Home > IT-Pro Speaker Training > Sami Laiho > Blackbelt - Moving from ReActive to ProActive Security

Course information

Blackbelt - Moving from ReActive to ProActive Security

Duration: 4 days
Material: Student Lab Manual, Slide deck, and lab files
Language: English

Gartner has said that one of the most needed changes in enterprise security is to move to a least privilege approach, whitelisting of applications and overall proactive security. Microsoft said in November 2015 that 85% of all security threats would have been mitigated by moving to proactive security. In year 2015 all major antimalware companies reported more than 250.000 new malware samples EVERY day! Do you really need more convincing that you need to do act upon these facts ?

Level: 300

Target audience: This training is meant for all administrators and security professionals who want to make sure their environments are ready for the new security era where traditional security measures like anti-malware are not effective anymore.

Prerequisites Basic experience with Windows Administration, Basic understanding of Active Directory, Basic understanding of networking infrastructure.

Coursegoals: Join this four day workshop by Sami Laiho, one of the world’s leading Windows Security experts and get this thing sorted out and make sure you are prepared for the future. During this hands-on training you will see why proactive security is mandatory and also learn to implement it in practice. In this workshop you can choose to work with Windows 7, 8.1 or 10 to make sure you can really implement it when you head back home.

Detailed content description:

Day 1:

  • Introduction to the current and future state of IT security
  • The showcase of how Windows really gets hacked!
  • Implementing hard disk encryption
  • Cornerstones of Windows Security – How the Security Subsystem really works

Day 2:

  • Implementing the principle of least privilege – getting rid of admin rights!
  • Correct use of different levels of admin accounts in an enterprise
  • Why and How to use UAC effectively
  • Server 2016 Bastion forests and the future of Active Directory security

Day 3:

  • Mitigating Pass-The-Hash attacks
  • Getting rid of lateral movement of admin accounts
  • Correct decisions when choosing secure hardware in the future
  • Moving to Biometrics and Two-Factor Authentication

Day 4:

  • Whitelisting in Windows
  • AppLocker in Windows 7 and 8.1
  • AppLocker and Device Guard in Windows 10


Facilities, catering and proof of participation: 

The training classrooms are equiped with state-of-the-art systems which are fully preconfigured for the concerning training.

During the trainingcourse coffee, tea and softdrinks will be arranged for free. At the lunchbreak there will be fresh sandwiches of your own choice. This lunch is included in the trainingscourse price.

After attending the training course, you will receive a certificate from PDS signed by the trainer as proof of your participation.


Send a mail to sales@pds-site.com for more information