Register now for our upcoming December Secure Code Summit! Register Here
Shopping Cart

No products in the cart.

Defending the Enterprise with Kent Ickler and Jordan Drysdale

Defending the Enterprise with Kent Ickler and Jordan Drysdale

Overview

  • Course Length: 16 hours
  • Support from expert instructors
  • Includes a certificate of completion
  • 12 months access to Cyber Range
Instructors:
and

For new and legacy enterprises alike, Defending the Enterprise explores the configuration practices and opportunities that secure networks, Windows, and Active Directory from the most common and effective adversarial techniques.

For the luckiest of enterprises, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management, Active Directory, organizational change, and an increasingly experienced adversary.

Have the confidence that your organization is prepared for tomorrow’s security threats by learning how to defend against network poisoning, credential abuse, exploitable vulnerabilities, lateral movement, and privilege escalation. Learn cost-effective mitigations to contemporary adversarial attacks.

The best defended networks are those which have matured from countless penetration tests and security incidents. Learn from Kent and Jordan, two seasoned offensive and defensive security experts, to shortcut your organization’s security posture into a well-fortified fortress.

Instructors:

Jordan Drysdale

Who Should Take This Course

This course is a must for corporations just bringing their information security program online and for organizations seeking to improve their security posture. This course will prepare an organization for detecting and defending against modern attackers, for penetration tests, and for any security audit or compliance framework.

Organizations looking to effectively defend their information security operations without costly additional administrative overhead will also benefit from the demonstrated defensive methodology. Defending the Enterprise provides budget-conscious solutions that limit and reduce additional product licensing costs. The tools and techniques demonstrated in this course will also supplement an organization’s existing software and tools that may be underutilized or not utilized at all.

The following types of individuals may also find this course of interest:

  • IT Systems Administrators
  • IT Security Management and Leadership
  • Helpdesk Technicians and Analysts
  • Network Engineers
  • Information Security Professionals
  • General Security Practitioners and Enthusiasts
  • Active Directory / Windows Engineers

Audience Skill Level

Students should have general Windows operating knowledge. Ideally, students should be in a position to make lasting changes to a Windows Active Directory environment. A motivated student will be ready to learn best-practice configurations, build system security policies, manage strategic change, and operate defensive controls to stop adversarial attack chains.

Student Requirements

Prior to attending the course, students should have:

  • Some experience with Active Directory
  • The ability to access RDP (Remote Desktop)
  • A GitHub account to access course content

What Each Student Should Bring

  • High-speed Internet connectivity
  • Your computer

What Each Student Will Be Provided With

  • Access to digital copy of course content, including all of the labs, slide decks, sample packet captures, and other course-related artifacts
  • Access to course recordings for 6 months
  • Best practice guides, cheat sheets, syntax cards (digital)
  • A certificate of completion

There are no scheduled live dates for this course at this time. Private training may be available.

On Demand Training

  • Train at your own pace with no set course schedule
  • Access to all course resources, including slides and VMs
  • Subject Matter Expert support through Discord
  • Tips, tools, and techniques that can be applied immediately upon returning to work
  • Strengthen your skills by solving challenges within the Antisyphon Cyber Range
  • Become part of a community driven to educate and share knowledge
Choose an access term

$575.00

$575.00

Course Categories:

Blue Team

Course Inquiry

Course Defending the Enterprise with Kent Ickler and Jordan Drysdale