Skip to main content

HK 190 - Windows Vulnerability Discovery and Hardening

Discover and Defend Architectural Vulnerabilities.

As a security professional, you need to defend the most widely used and most frequently targeted Operating System in the world – the Windows Operating System. In this course, you will learn from a hacker's perspective how architectural vulnerabilities are assessed and how to deploy effective countermeasures.

Request Course Details

Attending students will learn

  • How intruders analyze, identify and target critical Windows systems
  • How to proactively identify Window's OS and Application vulnerabilities
  • Tools and techniques used to attack Windows Systems and Applications

Who should attend

  • Incident Responders who need to understand and react to IDS alerts
  • Network Defenders seeking to understand Common Access Methods
  • Security Managers who desire to improve their Defensive Model
  • Security Operations Center Staff seeking to identify signs of compromise
  • New members of Penetration Testing and Vulnerability Assessment Teams


Although no specific courses are required, students should have some level of experience with Microsoft Windows and Linux operating systems as well as a basic understanding of TCP/IP networking.

Course Outline

1.  Attacking the Microsoft Windows Server OS

  • Scanning
  • Enumeration
  • Privilege Escalation
  • Pillaging
  • Expanding Influence
  • Cleanup (Covering Tracks)

2.  Attacking and Locking Down Microsoft Windows Applications

  • Attacking and Securing Microsoft SQL
  • Attacking and Securing Microsoft IIS

3.  Attacking and Locking Down Microsoft Windows Workstations and Servers

  • Windows XP/Vista/7
  • Windows Server 2003/2008/2012

Courses That Follow This Course

Request More Info About This Course

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...