Effective Implementation of the Application Whitelisting
In this training we will focus on AppLocker and WDAC implementation which can be done on large scale. Mike Jankowski-Lorek will give you clarity on the most critical questions: How to do it properly? How not to make simple mistakes? How not to forget about crucial dependencies?
Course Prerequisites
This advanced training, which requires familiarity with Application Control for Windows and AppLocker. In just two hours, you’ll learn two effective strategies to implement application whitelisting.
What you will learn
Topics covered:
1. Reasons for Application Whitelisting
2. AppLocker basics and bypassing example
3. AaronLocker
4. WDAC vs AppLocker
5. Key scenarios for Windows Advanced Firewall
6. WDAC / Device guard
What’s included
- Access to almost 3-hour recorded practical lesson including demo of real
infrastructure attacks - Training materials to download.
- The virtual training covers: pentesting methodology, DNS, OSINT framework, Shellcode examples, masking techniques, service enumeration, password attacks, Spoofing / MITM examples, persistency methods and more.
12-month access to video recording and training materials for you to keep and get back to whenever needed.
Additional information
PLEASE NOTE: It may take 2-3 business days for your course access to be activated. You will receive an email from us with all necessary details.
Only registered users can write reviews. Please Sign in or create an account