Implementing Privileged Access Workstations (PAW)
Come and learn with Sami Laiho how Implementing Privileged Access Workstations (PAW) works in reality!
“If you can RDP into a server or a jump server from any computer in your network, you are in trouble and should join this training!” Sami Laiho
Training duration: 8 academic hours, all of which are theoretical and practical work (1 day).
Target audience: This course is good for IT- or security admins, or project leads.
Prerequisites: Basic knowledge of Windows administration, Active Directory/Entra ID and network infrastructure.
Contents of this training
One concept to deploy in any modern environment is the Concept of Privileged Access Workstations. We simply cannot allow _any_ computer to take down the whole company or have access to resources that can. A normal end-user computer can access the Internet and can not be thus used to manage the environment. A separate workstation, that cannot access the Internet and is better secured and more controlled, is to be used for managing the environment. We simply cannot combine potential access to malicious content and management into the same device.
The PAW is the missing component that makes a properly tiered Active Directory or Entra ID secure and easy to manage! Come and learn how the PAW-concept is deployed in reality! Join Sami Laiho, a world leading security expert on Windows OS and security, in this training and learn how he manages different sized environments and deploys the concept of Privileged Access Workstations.
The training is conducted in collaboration with Adminize.com
Sami Laiho – instructor and industry expert.
Sami has been working with and teaching OS troubleshooting, management, and security since 1995. He has been auditing and implementing security solutions, specializing in Principle of Least Privilege, Application Control and Privileged Access Workstations, since 2002 and has deployed solutions for companies with between 1-550000 endpoints.
Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in Finland. He is in the TOP10 most followed people in his field in Finland. At Ignite 2018, Sami’s “Behind the Scenes: How to build a conference winning session” and “Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes” sessions were ranked as #1 and #2 out of 1708 sessions! This was the first time in the history of the conference that anyone has been able to do this.
Before that, at Ignite 2017, the world’s biggest Microsoft event, Sami was evaluated as the Best External Speaker! Also, Sami’s sessions were evaluated as the Best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016, 2017, 2019, 2020, 2022, 2023 and 2024.
Specific course content
Module 1: Deploying Directory Tiering
- On-Prem (AD)
- Cloud (AAD)
Module 2: Deploying Privileged Access Computers for on-prem
- Different solutions for where to run PAWs
- IPsec or something else?
- Controlling the network connections and access to malicious content
Module 3: Deploying Privileged Access Computers for the Cloud
- Different solutions for where to run PAWs
- Conditional access or something else?
- Controlling the network connections and access to malicious content
Training objective
The objective of this training course is to equip participants with the skills to design and implement a Privileged Access Workstation solution, configure IPsec or Conditional Access Policies, and prevent illicit internet access from management systems. Additionally, participants will learn how to create a directory tiering solution to enhance security and system management.
Intended outcome
Learning objectives:
Upon the successful completion of this training course, you will be able to:
- design and implement a Privileged Access Workstation solution for a company;
- configure IPsec or Conditional Access Policy to limit exposure of critical systems;
- prevent illicit internet access from management systems;
- create a directory tiering solution.
The price includes:
- the training center provides a prepared workstation with the necessary hardware and software in the classroom. For participants attending the training in the online environment, remote access to the required software is provided if needed;
- the training is delivered by an instructor who holds at least level 5 of an adult educator qualification and has relevant work experience in the respective field;
We also offer:
- hot beverages with cookies;
- lunch on each training day;
- free parking (please register your parking with our office manager upon arrival for the training on each training day).
Continuing Education Curriculum Group: Database and Network Design and Management (0612 ISCED)
Trainer
-
Sami LaihoTrainer and one of the World’s leading professionals in the Windows OS and Security
Sami Laiho is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1995.
Sami has been auditing and implementing security solutions, specializing in Principle of Least Privilege, Application Control and Privileged Access Workstations, since 2002. Sami has deployed solutions for companies with between 1-550000 endpoints.
Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in Finland. He is in the TOP10 most followed people in his field in Finland.
At Ignite 2018, Sami’s “Behind the Scenes: How to build a conference winning session” and “Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes” sessions were ranked as #1 and #2 out of 1708 sessions!! This was the first time in the history of the conference that anyone has been able to do this.
Before that, at Ignite 2017, the world’s biggest Microsoft event, Sami was evaluated as the Best External Speaker! Also, Sami’s sessions were evaluated as the Best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016, 2017, 2019, 2020, 2022, 2023 and 2024.