Call Us : +91-771045-0011 | +91-771045-0022

Windows OS Securtiy

Windows is the most used Operating System now a days. Linux is a command based operating system therefore a normal user always give preference to wind....

Duration: 7 Days
Course Fee: INR 3800.00/ USD 50.00

Windows is the most used Operating System now a days. Linux is a command based operating system therefore a normal user always give preference to windows OS. Not only desktops, 30 percent of total web servers are using Windows Operating System. An operating system is an interface between a user and hardware. A computer system, which does not contain an operating system is nothing more than an empty electrical box. A number of people are using Windows OS but the thing is, it is also on top for having security vulnerabilities. Hackers are finding zero day flaws in Windows OS and exploiting these loopholes by writing dangerous malicious scripts. Installing a windows OS on computer system is not your only duty, making it secure from cyber-attacks is also your responsibility. Hackers can steal your sensitive information and personal data from your computers if it has security issues.

In case of Windows Web Servers, a little security loophole may put millions of websites in risk which are using vulnerable windows based web servers. Setting up an administration password, user password and screen saver password doesn’t make you system secure. There are a number of things which you have to manage to make your system enough secure to defend cyber-attacks.

CDI has launched this 7 day training program for “Windows OS Security”. The main motive of CDI behind this course launch is to aware all the users and system administrators about the security threats, which can allow hackers to mess with whole network and database. In this 7 days training program, you will learn all that security practices which makes a windows OS secure.

No Batch Available In This Course Yet.

1. Attendees will learn the working architecture of windows Operating System. Topics like, basic file system and memory management systems are a part of this training program.

2. All the candidates will learn, how windows OS works on web servers and desktops.

3. Candidates will learn, which security practices are important to make a windows OS secure.

4. Attendees will learn about the common windows OS Vulnerabilities, Security Threats & Countermeasures.

5. Candidates will learn about security audit of a Windows 2008 Server.  

6. All candidates will get experience of learning various security audit methodologies step by step.

1. How Windows operating system works and what is its importance in web servers?

2. Which security vulnerabilities and loopholes can cause problems for a Windows OS and how to mitigate the risk of blackhat activities?

3. How to mitigate all the possible security risks of a Windows OS?

4. How to audit windows OS by practicing various audit policies and what is the role of these audit policies in OS security?

5. How to secure a windows Operating System physically, by setting up various type of passwords?

6. How various local and group policies of a windows OS are playing vital role to maintain its security?

1. All the candidates should be familiar with Windows Operating System and its basic functionalities.

2. Attendees should have an idea about windows registry files and various security policies. It will help the candidates to easily understand all the other topics.

3. The knowledge of windows basic commands, is a must for all the candidates. For example: regedit and secpol.msc.

4. Candidates should be familiar with file structure of Windows operating System.

It will be 7 days training program on Windows OS Security. The training schedule will be as following:

1. On the first day of this training program, we will discuss how Windows OS works, basic file structure of windows and basic commands of windows which are helpful in security audit.

2. On the second, we will read about windows 2008 server security. Physical Security, Local Policies, Group Policies, Group Policy Management Console, RSoP and Top 5 Windows Domains are some examples of topics which we will cover.

3.  Restrict CD-ROM access to locally logged-on user only, Refuse machine account password changes, Do not display last user name, Do not require CTRL+ALT+DEL, Allow anonymous SID/Name translation, Do not allow anonymous enumeration of SAM accounts, Let Everyone permissions apply to anonymous users and Allow automatic administrative logon are the audit policies, which we will discuss on the third day of training.

4. On the fourth day of this training program, we will discuss Configuring Registry Permissions, Configuring File Permissions, GPO Processing Priority, Patch Management, Software Inventory, Software Inventory - Regcleaner, NTFS v/s FAT, Network Security, Port Security, IIS Security – Script Mappings, FPSE Security and many more.

5. IE Security, Active Directory, Windows Domain, AD – Forests, Trees & Domains, Organizational Unit, Users & Groups in AD, Built-in Domain Local Groups, Account Operator, Print Operators, Replicator, Built in Domain Global Groups, Domain Users & Domain Guest, Enterprise Admin and a number of topics will be there, which we will discuss on ay 5.

6. We will spend sixth day of training by discussing, Schema Admin, Groups versus OUs, Auditing Account Logon Events, Auditing Account Management Events, Common Account Management Events, Audit File Access, Solution, Common Object Audit Events, Auditing File Share Configuration Events and Auditing Web Server Access.

7. Auditing Privilege Use Events, Auditing System Events, Common System Events, Shutting down Windows
when unable to log events, Viewing Events, Setting the Maximum Size of an Event Log, Clearing the Events in an Event Log, Searching event logs on multiple servers, Archiving Event Logs, Finding more information about an Event, Consolidating Event Logs and Attack Surface Analyzer will be our topics for last day.

Note: All the above mentioned topics are just an overview. There is many more things to learn at CDI.


Contact Us


Request more information

Proudly Operated from India

© 2016 Copyrights. All Rights Reserved

Bootstrap Example

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.

Sign Up Log In