Microsoft Core Security Battle Path
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions’s Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a DiTech Solutions Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Windows Event Logs
- Active Directory Rights Management
- Active Directory GPO
Module 2
- Windows Event Logs
- PKI Web Cert Template
- PowerShell Introduction
Module 3
- PowerShell Basics 1
- PowerShell Basics 2
- PowerShell Code Signing
Module 4
- PowerShell Logging
- Regular Expressions: Basics
- Sysmon
Module 5
- Voidtools Everything
- NTLM
- Pass the Hash
Module 6
- Windows: Weak and Reused Creds
- Sysmon: Process Injection
- Windows Information Gathering
Module 7
- PKI Web Server Cert Enrollment
- Nmap: SMB Enumeration
- Sysmon Capture Clipboard
Module 8
- Windows: Email URL Analysis
- Windows: Splunk Basics
- Windows Procmon
Module 9
- Windows: Email Header Analysis
- Windows: YARA Introduction
- Windows: YARA Rule Writing
Module 10
- Windows:YARA Rule Generation
- Windows:YARA Rule Management
- Windows:Process Injection IR with Splunk
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions’s Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a DiTech Solutions Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Windows Event Logs
- Active Directory Rights Management
- Active Directory GPO
Module 2
- Windows Event Logs
- PKI Web Cert Template
- PowerShell Introduction
Module 3
- PowerShell Basics 1
- PowerShell Basics 2
- PowerShell Code Signing
Module 4
- PowerShell Logging
- Regular Expressions: Basics
- Sysmon
Module 5
- Voidtools Everything
- NTLM
- Pass the Hash
Module 6
- Windows: Weak and Reused Creds
- Sysmon: Process Injection
- Windows Information Gathering
Module 7
- PKI Web Server Cert Enrollment
- Nmap: SMB Enumeration
- Sysmon Capture Clipboard
Module 8
- Windows: Email URL Analysis
- Windows: Splunk Basics
- Windows Procmon
Module 9
- Windows: Email Header Analysis
- Windows: YARA Introduction
- Windows: YARA Rule Writing
Module 10
- Windows:YARA Rule Generation
- Windows:YARA Rule Management
- Windows:Process Injection IR with Splunk