Ihr Partner für IT-Infrastruktur- und Securityschulungen seit über 20 Jahren.

Troopers - Hardening Microsoft Environments

Beginn:
22. Jun 2026
Ende:
23. Jun 2026
Kurs-Nr.:
TR26-05
Preis:
2690,00 EUR (zzgl. MwSt.)
Ort:
Heidelberg
Diesen Kurs buchen
Freie Plätze:
15 von 15
Trainer:
Herr René Mathes
Herr Niklas Kerner
Herr David Zenth

Beschreibung

TR26-05

A new two-day workshop in english.

Hardening Microsoft Environments

Your trainers are René Mathes, Niklas Kerner & David Zenth.

 

Overview

Credential theft attacks can be described as a technique in which account logon credentials are captured from a compromised computer, and then used to authenticate to other systems on the network. Attack techniques which fall in the categories of “Credential Theft” or “Credential Reuse” have grown in the last few years into one of the biggest threats to Microsoft Windows environments.
 
Since 2016, this development was significantly promoted by a considerable improvement and increasing distribution of hacking and attack tools, such as mimikatz and Windows Credential Editor and frameworks for attacking Active Directory environments such as PowerSploit or Empire. This led to theoretical attacks being actually possible in real world scenarios with the application of the aforementioned methods. Once an attacker gains initial foothold on a single system in the environment it takes often less than 48 hours until the entire Active Directory infrastructure is compromised.
 
But how can such a threat be handled?
 
In this intensive two-day seminar we will present various technical and organizational measures to protect both individual critical Microsoft Windows systems, as well as the entire Active Directory. The goals in mind are to prevent credential theft in the first place, but also to protect against and detect unauthorized use of stolen credentials as early as possible and to provide important hardening guideline information.

 

Day 1

 

  • Introduction
    • Relevancy and actuality of Credential Theft und Credential Reuse
    • Windows Authentication
  •  Basics of Windows Authentication
    • Security Subsystem Architecture in Windows
    • Local Security Authority Subsystem Service
    • Local authentication
    • LM/NTLM network authentication
    • Kerberos network authentication
  •  Credential Theft & Reuse Attacks
    • Introduction into mimikatz
    • Pass-the-Hash
    • Pass-the-Ticket
    • Overpass-the-Hash/Pass-the-Key
    • Golden & Silver Ticket, Inter-Realm Ticket
    • PtT in Ubuntu and Mac OS X
  • Practical Exercises for All Mentioned Attack Techniques
  • Practical Exercises for All Mentioned Attack Techniques
    • Trojan / RAT
    • Practical Exercises for All Mentioned Attack Techniques
    • Reorganization of the Active Directory structure and best practice for administration
    • Technical and Credential-Theft-specific measures
    • Security monitoring & logging

 

 Day 2

 

  • Detailed Examination of Relevant Measures to Reduce Risks
    • Requirements
    • Organizational and design measures (Admin Tiering, ESAE Forest)
    • Technical measures
  • Secure administration hosts
  • Secure configuration of domain controllers and members
  • Credential-Theft-specific measures
  • Active Directory Monitoring
    • Overview of Windows Event Logging
    • General monitoring measures
    • Centralized logging
    • Basics of Advanced Audit Policy
    • Specific monitoring measures
    • Detection of PtH, PtT and Golden Tickets

 

  

Who should attend this training?

  • IT Security Officers
  • Windows & Active Directory Administrators
  • Project Managers with security focus
  • Infrastructure and system architects
  • System integrators
  • Head of IT & Data Protection Supervisors

 

Requirements

The attendees should have:

  • A laptop with administrative privileges and pre-installed VirtualBox
  • TCP/IP Knowledge
  • Be familiar with a shell

Good to have, but not necessary:

  • Basic knowledge of Active Directory environments and Windows systems
  • Notebook to establish a browser-based HTTPS connection to the AD lab environment of the workshop

 

About the trainers:

René Mathes is a longstanding auditor and penetration tester. For more than 10 years of his work as IT security analyst he gives advice to a diverse portfolio of customers: Mid-tier companies, city authorities to true global players, advertisement to heavy industry. As tutor he develops workshops that he holds throughout Germany for example for attendees from the financial world.

Niklas Kerner is a Penetration Tester at ERNW. He completed his Bachelor's thesis on Active Directory Security and holds the PNPT certification.

David Zenth is a Security Analyst at ERNW and is currently pursuing a Bachelor of Science in Cyber Security. Prior to his studies, he completed his education as an IT System Administrator and worked in the security field.

Dateien zum herunterladen


Diesen Kurs buchen: Troopers - Hardening Microsoft Environments

Wenn Sie bereits registriert sind, bitte hier direkt einloggen

Einzelpreis

Teilnehmerdaten

Teilnehmeradresse

weitere Teilnehmer

Rechnungsadresse

* notwendige Angaben

Tags

Die legendäre IT-Sicherheitskonferenz „Troopers26“ findet vom 22.-26. Juni 2026 in Heidelberg statt.

Bis 30. Januar 2026 erhalten Sie Early-Bird-Tickets über den folgenden Link:

 https://troopers.de/

 

Kontakt

+49 6022 508-200
E-mail: info@hm-ts.de

HM Training Solutions
Falkenstraße 6
63820 Elsenfeld

Newsletter

Wenn Sie unsere Newsletter erhalten möchten, tragen Sie hier Ihren Daten ein.
Ich akzeptiere die Allgemeinen Geschäftsbedingungen und die Datenschutzerklärung