CyberBytes: Effective Implementation of the Application Whitelisting

CyberBytes: Effective Implementation of the Application Whitelisting

CQURE Academy NIC-CQE-EIAW

GBP 155.00
excl. VAT

Effective Implementation of the Application Whitelisting

In this training we will focus on AppLocker and WDAC implementation which can be done on large scale. Mike Jankowski-Lorek will give you clarity on the most critical questions: How to do it properly? How not to make simple mistakes? How not to forget about crucial dependencies?

Course Prerequisites

This advanced training, which requires familiarity with Application Control for Windows and AppLocker. In just two hours, you’ll learn two effective strategies to implement application whitelisting.

What you will learn

Topics covered:

1. Reasons for Application Whitelisting
2. AppLocker basics and bypassing example
3. AaronLocker
4. WDAC vs AppLocker
5. Key scenarios for Windows Advanced Firewall
6. WDAC / Device guard

What’s included

  • Access to almost 3-hour recorded practical lesson including demo of real
    infrastructure attacks
  • Training materials to download.
  • The virtual training covers: pentesting methodology, DNS, OSINT framework, Shellcode examples, masking techniques, service enumeration, password attacks, Spoofing / MITM examples, persistency methods and more.
    12-month access to video recording and training materials for you to keep and get back to whenever needed.

Additional information

PLEASE NOTE: It may take 2-3 business days for your course access to be activated. You will receive an email from us with all necessary details. 

Write Your Own Review

Only registered users can write reviews. Please Sign in or create an account