Free Online Training, Workshops & Masterclasses
We’re happy to present free online training, workshops, and masterclasses to improve your knowledge.
If you can’t make it to a particular session, go ahead and register anyway as every session is recorded and you can watch at a time that’s convenient for you.
Thwarting security threats with SSO and passwordless login
Two thirds of users utilize 10 different applications every hour, resulting in password fatigue and increasing their cognitive burden. Passwords are not only a challenge to remember, but 86% of breaches involve credentials. Join this webinar and learn how to increase your enterprise’s security, improve the user experience, and save time and money using ManageEngine ADSelfService Plus’ SSO and passwordless login.
By seamlessly integrating ITSM and PAM workflows, organizations can foster a unified approach that strengthens IT security while ensuring operational agility and elevating IT service delivery. Join us to explore how the native integration of ServiceDesk Plus with PAM360 can help accelerate incident resolution, implement secure organization-wide IT changes, and more.
5 IGA essentials for modern enterprise security
For any cyberattack, two key cybersecurity components are digital forensics and incident response. With forensics, organizations can gather digital evidence and with response, they can mitigate detected threats. By combining the two components, security teams can accelerate threat response while maintaining recorded events of the occurred threat.
In this webinar, we’ll discuss how to take an integrated approach to DFIR and how a SIEM solution can help your organization implement this strategy.
Active Directory GPOs for beginners
February 06, 2025 02 PM GST | 10 AM GMT | 3:30 PM IST
GPOs are the silent masters that run your organization. A user in your organization, from the day one of their onboarding, is linked to GPOs and thereby to other AD objects. Access controls and permissions are governed by GPOs.
A quick question! How many GPOs does your organization have? It’s hard to get that right. In that case, how can you understand how these GPOs function in your network? How many objects are they linked to? To simplify GPO management and get straightforward answers to such questions, tune into the GPOs for beginners webinar.
Generative AI Meets IAM: A Vision for Smarter Identity Governance in 2025
February 12, 2025 02 PM AEST | 02 PM GST | 3:30 PM IST
- Learn how generative AI is set to revolutionize identity governance and access management.
- Gain insights into the emerging technologies shaping IAM practices in 2025.
- Walk away with strategies to future-proof your IAM systems.
Top 5 CISA recommendations to combat new-age cyberattacks
Artificial intelligence (AI) has become a crucial element, significantly enhancing cybersecurity defenses and providing capabilities that surpass traditional methods.
In this webinar, we’ll discuss how AI enhances threat detection, response times, and overall efficiency in handling security incidents. We’ll also delve into how AI-driven SIEM can help SOCs improve their overall security posture.
Future-Ready IAM: Strategies to Drive Digital Transformation with AD360
In today’s rapidly evolving digital landscape, ensuring secure and efficient identity and access management (IAM) is paramount. This webinar will provide:
Actionable insights on leveraging AD360 to enhance IAM strategies.
Expert guidance on aligning IAM with your organization’s digital transformation goals.
A roadmap to building a resilient IAM infrastructure for the future.
Don’t miss this opportunity to learn from industry leaders and explore AD360’s cutting-edge capabilities.
Three AD Tasks You Should Leave To Your Users
February 25, 2025 02 PM GST | 10 AM GMT | 3:30 PM IST
Password resets and account unlocks constitute almost 50% of IT support requests. When a single password reset call can cost a business $70, the expenses quickly add up.
Save invaluable time and money by giving your users the power to perform their own password resets, account unlocks, and directory updates. In this webinar, our product expert Sharada Murthy will demonstrate three key AD tasks you should leave to your users to reduce the load on IT support and increase overall productivity.
Maximizing Active Directory and Microsoft 365 security and compliance with automated access reviews
Gartner’s The Future of Compliance 2030 highlights a staggering prediction: by 2025, 80% of organizations worldwide will face penalties for non-compliance, with fines averaging $1.5 million per incident. These statistics underscore the urgent need for robust data governance and compliance measures.
Join us in this webinar to explore one of the most powerful tools for achieving compliance and enhancing security: Access Certification Campaigns. By systematically reviewing and certifying user access rights in Active Directory and Microsoft 365, organizations can fortify their security posture and streamline compliance processes, mitigating risks of costly penalties and reputational damage.
Syslog Demystified: Essential Linux Logs for Compliance and Security Insights
Deep Dive into Syslog: Understand how syslogs work and their critical role in Linux security.
Tips for Compliance: Learn how to leverage syslog data to meet regulatory requirements effortlessly.
Practical Threat Detection: Discover methods to detect anomalies and address threats using syslog data.
Real-World Insights: Gain valuable knowledge with real-world examples and actionable takeaways.
3 PowerShell commands for Red team’s Defense Evasion
Our Red team’s Reconnaissance kit webinar has PowerShell queries that cover recon extensively.
This webinar will focus on how simple PowerShell queries can help your red team (thereby, the attackers) evade defense. Be it your antivirus or antimalware, these commands will go undetected even if a malicious part runs them in your network. Get to know what these queries are, how they work, and how you can detect their executions before the attackers do.