Implementing Privileged Access Workstations (PAW)

If you can RDP into a server or a jump server from any computer in your network, you are in trouble and you should join this training!
corellia-security

Length 1 d

500 + VAT
  • Online and class room

One concept to deploy in any modern environment is the Concept of Privileged Access Workstations. We simply cannot allow _any_ computer to take down the whole company or have access to resources that can. A normal end-user computer can access the Internet and can not be thus used to manage the environment. A separate workstation, that cannot access the Internet and is better secured and more controlled, is to be used for managing the environment. We simply cannot combine potential access to malicious content and management into the same device.

The PAW is the missing component that makes a properly tiered Active (or Azure Active) Directory secure and easy to manage!

THE MOST COMMON REASON FOR PAW-PROJECT FAILING OR PEOPLE BEING UNHAPPY ABOUT IT, IS THAT PEOPLE READ MICROSOFT’S INSTRUCTIONS. Come and learn how the PAW-concept is deployed in reality!

Join, Sami Laiho, a world leading security expert, in this webinar and learn how he manages different sized environments and deploys the concept of Privileged Access Workstations

Target group

This course is good for IT- or security admins, or project leads

Prerequisites

Basic knowledge of Windows administration, (Azure) Active Directory and network infrastructure

The primary payment method is an invoice. The applicable value-added tax is added to the price of the training. If you would like to pay by credit card, please contact sami@adminize.com

Course Contents

Module 1: Deploying Directory Tiering

  • On-Prem (AD)
  • Cloud (AAD)

Module 2: Deploying Privileged Access Computers for on-prem

  • Different solutions for where to run PAWs
  • IPsec or something else?
  • Controlling the network connections and access to malicious content

Module 3: Deploying Privileged Access Computers for the Cloud

  • Different solutions for where to run PAWs
  • Conditional access or something else?
  • Controlling the network connections and access to malicious content

Course Duration

1 days

Trainer

Sami Laiho

Sign up to a course

Attendee Information

Preferred Operating System *

Participation Type *

Oletko kiinnostunut asiakaskohtaisesta toteutuksesta?

Kerro tarpeesi, niin suunnittelemme koulutuksen tarpeisiinne räätälöitynä.