Foundstone Ultimate Hacking: Windows Security
As the most common network operating systems used throughout the world, it is imperative that companies deploy valuable security techniques to combat threats to Windows. As a security professional, you will learn from a hacker's perspective how architectural vulnerabilities are assessed and how to deploy effective countermeasures. The core of this course is the McAfee Foundstone Professional Services Penetration Testing Methodology.
What You'll Learn
- How intruders analyze and develop target vectors aimed at your critical assets
- Strategy behind finding weaknesses before they become a security risk
- McAfee Foundstone Penetration Testing Methodology
- Mindset of a malicious attacker, and the true risk to your organization
- Tools and methodologies hackers use efficiently in a controlled and safe environment
- Develop your own security toolkit from tried and tested tools
Who Needs to Attend
If you are a system and network administrator, security personnel, auditor, and/or consultant, then this course will provide valuable insight into the architectural weaknesses in Microsoft Windows and countermeasures to reduce digital risk.
There are no prerequisites for this course.
1. Attacking the Microsoft Windows Server OS
- Privilege Escalation
- Expanding Influence
- Cleanup (Covering Tracks)
2. Attacking and Locking Down Microsoft Windows Applications
- Attacking and Securing Microsoft SQL
- Attacking and Securing Microsoft IIS
3. Attacking and Locking Down Microsoft Windows Workstations and Servers
- Windows 95/98/ME
- Windows NT/2000/XP/Vista/7
- Windows Server 2000/2003/2008
All topics are supported by hands-on exercises specifically designed to increase knowledge retention. Classroom exercises provide the basic hands-on experience needed to footprint an organization's Internet presence.