Join us at the Blue Team Summit! Register Here

Defending the Enterprise with Kent Ickler and Jordan Drysdale

Course Authored by and .

For new and legacy enterprises alike, Defending the Enterprise explores the configuration practices and opportunities that secure networks, Windows, and Active Directory from the most common and effective adversarial techniques.

On-Demand $575.00

Course Length: 16 Hours



Next scheduled date: Content is loading, please wait.

Description

For new and legacy enterprises alike, Defending the Enterprise explores the configuration practices and opportunities that secure networks, Windows, and Active Directory from the most common and effective adversarial techniques.

For the luckiest of enterprises, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management, Active Directory, organizational change, and an increasingly experienced adversary.

Have the confidence that your organization is prepared for tomorrow’s security threats by learning how to defend against network poisoning, credential abuse, exploitable vulnerabilities, lateral movement, and privilege escalation. Learn cost-effective mitigations to contemporary adversarial attacks.

The best defended networks are those which have matured from countless penetration tests and security incidents. Learn from Kent and Jordan, two seasoned offensive and defensive security experts, to shortcut your organization’s security posture into a well-fortified fortress.

System Requirements
  • Student Requirements
    • Some experience with Active Directory
    • The ability to access RDP (Remote Desktop)
    • A GitHub account to access course content
  • What Each Student Should Bring
    • High-speed Internet connectivity
    • Your computer

FAQ

Who Should Take This Course
This course is a must for corporations just bringing their information security program online and for organizations seeking to improve their security posture. This course will prepare an organization for detecting and defending against modern attackers, for penetration tests, and for any security audit or compliance framework.

Organizations looking to effectively defend their information security operations without costly additional administrative overhead will also benefit from the demonstrated defensive methodology. Defending the Enterprise provides budget-conscious solutions that limit and reduce additional product licensing costs. The tools and techniques demonstrated in this course will also supplement an organization’s existing software and tools that may be underutilized or not utilized at all.

The following types of individuals may also find this course of interest:

IT Systems Administrators
IT Security Management and Leadership
Helpdesk Technicians and Analysts
Network Engineers
Information Security Professionals
General Security Practitioners and Enthusiasts
Active Directory / Windows Engineers
Audience Skill Level
Students should have general Windows operating knowledge. Ideally, students should be in a position to make lasting changes to a Windows Active Directory environment. A motivated student will be ready to learn best-practice configurations, build system security policies, manage strategic change, and operate defensive controls to stop adversarial attack chains.
What Each Student Will Be Provided With
Access to digital copy of course content, including all of the labs, slide decks, sample packet captures, and other course-related artifacts
Access to course recordings for 6 months
Best practice guides, cheat sheets, syntax cards (digital)
A certificate of completion

About the Instructors

Pixel splash background
Kent Ickler
Kent Ickler
Bio

Kent started his Information Technology career working for an Internet Service Provider supporting the MidWest’s broadband initiatives of the early 2000s. His interest in technology and business operations drove his career into working for multiple Fortune 500 companies and equipping their organizational leadership with business analytical data that would support their technology initiatives. With an understanding of Information Technology, System Administration, Accounting, and Business Law, Kent has helped businesses leverage technology for competitive advantage while balancing the risks associated with today’s dynamic network environments. Kent has been with Black Hills Information Security for three years in security and administration roles.

Pixel splash background
Jordan Drysdale
Jordan Drysdale
"Cybersecurity is not who I am, though I am quite passionate about it."
Bio

Jordan Drysdale has been with the Black Hills Information Security (BHIS) tribe since December 2015. He is a Security Analyst, as well as a member of the systems administration team. Jordan came to BHIS with a strong background, including many years in networking tech support and engineering for HP, UNi, and Managed Services — he never stops learning and sharpening his skills.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.