Implementing Privileged Access Workstations (PAW)

Come and learn with Sami Laiho how Implementing Privileged Access Workstations (PAW) works in reality!

“If you can RDP into a server or a jump server from any computer in your network, you are in trouble and should join this training!” Sami Laiho

 

Training duration: 8 academic hours, all of which are theoretical and practical work (1 day).

Target audience: This course is good for IT- or security admins, or project leads.

Prerequisites: Basic knowledge of Windows administration, Active Directory/Entra ID and network infrastructure.

Contents of this training

Specific course content

Course agenda

Module 1: Deploying Directory Tiering

  • On-Prem (AD)
  • Cloud (AAD)

Module 2: Deploying Privileged Access Computers for on-prem

  • Different solutions for where to run PAWs
  • IPsec or something else?
  • Controlling the network connections and access to malicious content

Module 3: Deploying Privileged Access Computers for the Cloud

  • Different solutions for where to run PAWs
  • Conditional access or something else?
  • Controlling the network connections and access to malicious content

Training objective

The objective of this training course is to equip participants with the skills to design and implement a Privileged Access Workstation solution, configure IPsec or Conditional Access Policies, and prevent illicit internet access from management systems. Additionally, participants will learn how to create a directory tiering solution to enhance security and system management.

Intended outcome

Learning objectives:

Upon the successful completion of this training course, you will be able to:

  • design and implement a Privileged Access Workstation solution for a company;
  • configure IPsec or Conditional Access Policy to limit exposure of critical systems;
  • prevent illicit internet access from management systems;
  • create a directory tiering solution.
Conditions for completion of the training: The achievement of learning outcomes will be assessed through independent practical work. At the end of the training, the training center issues a certificate or a document of participation to those who have completed the training. A certificate will be issued if the participant has completed at least 80% of the training curriculum and met other requirements specified in the training plan (e.g., exam, assessment, practical work, etc.). A document of participation will be issued to individuals who have attended the supplementary training or if the achievement of learning outcomes was not assessed during the training, or if the individual did not achieve all the required learning outcomes to complete the curriculum.

The price includes:

  • the training center provides a prepared workstation with the necessary hardware and software in the classroom. For participants attending the training in the online environment, remote access to the required software is provided if needed;
  • the training is delivered by an instructor who holds at least level 5 of an adult educator qualification and has relevant work experience in the respective field;

We also offer:

  • hot beverages with cookies;
  • lunch on each training day;
  • free parking (please register your parking with our office manager upon arrival for the training on each training day).

Continuing Education Curriculum Group: Database and Network Design and Management (0612 ISCED)

Book Event

Attend training
Available seats: Unlimited
The Attend training ticket is sold out. You can try another ticket or another date.

Date

12.May 2025

Time

1 day
09:00 - 16:00

Cost

490€ +VAT
- 20 %

390€ +VAT

Location

Lõõtsa 5, Tallinn, Estonia
or by participating online
Register

Trainer

  • Sami Laiho
    Sami Laiho
    Trainer and one of the World’s leading professionals in the Windows OS and Security

    Sami Laiho is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1995.
    Sami has been auditing and implementing security solutions, specializing in Principle of Least Privilege, Application Control and Privileged Access Workstations, since 2002. Sami has deployed solutions for companies with between 1-550000 endpoints.
    Since 2019 Sami has been chosen by TiVi-magazine as one of the top 100 influencers in IT in Finland. He is in the TOP10 most followed people in his field in Finland.
    At Ignite 2018, Sami’s “Behind the Scenes: How to build a conference winning session” and “Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes” sessions were ranked as #1 and #2 out of 1708 sessions!! This was the first time in the history of the conference that anyone has been able to do this.
    Before that, at Ignite 2017, the world’s biggest Microsoft event, Sami was evaluated as the Best External Speaker! Also, Sami’s sessions were evaluated as the Best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016, 2017, 2019, 2020, 2022, 2023 and 2024.

All Occurrences