/ Consulting

About workshop

During this practical online workshop, Paula will guide you through key system components and teach you everything you need to know to get a better perception of the system vulnerabilities. This intense 2-hour training session will cover how Windows OS architecture and system security mechanisms may be overused to perform malicious actions.

We will discuss and investigate Windows processes internals, permissions, privileges and rights. Then we will be ready to do a deep dive into DPAPI theory to understand why it’s so important to use additional factor to protect your passwords.

Agenda

Configuration review or ethical hacking, is a cybersecurity practice that involves simulating a cyber attack on an organization’s systems, networks, or applications to identify vulnerabilities that could be exploited by real attackers. Pellentesque pretium purus metus, at efficitur erat varius tincidunt. Pellentesque pretium purus metus, at efficitur erat varius tincidunt.

  • Overview of key system components

    Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

  • Overview of key system components

    Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

  • Securing privileged access

    Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

  • Extracting user’s secrets

    Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

Why attend?

Be Inspired

Penetration testing helps a company identify vulnerabilities in their network, systems, and applications that could be exploited by attackers.

Grow your network

Penetration testing helps a company identify vulnerabilities in their network, systems, and applications that could be exploited by attackers.

Follow the Trends

Penetration testing helps a company identify vulnerabilities in their network, systems, and applications that could be exploited by attackers.

Meet the masterminds behind our team of CQURE experts

Against christian gains play god ideal. Abstract play love hatred snare eternal-return. Of battle noble ascetic chaos battle law hatred. Burying snare against faithful prejudice aversion oneself mountains.

No results found.

FAQ

  • How can I register?

    You can book your seat by registering on the website.

  • Is registration free?

    Yes, participating in this event is entirely free.

  • What if I cannot attend personally?

    Fortunately, the CEE Cybersecurity Forum will be avaiable online: you will be able to access the lectures remotely and access the recording afterwards.

  • Who can I contact if I have a question?

    In case of any questions, you can contact us directly or send an email to the organizer.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form

      Need cyber security protection?

      Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.