SlideShare a Scribd company logo
1 of 40
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
CQURE: CEO, Penetration Tester; Security Expert
CQURE Academy: Trainer
MVP: Enterprise Security, MCT
info@cqureacademy.com
Greg Tworek
CQURE: CTO, Security Expert
CQURE Academy: Trainer
MVP: Enterprise Security, MCT
What does CQURE do?
Consulting Services:
Extensive IT Security Audits and Penetration Tests of all
kinds
Configuration Audit and Architecture Design
Social Engineering Tests
Advanced Troubleshooting and Debugging
Emergency Response Services
R&D & Publications
Trainings & Seminars:
Offline (mainly in New York or via our partners worldwide)
Online (you will hear more about it in the end of this Webinar)
Michael
Kama
Dorothy
Patrycja
Michal
Paula
Greg
Ken
Chris
Krystian
Aga
Grzegorz Zuza
Milosz Ada
To ensure the good quality of your experience:
1. If you have problems with viewing the Webinar try
refreshing the page first or try another browser.
2. If problems persist please let us know in the comment
section or on info@cqureacademy.com.
3. If there will be connection or software problem, please look
into your email box or fb.com/cqure for instructions.
4. We will be taking questions at the end of the Webinar
during Q and A session so write them down!
What can you expect today?
1. The BIG REVEAL of 12 skills that our CQURE team has
identified as crucial to keep your IT safe in 2018.
2. Live demonstrations!
3. Tips on how you learn this stuff on your own.
4. A hacking challenge with a cool prize :)
5. Live Q&A with the CQURE Team and myself.
6. You will get files of all the tools we will be using here!
What was your score in our Windows Security QUIZ 2.0
- share in the comment section!
According to the industry’s statistics, by 2019 the
market will need 6 mln security professionals.
But only 4 to 5 million of them will have the needed
qualifications.
*Source: Financial Times
What you should learn NOW to
become proficient in Windows
Security in less time than others?
#1 Skill Group: Platform Security & Internals
#2 Skill Group: Attacks On Credentials & Prevention
Solutions
#3 Skill Group: PowerShell As A Hacking Tool
PowerShell is really powerful tool used on daily basis by
millions of administrators but it can also be very danger
and successfully used by malicious users to evade
software restrictions or to perform escalation of
privileges.
1. Understanding potential and threat of PowerShell
2. Bypassing script execution policy
3. Working with deep script logging
4. PowerShell transcript
5. Just Enough Administration and remote management
with PowerShell
6. Code Signing with PowerShell
#4 Skill Group: Office 365 Security
When you move your company to the cloud, you must fully
understand how to configure numerous security features to get
most of Office 365 offering. To ensure the security and
confidentiality of your data.
1. Office 365 Privacy
2. Identity models (cloud, synchronized, federated)
3. Multi-Factor Authentication
4. Controlling how your users access the data
5. Level up your security with Exchange Online Protection
6. Your fight against advanced threats with the help of ATP
7. Data loss prevention
#5 Skill Group: Raising the bar for malware
#6 Skill Group: Microsoft SQL Server Security
Database servers are usually one of the most important
servers in the infrastructure it’s all because they are
containing precious corporate data and are used as
backend for most of the LOB applications.
You should be familiar with:
1. Stilling credentials and hashes with MITM attack
2. Protecting SQL Server authentication and network
communication
3. Protecting SQL Server data and backups at rest
4. Cryptography in SQL Server environment
5. End to end encryption of data with Always Encrypted
SQL Server
#7 Skill Group: Improving security with Azure
We still cannot believe that cloud technologies can
really help us in securing the on-premise
environment. But the answer is only one here: give it
a try! Deploying new solution takes minutes instead
of months and may be disabled any time if you do
not like it. So let’s review some of them to see what
benefit they can bring to you.
You should know at least the following:
1. Office 365 security technologies
2. Microsoft Azure based technologies
3. Azure Backup
4. Operations Management Suite
5. Windows Defender ATP
#8 Skill Group: Virtualization based security
Virtualization also requires us to think differently about the
security of our virtualized infrastructure and applications.
You need to know at least the following:
1. Workload administrator and Fabric Administrator
2. Potential security holes in standard Hyper-V deployment
3. Prepare your environment for shielded VM deployment
4. Host Guardian Service
5. Template for shielded VMs
6. Shielding data file
7. Shielded VM creating
8. Testing shielded VM enhanced security
#9 Skill Group: Machine Learning for Security
Forexample:Whatif weuseacustomreflectivePELoadertocreateandruncustomcode?
#10 Skill Group: Windows 2016 security and
infrastructure improvements
We will trust you if you tell us you got rid of Windows 2003. But
what about 9 years old (yes!) Windows 2008? Maybe it is a high
time to move to the newest Microsoft Server Operating System?
Before taking this brave (but reasonable) step, please come to our
session and see what the Windows Server 2016 can offer you.
You should be familiar with:
1. Virtualization, Shielded VMs and Containers
2. Identity and Access Improvements
3. PowerShell
4. Networking enhancements
5. Device Guard and Credential Guard technologies
6. IIS 10 and application platform
#11 Skill Group: Practical Public Key Infrastructure
Pretty much every time we do an audit we see
incorrectly implemented PKI
Be aware of the newest security trends in the
certificate services
You should be familiar with:
1. Internal or 3rd party certificates - where to use on,
where to use the other
2. What certificate should be used where? Different types
of certificates
3. Mastering certificate requests - Tools, process
techniques
4. Message Security
5. Bitlocker
6. RMS for File Servers
#12 Skill Group: Advanced Monitoring and Auditing
It is well known fact that the proper reaction for incidents is the key
for keeping your environment secure. But wait - how can you
properly react if you do not properly monitor events within your
infrastructure? It is high time to design it in the right way. Starting
from your workstations, through mobile devices, servers, network
appliances up to the cloud level. During the module we will show you
how to plan your monitoring and how to implement it in a way giving
you all the information you need.
1. Workstation monitoring
2. Server monitoring
3. Non-PC devices monitoring
4. Data access monitoring and auditing
5. Processing and analyzing of the data collected
6. Cloud based technologies
Skill #1: Platform Security & Internals
Skill #2: Attacks On Credentials & Prevention Solutions
Skill #3: PowerShell as a hacking tool
Skill #4: Office 365 Security
Skill #5: Raising the bar for malware
Skill #6: Microsoft SQL Server Security
1 - 6
Skill #7: Improving security with Azure
Skill #8: Virtualization based security
Skill #9: Machine Learning for Security
Skill #10: Windows 2016 security and infrastructure improvements
Skill #11: Practical Public Key Infrastructure
Skill #12: Advanced Monitoring and Auditing
7 - 12
So… HOW to learn security?
Summary: Understanding is the key to success
Understanding is the key to security
Continuous vulnerability discovery
Context-Aware Analysis
Prioritization
Remediation and Tracking
Configuration reviews
Put on the Hacker’s Shoes
Prevention is the key to success
Additional resources to learn on your own
Websites
CQURE Academy Blog
Ars Technica
The Register
The Hacker News
Dark Reading
Krebs on Security
Computer World
Threat Post
Beta News
Tech News World
Tech Crunch
ZDNetSecurity Affairs
Computer Weekly
Network World
SC Magazine
Wired
Schneier on Security
Microsoft Virtual Academy
The course finishes with an exam.
If you pass (you get at least 70% answers correct)
you will get our CQURE Academy CERTIFICATE:
Windows Security Master 2018
https://www.cqureacademy.com/advanced2018
The Prize For Hackers Who Won Today’s
Challenge:
A free seat at “Advanced Windows Security Course
For 2018” (worth $2,900!)
Q&A Time!
12 Crucial Windows Security Skills for 2018

More Related Content

What's hot

RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...Paula Januszkiewicz
 
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth TakingTop 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth TakingPaula Januszkiewicz
 
RSA Conference 2017 session: What System Stores on the Disk Without Telling You
RSA Conference 2017 session: What System Stores on the Disk Without Telling YouRSA Conference 2017 session: What System Stores on the Disk Without Telling You
RSA Conference 2017 session: What System Stores on the Disk Without Telling YouPaula Januszkiewicz
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsBeyondTrust
 
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...BeyondTrust
 
Virtual Networking Security - Network Security
Virtual Networking Security - Network SecurityVirtual Networking Security - Network Security
Virtual Networking Security - Network SecurityEng Teong Cheah
 
Fatal signs: 10 symptoms when you think you’ve been hacked
Fatal signs: 10 symptoms when you think you’ve been hackedFatal signs: 10 symptoms when you think you’ve been hacked
Fatal signs: 10 symptoms when you think you’ve been hackedPaula Januszkiewicz
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
 
Shields up - improving web application security
Shields up - improving web application securityShields up - improving web application security
Shields up - improving web application securityKonstantin Mirin
 
Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckPaula Januszkiewicz
 
CMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemCMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemEditor IJCATR
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Paula Januszkiewicz
 
Virtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityVirtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityEng Teong Cheah
 
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5AlienVault
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 
Managing Application Config and Secrets
Managing Application Config and SecretsManaging Application Config and Secrets
Managing Application Config and SecretsEng Teong Cheah
 
CIS 333 Entire Course NEW
CIS 333 Entire Course NEWCIS 333 Entire Course NEW
CIS 333 Entire Course NEWshyamuopfive
 

What's hot (20)

RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
 
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth TakingTop 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
 
RSA Conference 2017 session: What System Stores on the Disk Without Telling You
RSA Conference 2017 session: What System Stores on the Disk Without Telling YouRSA Conference 2017 session: What System Stores on the Disk Without Telling You
RSA Conference 2017 session: What System Stores on the Disk Without Telling You
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...
 
Virtual Networking Security - Network Security
Virtual Networking Security - Network SecurityVirtual Networking Security - Network Security
Virtual Networking Security - Network Security
 
Fatal signs: 10 symptoms when you think you’ve been hacked
Fatal signs: 10 symptoms when you think you’ve been hackedFatal signs: 10 symptoms when you think you’ve been hacked
Fatal signs: 10 symptoms when you think you’ve been hacked
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Shields up - improving web application security
Shields up - improving web application securityShields up - improving web application security
Shields up - improving web application security
 
Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality Check
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
CMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemCMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer System
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
 
Virtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityVirtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter Security
 
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
Managing Application Config and Secrets
Managing Application Config and SecretsManaging Application Config and Secrets
Managing Application Config and Secrets
 
CIS 333 Entire Course NEW
CIS 333 Entire Course NEWCIS 333 Entire Course NEW
CIS 333 Entire Course NEW
 

Similar to 12 Crucial Windows Security Skills for 2018

Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
<marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee><marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee>slideshareperson2
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxInfosectrain3
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxinfosec train
 
Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020JayTymchuk
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
Secure codingguide
Secure codingguideSecure codingguide
Secure codingguideDavid Kwak
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfssuser0a78bf
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkAnna Royzman
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure DevelopmentBosnia Agile
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about securityArjan Cornelissen
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeSecurity Innovation
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingKnoldus Inc.
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 

Similar to 12 Crucial Windows Security Skills for 2018 (20)

Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
" onclick="alert(1)
" onclick="alert(1)" onclick="alert(1)
" onclick="alert(1)
 
<marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee><marquee>html title testfsdjk34254</marquee>
<marquee>html title testfsdjk34254</marquee>
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
 
Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Secure codingguide
Secure codingguideSecure codingguide
Secure codingguide
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 

Recently uploaded

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

12 Crucial Windows Security Skills for 2018

  • 1. 12 Crucial Windows Security Skills for 2018 Paula Januszkiewicz CQURE: CEO, Penetration Tester; Security Expert CQURE Academy: Trainer MVP: Enterprise Security, MCT info@cqureacademy.com Greg Tworek CQURE: CTO, Security Expert CQURE Academy: Trainer MVP: Enterprise Security, MCT
  • 2. What does CQURE do? Consulting Services: Extensive IT Security Audits and Penetration Tests of all kinds Configuration Audit and Architecture Design Social Engineering Tests Advanced Troubleshooting and Debugging Emergency Response Services R&D & Publications Trainings & Seminars: Offline (mainly in New York or via our partners worldwide) Online (you will hear more about it in the end of this Webinar)
  • 4. To ensure the good quality of your experience: 1. If you have problems with viewing the Webinar try refreshing the page first or try another browser. 2. If problems persist please let us know in the comment section or on info@cqureacademy.com. 3. If there will be connection or software problem, please look into your email box or fb.com/cqure for instructions. 4. We will be taking questions at the end of the Webinar during Q and A session so write them down!
  • 5. What can you expect today? 1. The BIG REVEAL of 12 skills that our CQURE team has identified as crucial to keep your IT safe in 2018. 2. Live demonstrations! 3. Tips on how you learn this stuff on your own. 4. A hacking challenge with a cool prize :) 5. Live Q&A with the CQURE Team and myself. 6. You will get files of all the tools we will be using here!
  • 6. What was your score in our Windows Security QUIZ 2.0 - share in the comment section!
  • 7. According to the industry’s statistics, by 2019 the market will need 6 mln security professionals. But only 4 to 5 million of them will have the needed qualifications. *Source: Financial Times
  • 8.
  • 9. What you should learn NOW to become proficient in Windows Security in less time than others?
  • 10. #1 Skill Group: Platform Security & Internals
  • 11. #2 Skill Group: Attacks On Credentials & Prevention Solutions
  • 12. #3 Skill Group: PowerShell As A Hacking Tool PowerShell is really powerful tool used on daily basis by millions of administrators but it can also be very danger and successfully used by malicious users to evade software restrictions or to perform escalation of privileges. 1. Understanding potential and threat of PowerShell 2. Bypassing script execution policy 3. Working with deep script logging 4. PowerShell transcript 5. Just Enough Administration and remote management with PowerShell 6. Code Signing with PowerShell
  • 13. #4 Skill Group: Office 365 Security When you move your company to the cloud, you must fully understand how to configure numerous security features to get most of Office 365 offering. To ensure the security and confidentiality of your data. 1. Office 365 Privacy 2. Identity models (cloud, synchronized, federated) 3. Multi-Factor Authentication 4. Controlling how your users access the data 5. Level up your security with Exchange Online Protection 6. Your fight against advanced threats with the help of ATP 7. Data loss prevention
  • 14. #5 Skill Group: Raising the bar for malware
  • 15.
  • 16. #6 Skill Group: Microsoft SQL Server Security Database servers are usually one of the most important servers in the infrastructure it’s all because they are containing precious corporate data and are used as backend for most of the LOB applications. You should be familiar with: 1. Stilling credentials and hashes with MITM attack 2. Protecting SQL Server authentication and network communication 3. Protecting SQL Server data and backups at rest 4. Cryptography in SQL Server environment 5. End to end encryption of data with Always Encrypted SQL Server
  • 17. #7 Skill Group: Improving security with Azure We still cannot believe that cloud technologies can really help us in securing the on-premise environment. But the answer is only one here: give it a try! Deploying new solution takes minutes instead of months and may be disabled any time if you do not like it. So let’s review some of them to see what benefit they can bring to you. You should know at least the following: 1. Office 365 security technologies 2. Microsoft Azure based technologies 3. Azure Backup 4. Operations Management Suite 5. Windows Defender ATP
  • 18. #8 Skill Group: Virtualization based security Virtualization also requires us to think differently about the security of our virtualized infrastructure and applications. You need to know at least the following: 1. Workload administrator and Fabric Administrator 2. Potential security holes in standard Hyper-V deployment 3. Prepare your environment for shielded VM deployment 4. Host Guardian Service 5. Template for shielded VMs 6. Shielding data file 7. Shielded VM creating 8. Testing shielded VM enhanced security
  • 19. #9 Skill Group: Machine Learning for Security Forexample:Whatif weuseacustomreflectivePELoadertocreateandruncustomcode?
  • 20. #10 Skill Group: Windows 2016 security and infrastructure improvements We will trust you if you tell us you got rid of Windows 2003. But what about 9 years old (yes!) Windows 2008? Maybe it is a high time to move to the newest Microsoft Server Operating System? Before taking this brave (but reasonable) step, please come to our session and see what the Windows Server 2016 can offer you. You should be familiar with: 1. Virtualization, Shielded VMs and Containers 2. Identity and Access Improvements 3. PowerShell 4. Networking enhancements 5. Device Guard and Credential Guard technologies 6. IIS 10 and application platform
  • 21. #11 Skill Group: Practical Public Key Infrastructure Pretty much every time we do an audit we see incorrectly implemented PKI Be aware of the newest security trends in the certificate services You should be familiar with: 1. Internal or 3rd party certificates - where to use on, where to use the other 2. What certificate should be used where? Different types of certificates 3. Mastering certificate requests - Tools, process techniques 4. Message Security 5. Bitlocker 6. RMS for File Servers
  • 22. #12 Skill Group: Advanced Monitoring and Auditing It is well known fact that the proper reaction for incidents is the key for keeping your environment secure. But wait - how can you properly react if you do not properly monitor events within your infrastructure? It is high time to design it in the right way. Starting from your workstations, through mobile devices, servers, network appliances up to the cloud level. During the module we will show you how to plan your monitoring and how to implement it in a way giving you all the information you need. 1. Workstation monitoring 2. Server monitoring 3. Non-PC devices monitoring 4. Data access monitoring and auditing 5. Processing and analyzing of the data collected 6. Cloud based technologies
  • 23.
  • 24. Skill #1: Platform Security & Internals Skill #2: Attacks On Credentials & Prevention Solutions Skill #3: PowerShell as a hacking tool Skill #4: Office 365 Security Skill #5: Raising the bar for malware Skill #6: Microsoft SQL Server Security 1 - 6
  • 25. Skill #7: Improving security with Azure Skill #8: Virtualization based security Skill #9: Machine Learning for Security Skill #10: Windows 2016 security and infrastructure improvements Skill #11: Practical Public Key Infrastructure Skill #12: Advanced Monitoring and Auditing 7 - 12
  • 26. So… HOW to learn security?
  • 27. Summary: Understanding is the key to success Understanding is the key to security Continuous vulnerability discovery Context-Aware Analysis Prioritization Remediation and Tracking Configuration reviews Put on the Hacker’s Shoes Prevention is the key to success
  • 28. Additional resources to learn on your own Websites CQURE Academy Blog Ars Technica The Register The Hacker News Dark Reading Krebs on Security Computer World Threat Post Beta News Tech News World Tech Crunch ZDNetSecurity Affairs Computer Weekly Network World SC Magazine Wired Schneier on Security Microsoft Virtual Academy
  • 29.
  • 30.
  • 31.
  • 32. The course finishes with an exam. If you pass (you get at least 70% answers correct) you will get our CQURE Academy CERTIFICATE: Windows Security Master 2018
  • 33.
  • 35.
  • 36.
  • 37.
  • 38. The Prize For Hackers Who Won Today’s Challenge: A free seat at “Advanced Windows Security Course For 2018” (worth $2,900!)