Main › EC-Council Certified Incident Handler V2

EC-Council Certified Incident Handler V2

EC-Council Certified Incident Handler V2

Course description:

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.

It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.

Following a rigorous development which included a careful Job Task Analysis (JTA) related to incident handling and incident first responder jobs, EC-Council developed a highly interactive, comprehensive, standards-based, intensive 3-day training program and certification that provides a structured approach to learning real-world incident handling and response requirements.

Purpose of the course:

  • To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
  • To ensure that organization can identify, contain, and recover from an attack.
  • To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
  • To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
  • To minimize the loss and after-effects breach of the incident.
  • For individuals: To enhance skills on incident handling and boost their employability.

Course objectives:

  • Understand the key issues plaguing the information security world
  • Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
  • Learn the fundamentals of incident management including the signs and costs of an incident
  • Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
  • Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
  • Decode the various steps involved in planning an incident handling and response program
  • Gain an understanding of the fundamentals of computer forensics and forensic readiness
  • Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
  • Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
  • Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents

For whom this course is suitable:

  • Penetration Testers
  • Vulnerability Assessment Auditors
  • Risk Assessment Administrators
  • Network Administrators
  • Application Security Engineers
  • Cyber Forensic Investigators/ Analyst and SOC Analyst
  • System Administrators/Engineers
  • Firewall Administrators and Network Managers/IT Managers

Course Outline:

  • Module 01: Introduction to Incident Handling and Response
  • Module 02: Incident Handling and Response Process
  • Module 03: Forensic Readiness and First Response
  • Module 04: Handling and Responding to Malware Incidents
  • Module 05: Handling and Responding to Email Security Incidents
  • Module 06: Handling and Responding to Network Security Incidents
  • Module 07: Handling and Responding to Web Application Security Incidents
  • Module 08: Handling and Responding to Cloud Security Incidents
  • Module 09: Handling and Responding to Insider Threats

What you will get as part of the course:

– authorized educational literature

– access to practical laboratory work

– a trainer certified by the EC-Council company

– a certificate of completion of official training on the course

Full course description https://www.eccouncil.org/ECIH-v2

*the E|CIH exam can be taken after completing the official E|CIH course

Main › EC-Council СHFI v9

EC-Council СHFI v9

EC-Council СHFI v9

The purpose of the course is to give students the knowledge and skills to work with key techniques for detecting computer crimes both in the local network and when interacting on the Internet with mobile clients and cloud services. Also in the course are widely presented software products for collecting and recovering information that indicates an intrusion into the system.

Audience
This course provides extensive knowledge of security analysis of modern computer networks and will be useful to all interested IT professionals, including network and system administrators and IT managers. The course will be of interest to information security officers, law enforcement officers and military officials involved in investigating computer network intrusions. In addition, the course is useful for security professionals in preparation for international certification.

At the end of the course students will be able to:
– Independently detect intrusions into the OS, web applications, mobile devices and cloud services;
– Use proven methods of intrusion detection;
– Gather evidence to support the invasion;
– Use specialized tools for analysis of intrusions;
– Analyze text, graphic or media traffic flows for bookmarks;
– Analyze storage systems to detect traces of intrusion;
– Restore and analyze the state of non-volatile (non-volatile) and random access (volatile) memory from Windows, Mac and Linux;
– Recover deleted files and partitions in Windows, Mac and Linux;
– Analyze the state of systems against insider attacks;
– Apply the technique of reverse engineering to analyze the attacking code;
– Detect hacking (or attempted hacking) of password files;
– Extract and analyze logs of proxy servers, firewalls, intrusion detection / prevention systems, workstations, servers, switches, routers, domain controllers, DNS and DHCP servers, access control systems and other devices;
– Take the necessary measures to transfer evidence to law enforcement agencies.

Certification exams
The course helps to prepare for the following certification exams:
312-49: Computer Hacking Forensic Investigator

Preparation required
To learn effectively, students must have the following knowledge and skills:
– Experience working with client and server operating systems;
– Understanding the operation of the network and network devices;
– understanding of basic security concepts;
– CEH and CND courses or equivalent knowledge and skills.

Listener’s materials
Students are provided with a branded textbook and manual for laboratory work (electronically), as well as other materials and software needed to perform these works.

Module 1: Investigating IS incidents around the world
Topics

  • Identification of computer threats
  • Classification of cyber-attacks
  • Challenges for cybercrime researchers
  • Types of cyber-attacks and basic rules of investigation
  • Evidence collection rules and basic types of digital evidence
  • Assessment of incident preparedness and action plan
  • The scope of activities of computer security incident investigators and the area of ​​responsibility
  • Review of legal, ethical and confidential issues during the investigation of the incident

Module 2: IS Incident Investigation Process
Topics

  • The process of investigating the IS incident
  • Stages of the IS incident investigation process
  • Requirements for the laboratory environment and the team of incident investigators
  • Research software
  • Tasks of the first researchers of the IS incident
  • Finding evidence and gathering evidence
  • Placement and storage of evidence
  • Deduplication of data, recovery of deleted data and verification of evidence
  • Writing a report
    Lab:
  • Data recovery using EasyUS Data Recovery Wizard;
  • Use HashCalc to calculate a hash, checksum, or HMAC;
  • Using MD5 Calculator;
  • View files of various formats through File Viewer;
  • Detection of traces of work with data by means of P2 Commander;
  • Create a partition image using R-Drive Image.

Module 3: Collecting evidence from disks and file systems
Topics

  • Classification of computer network security tools
  • Methods and means of access control
  • Methods and means of authentication, authorization and audit of access
  • A brief overview of the main methods of cryptographic protection of information
  • Basic classes of hardware and software for computer network protection and principles of their operation
  • Network protocols designed to ensure security and the principles of their operation
    Lab:
  • Detect deleted files using WinHex;
  • File system analysis using The Sleuth Kit;
  • Raw image analysis using Autopsy.

Module 4: Investigating Operating System Incidents
Topics

  • Methods of obtaining data
  • Getting current data
  • Teaching static data
  • Duplication of data
  • Device change lock
  • Methods and means of obtaining data
  • Get data in Windows and Linux
    Lab:
  • Research the NTFS partition using DiskExplorer for NTFS;
  • View graphic content with the FTK Imager Tool.

Module 5: Countering methods of concealing evidence
Topics

  • Countering methods of concealing evidence and the purpose of counteraction
  • Review of techniques for counteracting methods of concealing evidence
  • Extraction of evidence from deleted files and sections, files with password protection and steganography
  • Code entanglement, artifact stripping, data / metadata overwriting and encryption
  • Methods for detecting encryption protocols, program packers and rootkits.
  • Countermeasures to counter methods of concealing evidence
    Lab:
  • Hacking application passwords;
  • Detection of steganography.

Module 6: Methods of data collection and copying
Topics

  • Check for data that changes and does not change Windows
  • Windows memory and registry analysis
  • Check cache, cookies and browser history
  • Check Windows files and metadata
  • Analyze text logs and Windows event logs
  • Linux log commands and files
  • Check Mac logs
    Lab:
  • Detection and removal of materials hidden on the computer using OSForensics;
  • Get information about the download process using ProcessExplorer;
  • View, monitor and analyze events using Event Log Explorer;
  • Computer research on penetration using Helix;
  • Obtaining variable (operational) data in Linux;
  • Analysis of immutable (static) data in Linux.

Module 7: Investigation of network technology incidents
Topics

  • Network intrusions
  • Basic concepts of journaling
  • An overview of ways to compare events
  • Check routers, firewalls, IDS, DHCP and ODBC logs
  • Checking network traffic
  • Collection of evidence of network penetration
  • Reconstruction of the invasion
    Lab:;
  • Interception and analysis of events using GFI EventsManager;
  • Incident investigation and data collection using XpoLog Center Suite;
  • Investigate network attacks with Kiwi Log Viewer;
  • Track network traffic with Wireshark.

Module 8: Investigating Web Application Attacks
Topics

  • Threats to web applications
  • Web application architecture
  • Web attacks and steps to implement them
  • Web attacks on a Windows server
  • IIS server architecture and work with its log
  • Apache web server architecture and work with its log
  • Ways to attack web applications
    Lab:
  • Domain network analysis and IP address requests using SmartWhois.

Module 9: Investigation of DBMS incidents
Topics

  • Database threats
  • MSSQL threats
  • Signs of database intrusion
  • Collect evidence of intrusion using SQL Server Management Studio and Apex SQL DBA
  • MySQL threats
  • MySQL architecture and definition of data directory structure
  • Utilities for analyzing and collecting evidence of penetration into MySQL
  • MySQL threats to WordPress web application databases
    Lab:
  • Extract database from Android devices using Andriller;
  • SQLite database analysis using DB Browser for SQLite;
  • Study the MySQL database.

Module 10: Investigation of incidents related to cloud programs
Topics

  • Description of the principles of cloud computing
  • Cloud attacks
  • Ways to protect the clouds
  • Cloud protection stakeholders
  • DropBox and GoogleDrive cloud services
    Lab:
  • Detection of vulnerabilities in DropBox;
  • Google Drive research.

Module 11: Investigation of malicious code incidents
Topics

  • Ways to penetrate malware into the OS
  • Basic components and malware distribution
  • Malware protection concept
  • Detection and removal of malware from systems
  • Malware analysis – analysis rules and test environment
  • Static and dynamic analysis of malware
    Lab:
  • Static analysis of suspicious files;
  • Dynamic analysis of malicious code;
  • Analysis of infected PDF-files;
  • Scanning PDF files using web resources;
  • Scan suspicious MS Office files.

Module 12: Investigating Email Incidents
Topics

  • Mail systems, mail clients and mail servers
  • Account management
  • Email attacks
  • Components of e-mail messages
  • Common headers and X-headers
  • Detect mail attacks
  • Tools for analyzing e-mails
  • American law CAN-SPAM
    Lab:
  • Recover deleted emails with Recover My Email;
  • Detection of dangerous messages with Paraben’s Email Examiner;
  • Track emails with eMailTrackerPro.

Module 13: Investigating Mobile Incidents
Topics

  • Threats to mobile devices
  • Features of hacking of mobile devices and mobile OS
  • Mobile device architecture
  • Android stack architecture and download process
  • IOS stack architecture and download process
  • Mobile data storage
  • Preparation and invasion of mobile OS
    Lab:
  • Analysis of dangerous images and recovery of deleted files using Autopsy;
  • Explore your Android device with Andriller.

Module 14: Preparation of Incident Investigation Reports
Topics

  • The structure of the incident investigation report
  • Signs of a good report
  • Incident investigation report template
  • Classification of reports and manuals for their writing
  • Expert opinions in the report
  • Differences between technical and expert opinions
  • Daubert and Fyre standards
  • Ethical standards during the investigation

Complete information about the course computer-hacking-forensic-investigator-v9

The course price is $ 1,500

Main › EC-Council CEH v11

EC-Council CEH v11

EC-Council CEH v11

Course description

The Certified Ethical Hacker Certificate (CEH) is the most trusted certification and ethical hacking achievement recommended by employers worldwide. It is the most coveted certificate of information security and is one of the fastest growing cyber resources needed by critical infrastructure and major service providers. Since the introduction of CEH in 2003, it has been recognized as a standard in the information security community. CEH v11 continues to implement the latest hacking methods and state-of-the-art hacking and use tools used today by hackers and information security professionals. The five phases of ethical hacking and CEH’s initial core mission remain relevant today: “To defeat a hacker, you have to think like a hacker.”

The purpose of the course

To provide students with knowledge and skills to form a systematic approach to computer security, to teach methods to check the security of various nodes of a computer network and to acquaint students with the tools of attackers, their advantages and limitations.

To learn effectively, students must have the following knowledge and skills:

– Experience working with client and server operating systems;
– Understanding the operation of the network and network devices;
– Understanding of basic security concepts.

Course program

Module 1: Introduction to Ethical Hacking
Module 2: Traces and Intelligence
Module 3: Network Scanning
Module 4: Enumeration
Module 5: Vulnerability Analysis
Module 6: System Hacking
Module 7: Threats to Malware
Module 8: Sniffing
Module 9: Social Engineering
Module 10: Denial of Service
Module 11: Abduction Session
Module 12: Evasion of IDS, Firewalls and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL injection
Module 16: Hacking Wireless Networks
Module 17: Hacking mobile platforms
Module 18: IoT and OT hacking
Module 19: Cloud Computing
Module 20: Cryptography

What you will receive as part of the course:

– authorized educational literature
– access to practical laboratory works iLabs
– EC-Council certified trainer
– certificate of official training at the CEH course
– voucher for passing the exam
– after successfully passing the exam – a certificate confirming the competencies of a certified ethical hacker.

Full course description cehv11-brochure-hacker-v11

The course price is 2000$ 1200$

Main › Managing Modern Desktops

Managing Modern Desktops

Managing Modern Desktops

Course description:

During MD-101, Managing Modern Desktops participants discuss how to implement and plan an operating system deployment strategy using modern deployment techniques and how to implement strategy updates. The course explores what it takes to connect Microsoft Intune to your organization. In the course of training and methods of deployment of management of applications and browser applications are studied.

Module 1: Modern Management

This module explains the concepts of supporting the desktop through it’s entire lifecycle. Finally, students will be introduced to the tools and strategies used for desktop deployment. Students well be introduced to the concept of directory in the cloud with Azure AD. Students will learn the similarities and differences between Azure AD and Active Directory DS and how to synchronize between the two. Students will explore identity management in Azure AD and learn about identity protection using Windows Hello for Business, as well as Azure AD Identity Protection and multi-factor authentication.Lesson

  • The Enterprise Desktop
  • Azure AD Overview
  • Managing Identities in Azure AD

Lab : Managing identities in Azure ADLab : Using Azure AD Connect to connect Active Directories

After completing this module, students will be able to:

  • Describe the enterprise desktop lifecycle.
  • Describe the capabilities of Azure AD.
  • Manage users using Azure AD with Active Directory DS.
  • Implement Windows Hello for Business.
  • Join devices to Azure AD.

Module 2: Device Enrollment

This module will also cover Azure AD join and will be introduced to Microsoft Endpoint Manager, as well as learn how to configure policies for enrolling devices to Endpoint Manager and Intune.Lesson

  • Manage Device Authentication
  • Device Enrollment using Microsoft Endpoint Configuration Manager
  • Device Enrollment using Microsoft Intune

Lab : Configuring and managing Azure AD JoinLab : Manage Device Enrollment into IntuneLab : Enrolling devices into Microsoft Intune

After completing this module, students will be able to:

  • Configure and join devices to Azure AD
  • Configure device enrollment in Microsoft Endpoint Manager
  • Enroll devices in Endpoint Configuration Manager and Intune

Module 3: Configuring Profiles

This module dives deeper into Intune device profiles including the types of device profiles and the difference between built-in and custom profiles. The student will learn about assigning profiles to Azure AD groups and monitoring devices and profiles in Intune. You will be introduced to the various user profile types that exist in Windows for on-premises devices. You will learn about the benefits of various profiles and how to switch between types of profiles. You will examine how Folder Redirection works and how to set it up. The lesson will then conclude with an overview of Enterprise State roaming and how to configure it for Azure AD devices.

Lesson

  • Configuring Device Profiles
  • Managing User Profiles

Lab : Creating and Deploying Configuration ProfilesLab : Monitor device and user activity in IntuneLab : Configuring Enterprise State RoamingAfter completing this module, you should be able to:

  • Describe the various types of device profiles in Intune
  • Create, manage and monitor profiles
  • Manage PowerShell scripts in Intune
  • Explain the various user profile types that exist in Windows.
  • Explain how to deploy and configure Folder Redirection.
  • Configure Enterprise State Roaming for Azure AD devices.

Module 4: Application Management

In this module, students learn about application management on-premise and cloud-based solutions. This module will cover how to manage Office 365 ProPlus deployments in Endpoint Manager as well as how to manage apps on non-enrolled devices. The module will also include managing Win32 apps and deployment using the Microsoft Store for Business. This module will conclude with an overview of Microsoft Edge and Enterprise Mode.

Lesson

  • Implement Mobile Application Management (MAM)
  • Deploying and updating applications
  • Administering applications

Lab : Deploying cloud apps using IntuneLab : Configure App Protection Policies for Mobile DeviceLab : Deploy Apps using Endpoint Configuration ManagerLab : Deploy Apps using Microsoft Store for Business

After completing this module, students will be able to:

  • Describe the methods for application management.
  • Deploy applications using Endpoint Manager and Group Policy.
  • Configure Microsoft Store for Business.
  • Deploy Office365 ProPlus using Intune.
  • Manage and report application inventory and licenses.

Module 5: Managing Authentication in Azure AD

This module covers the various solutions for managing authentication. The student will also learn about the different types of VPNs. This module also covers compliance policies and how to create conditional access policies.

Lesson

  • Protecting Identities in Azure AD
  • Enabling Organization Access
  • Implement Device Compliance Policies
  • Using Reporting

Lab : Configuring Multi-factor AuthenticationLab : Configuring Self-service password reset for user accounts in Azure ADLab : Configuring and validating device complianceLab : Creating device inventory reports

After completing this module, students will be able to:

  • Describe Windows Hello for Business
  • Describe Azure AD Identity Protection
  • Describe and manage multi-factor authentication
  • Describe VPN types and configuration
  • Deploy device compliance and conditional access policies
  • Generate inventory reports and Compliance reports using Endpoint Manager

 

Module 6: Managing Security

In this module, students will learn about data protection. Topics will include Windows & Azure Information Protection, and various encryption technologies supported in Windows 10. This module also covers key capabilities of Windows Defender Advanced Threat Protection and how to implement these capabilities on devices in your organization. The module concludes using Windows Defender and using functionalities such as antivirus, firewall and Credential Guard.

Lesson

  • Implement device data protection
  • Managing Windows Defender ATP
  • Managing Windows Defender in Windows 10

Lab : Configure and Deploy Windows Information Protection Policies by using IntuneLab : Configuring Endpoint security using IntuneLab : Configuring Disk Encryption Using Intune

After completing this module, students will be able to:

  • Describe the methods protecting device data.
  • Describe the capabilities and benefits of Windows ATP.
  • Deploy and manage settings for Windows Defender clients.

Module 7: Deployment using Microsoft Endpoint Manager – Part 1

In this two-part module, students well be introduced to deployment using Microsoft Endpoint Manager. Part 1 will cover the tools for assessing the infrastructure and planning a deployment, followed by deployment using the Microsoft Deployment Toolkit and Endpoint Configuration Manager.

Lesson

  • Assessing Deployment Readiness
  • On-Premise Deployment Tools and Strategies

Lab : Deploying Windows 10 using Microsoft Deployment ToolkitLab : Deploying Windows 10 using Endpoint Configuration Manager

After completing this module, students will be able to:

  • Describe the tools for planning a deployment.
  • Deploy Windows 10 using the Microsoft Deployment Toolkit
  • Deploy Windows 10 using Endpoint Configuration Manager

Module 8: Deployment using Microsoft Endpoint Manager – Part 2

This module continues with deployment using Microsoft Endpoint Manager. In part two, the student will learn about using Windows Autopilot and deployment using Microsoft Intune. This module will also include dynamic OS deployment methods, such as Subscription Activation. The module will conclude learning how Co-Management can be used to transitioning to modern management.

Lesson

  • Deploying New Devices
  • Dynamic Deployment Methods
  • Planning a Transition to Modern Management

Lab : Deploying Windows 10 with AutopilotLab : Configuring Co-Management Using Configuration Manager

After completing this module, students will be able to:

  • Deploy Windows 10 using Autopilot
  • Configure OS deployment using subscription activation and provisioning packages
  • Upgrade, migrate and manage devices using modern management methods

Module 9: Managing Updates for Windows 10

This module covers managing updates to Windows. This module introduces the servicing options for Windows 10. Students will learn the different methods for deploying updates and how to configure windows update policies. Finally, students will learn how to ensure and monitor updates using Desktop Analytics.

Lesson

  • Updating Windows 10
  • Windows Update for Business
  • Desktop Analytics

Lab : Managing Windows 10 security and feature updates

After completing this module, students will be able to:

  • Describe the Windows 10 servicing channels.
  • Configure a Windows update policy using Group Policy settings.
  • Configure Windows Update for Business to deploy OS updates.
  • Use Desktop Analytics to assess upgrade readiness.

The course price is $ 800

Main › Windows Server 2019 Administration

Windows Server 2019 Administration

Windows Server 2019 Administration

This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations.

Audience profile

This course is intended for Information Technology (IT) Professionals who have some experiencing working with Windows Server and are looking for a single five-day course that covers core administration components and technologies in Windows Server 2019. This course also helps server administrators from previous Windows Server versions to update their knowledge and skills related to Windows Server 2019. Additionally, this course can help individuals looking for preparation materials to pass exams related to Windows Server. The course is also to individuals from a service desk role who wish to transition into server maintenance.

Skills gained

  • Use administrative techniques and tools in Windows Server 2019.
  • Implement identity Services.
  • Manage network infrastructure services.

Prerequisites

  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
  • Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
  • An awareness of basic security best practices.
  • Experience working hands-on with Windows client operating systems such as Windows 8, Windows 8.1 or Windows 10.
  • Basic experience with Windows PowerShell.

Course outline

Module 1: Windows Server Administration Overview

This module describes how to distinguish different Windows Server 2019 editions and techniques for deployment, servicing and activation. The module also introduces Windows Server Core and compares it with the Desktop Experience version. The module describes tools and concepts for adminstering Windows Server, such as Windows Admin Center, PowerShell, and delegation of privileges.

Lessons

  • Overview of Windows Server administration principles and tools
  • Introducing Windows Server 2019
  • Windows Server Core Overview

Lab : Deploying and configuring Windows Server

  • Deploying and configuring Server Core
  • Implementing and using remote server administration

After completing this module, students will be able to:

  • Describe Windows Server as well as techniques for deployment, servicing and activation.
  • Describe Windows Server Core, its specifics and ways to administer it.

Module 2: Identity Services in Windows Server

This module introduces identity services and describes Active Directory Domain Services (AD DS) in a Windows Server environment. The module describes how to deploy domain controllers in AD DS, as well as the Azure Active Directory (AD) and the benefits of integrating Azure AD with AD DS. The module also covers Group Policy basics and how to configure group policy objects (GPOs) in a domain environment. Finally, the modules describes the role of Active Directory certificate services and certificate usage.

Lessons

  • Overview of AD DS
  • Deploying Windows Server domain controllers
  • Overview of Azure AD
  • Implementing Group Policy
  • Overview of Active Directory Certificate Services

Lab : Implementing identity services and Group Policy

  • Deploying a new domain controller on Server Core
  • Configuring Group Policy
  • Deploying and using certificate services

After completing this module, students will be able to:

  • Describe AD DS in a Windows Server environment.
  • Deploy domain controllers in AD DS.
  • Describe Azure AD and benefits of integrating Azure AD with AD DS.
  • Explain Group Policy basics and configure GPOs in a domain environment
  • Describe the role of Active Directory certificate services and certificate usage

Module 3: Network Infrastructure services in Windows Server

This module describes how to implement core network infrastructure services in Windows Server. The modules covers how to deploy, configure and manage DNS and IPAM. The modules also describes how to use Remote Access Services.

Lessons

  • Deploying and managing DHCP
  • Deploying and managing DNS services
  • Deploying and managing IPAM

Lab : Implementing and configuring network infrastructure services in Windows Server

  • Deploying and configuring DHCP
  • Deploying and configuring DNS

After completing this module, students will be able to:

  • Describe, deploy and configure DHCP service.
  • Deploy, configure and manage DNS.
  • Describe, deploy and manage IPAM.

Module 4: File Servers and Storage management in Windows Server

This modules describes how to configure file servers and storage in Windows Server. The module covers file sharing and deployment of Storage Spaces technology. The module describes how to implement data deduplication, iSCSI based storage in Windows Server, and finally, how to deploy DFS.

Lessons

  • Volumes and file systems in Windows Server
  • Implementing sharing in Windows Server
  • Implementing Storage Spaces in Windows Server
  • Implementing Data Deduplication
  • Implementing iSCSI
  • Deploying Distributed File System

Lab : Implementing storage solutions in Windows Server

  • Implementing Data Deduplication
  • Configuring iSCSI storage
  • Configuring redundant storage spaces
  • Implementing Storage Spaces Direct

After completing this module, students will be able to:

  • Implement sharing in Windows Server
  • Deploy Storage Spaces technology
  • Implement the data deduplication feature
  • Implement iSCSI based storage
  • Deploy and manage Distributed File System (DFS)

Module 5: Hyper-V virtualization and containers in Windows Server

This modules describes how to implement and configure Hyper-V VMs and containers. The module covers key features of Hyper-V in Windows Server, describes VM settings, and how to configure VMs in Hyper-V. The module also covers security technologies used with virtualization, such as shielded VMs, Host Guardian Service, admin-trusted and TPM-trusted attestation, and KPS.

Lessons

  • Hyper-V in Windows Server
  • Configuring VMs
  • Securing virtualization in Windows Server
  • Containers in Windows Server
  • Overview of Kubernetes

Lab : Implementing and configuring virtualization in Windows Server

  • Creating and configuring VMs
  • Installing and configuring containers

After completing this module, students will be able to:

  • Describe the key features of Hyper-V in Windows Server.
  • Describe VM settings and deploy and configure VMs in Hyper-V.
  • Explain the use of security technologies for virtualization.
  • Describe and deploy containers in Windows Server.
  • Explain the use of Kubernetes on Windows.

Module 6: High Availablity in Windows Server

This module describes current high availability technologies in Windows Server. The module describes failover clustering and considerations for implementing it, and how to create and configure failover clustering. The module also explains stretch clusters and options for achieving high availability with Hyper-V VMs.

Lessons

  • Planning for failover clustering implementation
  • Creating and configuring failover cluster
  • Overview of stretch clusters
  • High availability and disaster recovery solutions with Hyper-V VMs

Lab : Implementing failover clustering

  • Configuring iSCSI storage
  • Configuring a failover cluster
  • Deploying and configuring a highly available file server
  • Validating the deployment of the highly available file server

After completing this module, students will be able to:

  • Describe failover clustering and the considerations for implementing it.
  • Create and configure failover clusters.
  • Describe stretch clusters.
  • Describe options to achieve high availability with Hyper-V VMs.

Module 7: Disaster recovery in Windows Server

This module describes disaster recovery technologies in Windows Server and how to implement them. The module covers how to configure and use Hyper-V Replica and describes Azure Site Recovery. The module also covers how to implement Windows Server backup and describes the Azure Backup service.

Lessons

  • Hyper-V Replica
  • Backup and restore infrastructure in Windows Server

Lab : Implementing Hyper-V Replica and Windows Server Backup

  • Implementing Hyper-V Replica
  • Implementing backup and restore with Windows Server Backup

After completing this module, students will be able to:

  • Describe and implement Hyper-V Replica.
  • Describe Azure Site Recovery.
  • Describe and implement Windows Server backup.
  • Describe the Azure Backup service.

Module 8: Windows Server security

This module describes Windows Server security features and how to implement them. The module covers credentials used in Windows Server and explains how to implement privileged access protection. In addition to describing methods and technologies for hardening Windows Server security, the module explains how to configure Just Enough Administration (JEA) and how to secure SMB traffic. Finally, the module covers Windows Update, its deployment and management options.

Lessons

  • Credentials and privileged access protection in Windows Server
  • Hardening Windows Server
  • Just Enough Administration in Windows Server
  • Securing and analyzing SMB traffic
  • Windows Server update management

Lab : Configuring sercurity in Windows Server

  • Configuring Windows Defender Credential Guard
  • Locating problematic accounts
  • Implementing LAPS

After completing this module, students will be able to:

  • Describe credentials used in Windows Server.
  • Explain how to implement privileged access protection.
  • Describe methods and technologies to harden security in Windows Server.
  • Describe and configure Just Enough Administration (JEA).
  • Secure SMB traffic in Windows Server.
  • Describe Windows Update and its deployment and management options.

Module 9: Remote Desktop Services in Windows Server

This module describes key Remote Desktop Protocol (RDP) and Virtual Desktop Infrastructure (VDI) features in Windows Server. The modules covers how to deploy session-based desktops and describes personal and poled virtual desktops.

Lessons

  • Remote Desktop Services Overview
  • Configuring a session-based desktop deployment
  • Overview of personal and pooled virtual desktops

Lab : Implementing RDS in Windows Server

  • Implementing RDS
  • Configuring RemoteApp collection settings
  • Configuring a virtual desktop template

After completing this module, students will be able to:

  • Describe Remote Desktop Services (RDS) in Windows Server.
  • Describe and deploy session-based desktops.
  • Describe personal and pooled virtual desktops.

Module 10: Remote access and web services in Windows Server

This module describes how to implement virtual private networks (VPNs), Network Policy Server (NPS), and Microsoft Internet Information Services (IIS). The module provides an overview of remote access services and describes Always On VPN functionality, as well as how to configure NPS and Web Server (IIS) in Windows Server.

Lessons

  • Overview of RAS in Windows Server
  • Implementing VPNs
  • Implementing NPS
  • Implementing Always On VPN
  • Implementing Web Server in Windows Server

Lab : Deploying network workloads

  • Implementing Web Application Proxy
  • Implementing VPN in Windows Server
  • Deploying and Configuring Web Server

After completing this module, students will be able to:

  • Describe VPN options in Windows Server.
  • Describe Always On VPN functionality.
  • Describe and configure NPS.
  • Describe and configure Web Server (IIS).

Module 11: Monitoring, performance, and troubleshooting

This module describes how to implement service and performance monitoring, and apply troubleshooting in Windows Server. The module highlights monitoring tools and describes how to monitor performance, including event logging and how to perform event logging monitoring for troubleshooting purposes.

Lessons

  • Overview of Windows Server monitoring tools
  • Using Performance Monitor
  • Monitoring event logs for troubleshooting

Lab : Monitoring and troubleshooting Windows Server

  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs
  • Identifying the source of a performance problem
  • Describe monitoring tools in Windows Server.
  • Describe performance monitoring and use it in Windows Server.
  • Describe event logging and perform event logging monitoring for troubleshooting purposes.

Module 12: Upgrade and migration in Windows Server

This module describes how to perform upgrades and migrations for AD DS, Storage, and Windows Server. The module covers tools to use for AD DS migration. The module also covers the Storage Migration Service, and finally, Windows Server migration tools and usage scenarios.

Lessons

  • AD DS migration
  • Storage Migration Service
  • Windows Server migration tools

Lab : Migrating Server workloads

  • Selecting a process to migrate server workloads
  • Planning how to migrate files by using Storage Migration Service

After completing this module, students will be able to:

  • Describe tools to use for AD DS migration.
  • Describe the Storage Migration Service.
  • Describe Windows Server migration tools and their usage scenarios.

Main › CompTIA Network +

CompTIA Network +

CompTIA Network +

COURSE DESCRIPTION

This course provides a definition and in-depth description of the main modern technologies of computer networks. The main methods of administration, management and troubleshooting of modern networks will also be considered.

THE PURPOSE OF THE COURSE

Teach basic skills in working with network equipment and information security equipment. As a result of this course, students will gain basic practical knowledge on setting up network protocols and security policies

AUDIENCE

engineers partners, customers

COURSE CONTENT

The following topics will be covered in this course:

Basic definitions of OSI and TCP / IP network models
Characteristics of network traffic
Deploy and configure LAN
Configuring IP networks
Deploy and configure routing networks. Basic LAN and WAN routing technologies will be considered
Configuration and monitoring of major ports and protocols
Description of the main network attacks and methods of their elimination and early detection
Deployment and configuration of information security equipment and software
Description of basic methods of authentication and access control
Using remote access methods
Implementation of security policies

DETAILED CONTENT OF THE COURSE

Lesson 1: Explanation of the OSI model and TCP / IP models

Lesson 2: Explain the properties of network traffic

Lesson 3: Installing and configuring dial-up networks

Lesson 4: Configuring IP Networks

Lesson 5: Installing and configuring routed networks

Lesson 6: Configuring and monitoring ports and protocols

Lesson 7: Explaining network applications and storage services

Lesson 8: Monitoring and troubleshooting networks

Lesson 9: Explain network attacks and mitigations

Lesson 10: Installing and Configuring Security Devices

Lesson 11: Explaining authentication and access control

Lesson 12: Deploying and troubleshooting cable solutions

Lesson 13: Implementing and troubleshooting wireless technologies

Lesson 14: Comparing and contrasting WAN technologies

Lesson 15: Using Remote Access Methods

Lesson 16: Defining site policy and best practices

 

Price: $ 320

Venue: ERC Training Center st. Mark Vovchka, 18-A

Main › Architecting on AWS

Architecting on AWS

Architecting on AWS

Architecting on AWS covers the fundamentals of building IT infrastructure on AWS. The course is designed to teach solutions architects how to optimise the use of the AWS Cloud by understanding AWS services and how these services fit into cloud-based solutions. This course emphasises AWS Cloud best practices and recommended design patterns to help students think through the process of architecting optimal IT solutions on AWS. It also presents case studies throughout the course that showcase how some AWS customers have designed their infrastructures and the strategies and services they implemented. Opportunities to build a variety of infrastructures via a guided, hands-on approach are also provided.

Course objectives
This course teaches you how to:
  • Make architectural decisions based on the AWS-recommended architectural principles and best practices
  • Leverage AWS services to make your infrastructure scalable, reliable, and highly available
  • Leverage AWS-managed services to enable greater flexibility and resiliency in an infrastructure
  • Make an AWS-based infrastructure more efficient in order to increase performance and reduce costs
  • Use the Well-Architected Framework to improve architectures with AWS solutions
Intended audience
This course is intended for:
  • Solutions architects
  • Solution design engineers
Course outline

Day 1

  • Core AWS Concepts
  • Core AWS Knowledge
  • Core AWS Services
  • Designing Your Environment
  • Making Your Environment Highly Available

Day 2

  • Forklifting an Existing Application onto AWS
  • Event-Driven Scaling
  • Automating
  • Decoupling
  • Build a New Environment

Day 3

  • Well-Architected Framework
  • Troubleshooting YourEnvironment
  • Large-Scale Design Patterns and Case Studies

Training materials: AWS digital kit, iLabs.

Certificate of ettendence: AWS Certificate

Main › IT Audit. Practical Cases

IT Audit. Practical Cases

IT Audit. Practical Cases

The “IT AUDIT” trainings will allow participants to gain a wide set of knowledge to plan, perform IT audits and manage IT audit enterprise programs.

You will have all required skills to face the most difficult problems, which include:

  • audit planning and reporting
  • business continuity audit
  • software development and system implementation lifecycle audit
  • operating systems, databases, network equipment configuration audit

This is solely practical training! You immediately will work. The training adopted for an audience which represents students with completely different background. If you just a novice, you will be solving simple tasks. If you’re professional, you will have a set of very sophisticated tasks.

The obtained experience will mandatory increase your value for employees and customers, and bring a tremendous level of a professional confidence to you personally.

We recommend this training for:

  • IT auditors
  • IT security specialists
  • IT quality specialists
  • IT managers
COURSE AGENDA

Section 1: IT audit

  • IT assurance framework (ITAF).
  • Audit charter/mandate for the audit.
  • Auditor independence.
  • Professional due care.
  • Audit assertions.
  • Audit criteria.
  • ISACA audit programs.
  • IIA audit guidelines.
  • Trust services principles and criteria
  • Cobit 5
  • ISO27001
  • Other sources of criteria
  • Audit planning. Risk-based planning.
  • Audit performance.
  • Materiality of audit findings.
  • Audit evidence.
  • Evidence collection methods
  • Audit sampling.
  • Using the work of other experts.
  • Reporting.
  • Handling illegal acts.
  • Audit follow-up.
  • Control environment
  • Control design
  • Control effectiveness
  • Control monitoring
  • Practical workshop.

Section 2: IT governance and management

  • IT strategy
  • IT architecture
  • IT metrics
  • IT organization
  • IT service management
  • Service catalog
  • Incident management
  • Change management
  • Release management
  • Problem management
  • IT investments
  • IT risks
  • End-user computing.
  • Shadow IT
  • Cloud IT
  • BYOD
  • IT outsourcing
  • Practical workshop.

Section 3: Information systems development and implementation

  • System implementation and development lifecycle.
  • Project management control frameworks.
  • System development methodologies.
  • Project business case.
  • Feasibility study.
  • Requirements specification.
  • Design and Architecture.
  • Procurement process.
  • Coding.
  • Implementation.
  • Testing
  • Handover to production.
  • Operational support.
  • Decommissioning.
  • Migrations.
  •  Project closure.
  •  Practical workshop.

Section 4: IT operations

  • Inventory and asset management.
  • Patch management.
  • Hardware maintenance.
  •  Licensing.
  • Capacity planning.
  • Performance and availability monitoring.
  • Utilities
  •  Datacenter management
  •  Network physical infrastructure
  •  Practical workshop.

Section 5: Business continuity and disaster recovery

  • Business continuity management
  • Business continuity project initiation and management.
  •  Business impact assessment.
  • RTO/RPO
  • Recovery strategies.
  • Business continuity plan testing.
  • Disaster phases:
  • Preparation.
  •  Initial response
  • Restoration
  • Recovery
  • Post-incident activities
  • Practical workshop.

Section 6: Information security assurance

  • Information security policies, standards and procedures
  • Information security roles and organizational structures.
  • Human resource security
  •  Data classification and handling
  •  Key processes.
  • Information security risk management.
  •  Incident handling.
  • Awareness programs.
  •  Identity and access management.
  • IDS/IPS
  • DLP
  • SIEM
  •  PKI
  • 802.11x, NAP and network access control
  • Remote access and teleworking risks
  • Rights management
  • Antimalware solutions
  •  Physical security controls
  • Fraud controls
  • Practical workshop.

Section 7: Audit considerations

  • ERP audit
  • CRM audit
  • VOIP
  • Virtualization
  • Practical workshop.

Labs:

  • Windows audit
  • Linux audit
  • Networking, VPN and Firewall audit
  • PKI audit
  • Database audit (MySQL and Oracle)
  • Web application audit (PHP)
  • Mobile application audit (android)

Main › C)ISSA – CERTIFIED INFORMATION SYSTEMS SECURITY AUDITOR (C)ISSA-SP1)

C)ISSA – CERTIFIED INFORMATION SYSTEMS SECURITY AUDITOR (C)ISSA-SP1)

C)ISSA – CERTIFIED INFORMATION SYSTEMS SECURITY AUDITOR (C)ISSA-SP1)

BRIEF DESCRIPTION

Many organizations require them to identify critical issues and propose effective audit solutions. And this will require in-depth knowledge of system auditors (System Auditor’s). The set of knowledge and skills included in the curriculum of vendors-independent course “Certified Information Systems Security Auditor – C) ISSA” will not only help prepare for the relevant ISACA® exam, but also provide another important certification in information systems auditing. Thus, the Certified Information Systems Security Auditor course provides the knowledge and skills to identify vulnerabilities, compatibility reports, and implement controls for all types of organizations.

Duration 4 days / 32 hours

PRELIMINARY LEVEL OF TRAINING
At least a year of working with information systems.
course objectives

AFTER COMPLETING THE COURSE YOU WILL BE ABLE TO:
Use in their work advanced knowledge and practical skills of auditing.
Obtain an international auditor’s certificate if you pass the exam

WHO ARE WE INVITE

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government

COURSE PROGRAM

  • The Process of Auditing Information Systems
  • Risk Based Auditing
  • Audit Planning and Performance
  • Reporting on Audit
  • IT Governance and Management
  • Strategic Planning and Models
  • Resource Management
  • Business Continuity Planning
  • Systems Acquisition, Development and Implementation
  • Systems Development Models
  • Types of Specialized Business Applications
  • Application Controls
  • Information Systems Operations, Maintenance and Support
  • System and Communications
  • Hardware

Related to the certification course:

Mile2 C) ISSA – Certified Information Systems Security Auditor
CISACA® CISA are the objectives of this exam

Main › СЕН| CERTIFIED ETHICAL HACKER V9

СЕН| CERTIFIED ETHICAL HACKER V9

СЕН| CERTIFIED ETHICAL HACKER V9