» » SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos
Information to the news
  • Views: 207
  • Author: turkensai
  • Date: 14-11-2019, 07:12
14-11-2019, 07:12

Free Download SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos

Category: Tutorials


SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos

SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos | 3.87 GB + 1.27 GB

Day 1: PowerShell Scripting

New to scripting? No problem!
PowerShell remoting
Running cmdlets and scripts
Writing your own functions and scripts
Flow control within scripts
Accessing COM and .NET objects
Security and execution policy
Day 2: Operating System and Applications Hardening

PowerShell and Windows Management Instrumentation (WMI)
How your anti-virus scanners can fail you
AppLocker whitelisting
Microsoft EMET
Windows OS and application hardening tools
Group Policy Management Console (GPMC)
INF and XML Security templates
How to manage Group Policy
WMI filtering and GPO preferences
Virtual Desktop Infrastructure (VDI)
Day 3: High-Value Targets and Restricting Admin Compromise

PowerShell for Active Directory
What makes something a high-value target?
Users in the local Administrators group
Limiting privileges, logon rights, and permissions
Windows 3D facial scan biometrics
Token abuse and pass-the-hash attack mitigations
User Account Control (UAC)
Delegating IT power more safely
Organizational units for role-based controls
Active Directory permissions for delegation
Active Directory auditing and logging
Day 4: Windows PKI, Smart Cards, and Managing Cryptography

PowerShell for PKI
Hardening SSL and TLS
Why Public Key Infrastructure (PKI) is mandatory
Examples: Smart Cards, VPNs, Wireless, SSL, S/MIME, etc.
How to install and manage PKI
Root vs. subordinate certification authorities
Should you be your own root Certification Authority (CA)?
Detecting malicious trusted CA changes with PowerShell
Group policy deployment of certificates
How to revoke certificates
Automatic private key backup
Deploying smart cards
Best practices for private key security
Day 5: Server Hardening, IPSec, and Critical Protocols

PowerShell for IPSec and firewall rules
A recipe for hardening servers
Dangerous protocols: SSL, RDP, IPv6, and SMB
SMBv3 encryption and downgrade attacks
Pre-forensics and incident response preparation
Service accounts and recovery
Scheduling elevated tasks safely
Protocol stack hardening
Kerberos armoring and restricting NTLM
Server Nano versus Server Core
Isn’t IPSec just for VPNs? No!
How to create IPSec policies
Windows Firewall and IPSec integration
Group Policy for IPSec and firewall rules
Day 6: Dynamic Access Control and Hardening DNS

What is Dynamic Access Control (DAC)?
DAC for data loss prevention
DAC for complying with regulations
PowerShell for DAC
Automatic File Classification Infrastructure
PowerShell for managing DNS
DNSSEC response validation
DNS secure dynamic updates
DNS sinkholes for malware
You Will Learn:

How to harden Windows clients and servers against attack.
How to use PowerShell
How to reduce the rate of APT malware infections.
How to use PowerShell and Group Policy to manage security.
How to implement PKI, AppLocker, IPSec, and more.
How to do pre-forensics to prepare for incident response.

Download link:




Links are Interchangeable - Single Extraction - Premium is support resumable

Tags: SANS SEC505 Securing Windows with

Dear visitor, you entered the site as an unregistered user.
We recommend you to register or login to the website using your name.

Add comment

Name:*
E-Mail:
Comment:
Enter the code: *
reload, if the code cannot be seen