DATE: May 12 –  from 9:00 am – 4:30 pm
May 13 –  from 9:00 am – 4:30 pm
May 14 –  from 9:00 am – 4:30 pm
May 15 –  from 9:00 am – 4:30 pm
LOCATION: Tech Manitoba, 435 Ellice Ave, Herzberg Room
COST: $2,975.00 + applicable taxes

Lunch will be provided each day

For more information or to register, contact:


For more information and to register for this training, please email 

“Investing in current team members can be a highly cost-effective way to shore up cybersecurity skills in an organization.” – (ISC)² Cybersecurity Workforce Study, 2018 (page 21).

Based on more than 15 years of security assessment and penetration testing experience, Digital boundary Group’s Hardening Windows Networks Training Program goes beyond theory and best practices to deliver proven, field-tested solutions for mitigating, monitoring, and protecting Microsoft Windows based networks.

Students will learn effective countermeasures to defend against common attacks and exploit techniques in a hands-on virtual environment that resembles a real-world network. Upon completion of the course, students will be able to apply operating system and active directory hardening techniques, mitigate legacy software risks, and design tolerant networks that are resistant to present and future threats.

Students will harden a network consisting of:

  • Microsoft Exchange
  • MS Windows Server 2016, 2012R2
  • Outlook Web Access
  • Microsoft Windows SQL Server
  • Proxy Server
  • Microsoft Software Update Services
  • Microsoft IIS
  • Firewall
  • Microsoft Windows 7/10


  • Common Exploitation Techniques
  • Host Firewall Configuration
  • Active Directory Group Policies
  • Network Traffic Analysis
  • Authentication Mechanisms
  • Proxy Server
  • Windows Auditing
  • File System Security
  • Log Monitoring and Alerting
  • Microsoft LAPS
  • Oracle Java Deployment Ruleset
  • Microsoft EMET
  • Windows AppLocker/Software Restriction
  • SNORT intrusion detection


  • Students will deploy host and network intrusion detection in a virtual windows network (SNORT, syslog, Windows events)
  • Run automated attacks and identify the source, destination, and type of attack
  • Harden a virtual Windows network
  • Run automated attacks to test windows hardening

(ISC)² accepts DBG’s Security Training Program as credit toward meeting the Continuing Professional Education requirements to maintain the CISSP designation.

  • CISSP Constituents will earn 32 CPE credits

This training course is supported by: