<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="32422" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/masterclass-saddd-l1" lastchanged="2026-04-07T13:54:37+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Master Class: Securing Active Directory Deep Dive</title><productcode>SADDD-L1</productcode><vendorcode>MT</vendorcode><vendorname>Master Class</vendorname><fullproductcode>MT-SADDD-L1</fullproductcode><version>1.0</version><objective>&lt;p&gt;In this master class course, the topic of Active Directory security is taken centrally into focus - in the meantime, various attack scenarios are known, which were used, for example, in the Bundestag hack ( mimikatz et.al. ).&lt;/p&gt;
&lt;p&gt;These valid attack scenarios are aimed at credential theft or ransomware implementation (e.g. at the logistics company Maersk with an estimated damage of 300 million euros).&lt;/p&gt;
&lt;p&gt;The goal of this workshop is to understand these scenarios so that you can prevent them and implement an Active Directory implementation that resists these attacks and is hardened against future attacks.&lt;/p&gt;
&lt;p&gt;The Active Directory are your &amp;quot;crown jewels&amp;quot; - without Active Directory, most corporate environments are completely crippled productively.&lt;/p&gt;
&lt;p&gt;That&amp;#039;s why: Understand, harden and monitor so you can sleep better.&lt;/p&gt;</objective><essentials>&lt;p&gt;At least 5 years of experience with Active Directory and client systems.&lt;/p&gt;</essentials><audience>&lt;p&gt;This course is designed for experienced system administrators, consultants and Active Directory designers. After this seminar, you will be able to design, implement and consult on highly secure Active Directory.&lt;/p&gt;</audience><contents>&lt;p&gt;In this DeepDive workshop, you will learn how to implement, configure and operate Active Directory environments in a highly secure manner.&lt;/p&gt;
&lt;p&gt;The Active Directory is &amp;quot;getting on in years&amp;quot;. Especially from a security point of view, an Active Directory should NEVER be operated in the standard. Attack scenarios such as Pass-the-Hash, Silver-Ticket, Golden-Ticket or even Skeleton-Key are common ways of attackers who can attack the Active Directory and thus the users and administrators and take over the identities. Last but not least, the hack of the Bundestag with the help of mimikatz and others has shown the vulnerability of the Active Directory.&lt;/p&gt;
&lt;p&gt;In this Master Class course, the attack scenarios on the Active Directory are first deeply examined and also carried out. With the knowledge gained from this, the Active Directory is now fundamentally hardened. This applies to existing installations, which should first be analyzed in depth, as well as new implementations, which are then completely hardened in order to be considered attack-proof in the future. The knowledge for this course was acquired in over 20 years of Active Directory experience, as well as in years of training by Paula Januszkiewicz and Sami Laiho, both world leaders in the field of security.&lt;/p&gt;
&lt;p&gt;This course further incorporates the experience of over 50+ Active Directory concepts written by the instructor over his last 15 years - from SMB to enterprise level with 375,000 users. The topic of security is also being looked at in the direction of the General Data Protection Regulation (GDPR), which came into effect on May 25, 2018.&lt;/p&gt;
&lt;p&gt;We promise: Our best know-how for you and your daily work from our most experienced trainers and consultants.&lt;/p&gt;
&lt;h4&gt;Training Environment:&lt;/h4&gt;&lt;p&gt;
In the training environment, we work entirely with Hyper-V. For the proactive setup of the training environment, we use a Powershell script with which you can create new virtual machines in seconds. The script was developed by your trainer himself and enables the training setup according to the customer&amp;#039;s wishes in extreme speed with little effort.&lt;/p&gt;
&lt;h4&gt;Hardware:&lt;/h4&gt;&lt;p&gt;
Each participant has a dedicated server in a data center with a total of 1 Gbit connection to the Internet. Each participant server is equipped as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;128 GB RAM&lt;/li&gt;&lt;li&gt;at least 20 vCores&lt;/li&gt;&lt;li&gt;2 NVME-SSDs with at least 3,000 MB/s writing and at least 2,000 MB/s reading&lt;/li&gt;&lt;li&gt;1 Gbit to the Internet Total bandwidth&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Your trainer&lt;/h4&gt;&lt;p&gt;The Advanced Master Class was developed by Andy Wendel and is delivered by himself and his experienced team.&lt;/p&gt;
&lt;p&gt;Andy Wendel is a Senior Data Center and Cloud Architect and Certified Security Master Specialization Advanced Windows Security. He was and is trained by the internationally renowned security experts &lt;a class=&quot;cms-href-ext&quot; href=&quot;http://cqure.pl/paula-januszkiewicz/&quot; data-cms-evt-click=&quot;Outbound Links;click;http://cqure.pl/paula-januszkiewicz/&quot;&gt;Paula Januszkiewicz&lt;/a&gt; and &lt;a class=&quot;cms-href-ext&quot; href=&quot;https://www.samilaiho.com/?/&quot; data-cms-evt-click=&quot;Outbound Links;click;https://www.samilaiho.com/?/&quot;&gt;Sami Laiho&lt;/a&gt;. This certification is renewed every year. Andy Wendel has been working as an IT trainer and consultant since the late 1990s and is also a Certified Microsoft Learning Consultant (MCLC). Worldwide, Microsoft has only awarded 56 Certified Learning Consultants.&lt;/p&gt;</contents><outline>&lt;ul&gt;
&lt;li&gt;Review of best practices for installing domain controllers from 20 years of experience as an ADDS senior consultant&lt;/li&gt;&lt;li&gt;Homegrown security issues in Active Directory
&lt;ul&gt;
&lt;li&gt;Understanding Kerberos&lt;/li&gt;&lt;li&gt;NTLM vs. Kerberos&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;SMB
&lt;ul&gt;
&lt;li&gt;SMB versions&lt;/li&gt;&lt;li&gt;Attack scenarios&lt;/li&gt;&lt;li&gt;Secure use of SMB&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;PAC_Validation and the problems with the Microsoft implementation of Kerberos &amp;ndash; in detail&lt;/li&gt;&lt;li&gt;PTH &amp;ndash; Pass the Hash &amp;ndash; including live attack with all participants&lt;/li&gt;&lt;li&gt;Silver Ticket&lt;/li&gt;&lt;li&gt;Golden Ticket&lt;/li&gt;&lt;li&gt;Skeleton Key&lt;/li&gt;&lt;li&gt;Kerberos Ticket Service
&lt;ul&gt;
&lt;li&gt;Understanding Kerberos&lt;/li&gt;&lt;li&gt;Change Kerberos passwords: Why and how&amp;hellip;&lt;/li&gt;&lt;li&gt;Changing Kerberos passwords: The silver bullet without failures&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Preventing credential theft &amp;ndash; A DeepDive:
&lt;ul&gt;
&lt;li&gt;Attack Scenario
&lt;ul&gt;
&lt;li&gt;Pass-the-Hash&lt;/li&gt;&lt;li&gt;Silver ticket&lt;/li&gt;&lt;li&gt;GoldenTicket&lt;/li&gt;&lt;li&gt;Skeleton-Key&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Prevent credential theft
&lt;ul&gt;
&lt;li&gt;Configure Windows Defender Credential Guard&lt;/li&gt;&lt;li&gt;Windows Defender Remote Credential Guard Bitlocker&lt;/li&gt;&lt;li&gt;Deploy Windows Defender Device Guard&lt;/li&gt;&lt;li&gt;Deploy AppLocker&lt;/li&gt;&lt;li&gt;Deploy Windows Defender Application Guard&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Understanding concepts:
&lt;ul&gt;
&lt;li&gt;Operating Tier.models&lt;/li&gt;&lt;li&gt;From Red-Forest, Golden-Forest and Bastion Forests&lt;/li&gt;&lt;li&gt;Highly secure single-domain model&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Clean installation source
&lt;ul&gt;
&lt;li&gt;Verify hash values of *.iso files&lt;/li&gt;&lt;li&gt;Fciv.exe, Powershell, 7zip and IgorHasher&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Set up the first domain controller
&lt;ul&gt;
&lt;li&gt;Understanding ms-ds-machineaccountquota&lt;/li&gt;&lt;li&gt;Use redircmp for new computer systems&lt;/li&gt;&lt;li&gt;Using redirusr for new users&lt;/li&gt;&lt;li&gt;Bitlocker&lt;/li&gt;&lt;li&gt;Bitlocker and TPM 1.2 vs. 2.0&lt;/li&gt;&lt;li&gt;Bitlocker and PreBoot authentication&lt;/li&gt;&lt;li&gt;AppLocker&lt;/li&gt;&lt;li&gt;Monitoring
&lt;ul&gt;
&lt;li&gt;AD-Audit-Plus&lt;/li&gt;&lt;li&gt;CyberArk&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Secure backup and recovery of Bitlocker-protected backup volumes&lt;/li&gt;&lt;li&gt;Firewalling on domain controllers&lt;/li&gt;&lt;li&gt;Configuring IPSEC with RDP&lt;/li&gt;&lt;li&gt;Hardening domain controllers according to
&lt;ul&gt;
&lt;li&gt;Center of Internet Security&lt;/li&gt;&lt;li&gt;gpPack&amp;amp; PaT&lt;/li&gt;&lt;li&gt;SIM&lt;/li&gt;&lt;li&gt;LDA&lt;/li&gt;&lt;li&gt;Microsoft tools&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Setting up additional domain controllers&lt;/li&gt;&lt;li&gt;Secure deployment of domain controllers, member servers and clients via MDT
&lt;ul&gt;
&lt;li&gt;Highly secure installation and configuration of MDT&lt;/li&gt;&lt;li&gt;Hardening of MDT servers&lt;/li&gt;&lt;li&gt;Rolling out highly secure member servers and clients&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Operating domain controllers securely via IPSEC
&lt;ul&gt;
&lt;li&gt;Configuring and using IPSEC&lt;/li&gt;&lt;li&gt;IPSEC monitoring via MMC&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Set up PKI server as internal Trusted ROOT CA
&lt;ul&gt;
&lt;li&gt;Configure PKI&lt;/li&gt;&lt;li&gt;Enable automatic certificate deployment via group policies&lt;/li&gt;&lt;li&gt;Enrolment of non-standard certificates&lt;/li&gt;&lt;li&gt;Hardening the PKI according to
&lt;ul&gt;
&lt;li&gt;Center of Internet Security&lt;/li&gt;&lt;li&gt;gpPack&amp;amp; PaT&lt;/li&gt;&lt;li&gt;SIM&lt;/li&gt;&lt;li&gt;LDA&lt;/li&gt;&lt;li&gt;Microsoft tools&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Jump Server and Privileged Access Workstation ( PAW ) &amp;ndash; Understanding and implementing concepts
&lt;ul&gt;
&lt;li&gt;Setting up and configuring jump servers
&lt;ul&gt;
&lt;li&gt;RSAT installation&lt;/li&gt;&lt;li&gt;Install ADMIN Center with valid certificate of a Trusted Root PKI&lt;/li&gt;&lt;li&gt;Bitlocker&lt;/li&gt;&lt;li&gt;Bitlocker and TPM 1.2 vs. 2.0&lt;/li&gt;&lt;li&gt;Bitlocker and PreBoot authentication&lt;/li&gt;&lt;li&gt;AppLocker&lt;/li&gt;&lt;li&gt;Configuring IPSEC with RDP&lt;/li&gt;&lt;li&gt;Backup of Jump servers to bitlocker-protected volumes&lt;/li&gt;&lt;li&gt;Firewalling on JUMP servers&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Hardening the Jump server according to
&lt;ul&gt;
&lt;li&gt;Center of Internet Security&lt;/li&gt;&lt;li&gt;gpPack&amp;amp; PaT&lt;/li&gt;&lt;li&gt;SIM&lt;/li&gt;&lt;li&gt;LDA&lt;/li&gt;&lt;li&gt;Microsoft tools&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Set up and configure PAW
&lt;ul&gt;
&lt;li&gt;Bitlocker&lt;/li&gt;&lt;li&gt;Bitlocker and TPM 1.2 vs. 2.0&lt;/li&gt;&lt;li&gt;Bitlocker and PreBoot authentication&lt;/li&gt;&lt;li&gt;AppLocker&lt;/li&gt;&lt;li&gt;Configuring IPSEC and RDP&lt;/li&gt;&lt;li&gt;Backup of PAWs to bitlocker-protected volumes&lt;/li&gt;&lt;li&gt;Firewalling on PAWs&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Hardening the domain controllers according to
&lt;ul&gt;
&lt;li&gt;Center of Internet Security&lt;/li&gt;&lt;li&gt;gpPack&amp;amp; PaT&lt;/li&gt;&lt;li&gt;SIM&lt;/li&gt;&lt;li&gt;LDA&lt;/li&gt;&lt;li&gt;Microsoft tools&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Security in domain networks
&lt;ul&gt;
&lt;li&gt;802.1X with
&lt;ul&gt;
&lt;li&gt;MAC addresses&lt;/li&gt;&lt;li&gt;Certificates&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;MAC flooding on switches
&lt;ul&gt;
&lt;li&gt;Switch off hubbing mode&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;IPSEC with Kerberos and certificates&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Windows Defender Advanced Threat Protection ( WDATP )
&lt;ul&gt;
&lt;li&gt;Understanding the concept of WDATP&lt;/li&gt;&lt;li&gt;Roll out and monitor WDATP&lt;/li&gt;&lt;li&gt;WDATP on domain controllers&amp;hellip;&lt;/li&gt;&lt;li&gt;WDATP on Jump Servers and PAWs&lt;/li&gt;&lt;li&gt;WDATP on Windows 10 clients&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>In this master class course, the topic of Active Directory security is taken centrally into focus - in the meantime, various attack scenarios are known, which were used, for example, in the Bundestag hack ( mimikatz et.al. ).

These valid attack scenarios are aimed at credential theft or ransomware implementation (e.g. at the logistics company Maersk with an estimated damage of 300 million euros).

The goal of this workshop is to understand these scenarios so that you can prevent them and implement an Active Directory implementation that resists these attacks and is hardened against future attacks.

The Active Directory are your &quot;crown jewels&quot; - without Active Directory, most corporate environments are completely crippled productively.

That's why: Understand, harden and monitor so you can sleep better.</objective_plain><essentials_plain>At least 5 years of experience with Active Directory and client systems.</essentials_plain><audience_plain>This course is designed for experienced system administrators, consultants and Active Directory designers. After this seminar, you will be able to design, implement and consult on highly secure Active Directory.</audience_plain><contents_plain>In this DeepDive workshop, you will learn how to implement, configure and operate Active Directory environments in a highly secure manner.

The Active Directory is &quot;getting on in years&quot;. Especially from a security point of view, an Active Directory should NEVER be operated in the standard. Attack scenarios such as Pass-the-Hash, Silver-Ticket, Golden-Ticket or even Skeleton-Key are common ways of attackers who can attack the Active Directory and thus the users and administrators and take over the identities. Last but not least, the hack of the Bundestag with the help of mimikatz and others has shown the vulnerability of the Active Directory.

In this Master Class course, the attack scenarios on the Active Directory are first deeply examined and also carried out. With the knowledge gained from this, the Active Directory is now fundamentally hardened. This applies to existing installations, which should first be analyzed in depth, as well as new implementations, which are then completely hardened in order to be considered attack-proof in the future. The knowledge for this course was acquired in over 20 years of Active Directory experience, as well as in years of training by Paula Januszkiewicz and Sami Laiho, both world leaders in the field of security.

This course further incorporates the experience of over 50+ Active Directory concepts written by the instructor over his last 15 years - from SMB to enterprise level with 375,000 users. The topic of security is also being looked at in the direction of the General Data Protection Regulation (GDPR), which came into effect on May 25, 2018.

We promise: Our best know-how for you and your daily work from our most experienced trainers and consultants.

Training Environment:


In the training environment, we work entirely with Hyper-V. For the proactive setup of the training environment, we use a Powershell script with which you can create new virtual machines in seconds. The script was developed by your trainer himself and enables the training setup according to the customer's wishes in extreme speed with little effort.

Hardware:


Each participant has a dedicated server in a data center with a total of 1 Gbit connection to the Internet. Each participant server is equipped as follows:


- 128 GB RAM
- at least 20 vCores
- 2 NVME-SSDs with at least 3,000 MB/s writing and at least 2,000 MB/s reading
- 1 Gbit to the Internet Total bandwidth
Your trainer

The Advanced Master Class was developed by Andy Wendel and is delivered by himself and his experienced team.

Andy Wendel is a Senior Data Center and Cloud Architect and Certified Security Master Specialization Advanced Windows Security. He was and is trained by the internationally renowned security experts Paula Januszkiewicz (http://cqure.pl/paula-januszkiewicz/) and Sami Laiho (https://www.samilaiho.com/?/). This certification is renewed every year. Andy Wendel has been working as an IT trainer and consultant since the late 1990s and is also a Certified Microsoft Learning Consultant (MCLC). Worldwide, Microsoft has only awarded 56 Certified Learning Consultants.</contents_plain><outline_plain>- Review of best practices for installing domain controllers from 20 years of experience as an ADDS senior consultant
- Homegrown security issues in Active Directory

- Understanding Kerberos
- NTLM vs. Kerberos
- SMB

- SMB versions
- Attack scenarios
- Secure use of SMB
- PAC_Validation and the problems with the Microsoft implementation of Kerberos – in detail
- PTH – Pass the Hash – including live attack with all participants
- Silver Ticket
- Golden Ticket
- Skeleton Key
- Kerberos Ticket Service

- Understanding Kerberos
- Change Kerberos passwords: Why and how…
- Changing Kerberos passwords: The silver bullet without failures
- Preventing credential theft – A DeepDive:

- Attack Scenario

- Pass-the-Hash
- Silver ticket
- GoldenTicket
- Skeleton-Key
- Prevent credential theft

- Configure Windows Defender Credential Guard
- Windows Defender Remote Credential Guard Bitlocker
- Deploy Windows Defender Device Guard
- Deploy AppLocker
- Deploy Windows Defender Application Guard
- Understanding concepts:

- Operating Tier.models
- From Red-Forest, Golden-Forest and Bastion Forests
- Highly secure single-domain model
- Clean installation source

- Verify hash values of *.iso files
- Fciv.exe, Powershell, 7zip and IgorHasher
- Set up the first domain controller

- Understanding ms-ds-machineaccountquota
- Use redircmp for new computer systems
- Using redirusr for new users
- Bitlocker
- Bitlocker and TPM 1.2 vs. 2.0
- Bitlocker and PreBoot authentication
- AppLocker
- Monitoring

- AD-Audit-Plus
- CyberArk
- Secure backup and recovery of Bitlocker-protected backup volumes
- Firewalling on domain controllers
- Configuring IPSEC with RDP
- Hardening domain controllers according to

- Center of Internet Security
- gpPack&amp; PaT
- SIM
- LDA
- Microsoft tools
- Setting up additional domain controllers
- Secure deployment of domain controllers, member servers and clients via MDT

- Highly secure installation and configuration of MDT
- Hardening of MDT servers
- Rolling out highly secure member servers and clients
- Operating domain controllers securely via IPSEC

- Configuring and using IPSEC
- IPSEC monitoring via MMC
- Set up PKI server as internal Trusted ROOT CA

- Configure PKI
- Enable automatic certificate deployment via group policies
- Enrolment of non-standard certificates
- Hardening the PKI according to

- Center of Internet Security
- gpPack&amp; PaT
- SIM
- LDA
- Microsoft tools
- Jump Server and Privileged Access Workstation ( PAW ) – Understanding and implementing concepts

- Setting up and configuring jump servers

- RSAT installation
- Install ADMIN Center with valid certificate of a Trusted Root PKI
- Bitlocker
- Bitlocker and TPM 1.2 vs. 2.0
- Bitlocker and PreBoot authentication
- AppLocker
- Configuring IPSEC with RDP
- Backup of Jump servers to bitlocker-protected volumes
- Firewalling on JUMP servers
- Hardening the Jump server according to

- Center of Internet Security
- gpPack&amp; PaT
- SIM
- LDA
- Microsoft tools
- Set up and configure PAW

- Bitlocker
- Bitlocker and TPM 1.2 vs. 2.0
- Bitlocker and PreBoot authentication
- AppLocker
- Configuring IPSEC and RDP
- Backup of PAWs to bitlocker-protected volumes
- Firewalling on PAWs
- Hardening the domain controllers according to

- Center of Internet Security
- gpPack&amp; PaT
- SIM
- LDA
- Microsoft tools
- Security in domain networks

- 802.1X with

- MAC addresses
- Certificates
- MAC flooding on switches

- Switch off hubbing mode
- IPSEC with Kerberos and certificates
- Windows Defender Advanced Threat Protection ( WDATP )

- Understanding the concept of WDATP
- Roll out and monitor WDATP
- WDATP on domain controllers…
- WDATP on Jump Servers and PAWs
- WDATP on Windows 10 clients</outline_plain><duration unit="d" days="5">5 jours</duration><pricelist><price country="PL" currency="EUR">5800.00</price><price country="IT" currency="EUR">5800.00</price><price country="NL" currency="EUR">5800.00</price><price country="US" currency="USD">6310.00</price><price country="AE" currency="USD">6429.84</price><price country="GB" currency="GBP">4830.00</price><price country="CA" currency="CAD">8710.00</price><price country="DE" currency="EUR">5900.00</price><price country="CH" currency="CHF">5900.00</price><price country="AT" currency="EUR">5900.00</price><price country="SE" currency="EUR">5900.00</price><price country="SI" currency="EUR">5900.00</price></pricelist><miles/></course>