs AppLocker
  • Device Guard’s present and future features and status
  • How to use Device Guard in real life

Deep Inside BitLocker

  • How BitLocker really works
  • How to manage BitLocker in real life
  • BitLocker in Windows 10
  • How to hack/unhack BitLocker

Deep Inside Windows Security Day 1 – Part 2/2

DAY1

Deep Inside AppLocker

  • How AppLocker works
  • How to manage AppLocker
  • How to monitor AppLocker
  • AppLocker and PowerShell
  • AppLocker with Windows 10
  • AppLocker and MDM/Intune
  • How to use AppLocker in real life

Deep Inside Device Guard

  • How Device Guard really works
  • Setting up Device Guard
  • Monitoring Device Guard
  • Device Guard vs AppLocker
  • Device Guard’s present and future features and status
  • How to use Device Guard in real life

Deep Inside BitLocker

  • How BitLocker really works
  • How to manage BitLocker in real life
  • BitLocker in Windows 10
  • How to hack/unhack BitLocker