Free Online Training, Workshops & Masterclasses
We’re happy to present free online training, workshops, and masterclasses to improve your knowledge.
If you can’t make it to a particular session, go ahead and register anyway as every session is recorded and you can watch at a time that’s convenient for you.
Active Directory auditing – The Extended Capabilities
Active Directory auditing – The key to security and compliance success.
Active Directory is vital for authenticating users when they log on to a network. It is also the technology that authorizes users and gives them access to the resources that they are entitled to. Because of its importance to the functioning of any organization, it is continuously under threat from cyber attackers. As if that were not enough, its complexity can also lead to misconfigurations that make it perform differently from how it is intended.
This is exactly why you need to audit Active Directory in real time. Join this webinar to learn how you can accomplish this. We will go over the main AD-related configurations that you need to audit and how you can keep your AD proactively secure.
4 self-service best practices to supercharge your IT security
If your IT department spends much of their working hours on help desk tickets, then giving your employees a self-service portal is one of the best things you can do to boost your organization’s productivity. With a self-service portal, your IT department is freed up to focus on more pressing concerns and employees will spend less time waiting for their account to be unlocked or password to be reset.
However, one concern with self-service is that, if not configured properly, it has the potential to open up your environment to account takeover attacks and other security threats.
If you want to enjoy the benefits of self-service without worrying about your organization’s security, this webinar is for you.
In less than 30 minutes, our product expert will demonstrate four simple, yet incredibly effective practices that you can implement today to provide secure self-service to your users.
3 most overlooked Active Directory vulnerabilities and how to detect them
Active Directory is the core and always the primary target. Let’s not leave any loopholes for attackers to exploit and barge into your infrastructures. Not anymore.
In this webinar, let’s look at 3 Active Directory vulnerabilities that are often overlooked, and often exploited. We’ll discuss how these vulnerabilities can be detected using native tools. Even better, we’ll look at how these threats can be evaded using a SIEM solution.
Tracking Windows user logon 101
User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as:
Detecting suspicious activities like a high volume of logon failures. Tracking the active and idle time spent by users at their workstations. Maintaining a comprehensive audit trail of logons occurring across the domain and more.
However, the process of auditing logons has a steep learning curve. We’ve put together this webinar to make it easier for you to get on top of the process.
The Cost of AD Mismanagement: Hidden Risks, Compliance Failures & How to Fix Them
- Uncover Hidden Risks: Learn how AD misconfigurations lead to security breaches, compliance failures, and operational inefficiencies.
- Compliance Made Easy: Understand key regulatory requirements (GDPR, HIPAA, SOX) and how AD mismanagement impacts audits.
- Real-World Case Studies: Explore incidents of AD mismanagement and how organizations suffered due to overlooked vulnerabilities.
- Step-by-Step Fixes: Get a practical guide on optimizing AD security, auditing, and automation to prevent costly mistakes.
Modernizing IAM: AI-Driven Security and Adaptive Access with AD360
Discover how AI and machine learning are revolutionizing identity threat detection and response.
Learn how to implement adaptive authentication to strengthen security without impacting user experience.
Get insights into using AD360 for risk analysis and automated workflows.
How to build a team to run your SOC and SIEM
“How many analysts will this require?” This is the first question that comes to a decision-maker’s mind when adopting a new security solution. A comprehensive SIEM solution helps in everything from compliance to threat hunting and incident management. Your SOC team must be structured to use technology best while aligning with the organization’s overall security strategy. In this webinar, you will learn how to build a robust SOC and the best practices for its success.
How can DDI solutions supercharge connectivity in modern seaports
Seaports, one of the four important channels of transportation, have been rapidly experiencing digital transformation, integrating with advanced technologies such as IoT, AI, and automated logistics to enhance their operational efficiency and productivity. These initiatives require a secured network infrastructure to support a large number of connected devices, including sensors, surveillance systems, and cargo management solutions.
However, this network expansion results in a more complex and vulnerable environment that gets exposed to cyber threats. And, without a centralized network management solution, network administrators will find it difficult to manage, monitor, and troubleshoot issues, leading to inefficiencies, security risks, and operational disruptions, which could potentially impact global trade.
DNS, DHCP, and IP address management (DDI) solutions provide a unified platform to streamline seaport network operations, ensuring high availability, scalability, and security. In this webinar, we’ll explore how DDI solutions empower port authorities and network administrators with greater control and visibility over critical network resources.
How to detect and mitigate living off the land attacks
Stealth attacks are becoming increasingly sophisticated, leveraging built-in system tools to evade detection. Threat actors use living off the land (LotL) attacks, where legitimate processes like PowerShell, WMI, and command-line utilities are weaponized to execute malicious activities under the radar. Traditional security measures often fail to detect these attacks because they blend in with normal operations.
In this 45-minute webinar, you will discover how event correlation can flag stealthy attack techniques. Learn how to track unusual system behaviour, trigger instant alerts, and automate responses to stay ahead of evolving threats.
Syslogs demystified: Leveraging syslogs from firewalls routers and switches
Syslogs from firewalls, routers, and switches provide early warning signs of attacks, unauthorized access, and misconfigurations. Many security frameworks require network log monitoring. In the second webinar of the series, Syslogs Demysitified, learn how proper syslog management can simplify audits and compliance efforts.Get actionable strategies on which logs to monitor, how to filter noise, and how to set up alerts for real-time threat detection.
Credential theft & Active Directory: How to stop attackers from moving laterally within your network
Credential theft serves as the foundation for many modern cyberattacks. Once a malicious actor secures even one set of user credentials, they can navigate your network freely, escalating privileges and endangering your most valuable data. Your Active Directory is a primary target for such exploits.
6 PowerShell tricks to discover critical network assets
PowerShell can give an attacker a lot of opportunities to discover and hand-pick a target which they can zero in on and take down. Attackers, with zero privileges, can look for lucrative and sensitive network resources and avenues to exfiltrate them stealthily.
In this webinar, we will look at 6 PowerShell scripts that you need to test out in your environment before the attackers do and identify vulnerable resources and secure them. The webinar will also cover detection mechanisms for such executions to keep attackers at bay.
Creating a 360° SRE dashboard for your organization
The modern IT environment is a whirlwind of rapid changes and intricate dependencies. With distributed systems, microservices, and cloud-native architectures, even minor glitches can trigger cascading failures. Outages and slowdowns aren’t just inconveniences; they’re disruptive blows to your bottom line.
But what if you could have a real-time, comprehensive view of all your ITOps? Imagine being able to identify and resolve issues before they escalate. This isn’t an IT utopia–this is the power of effective site reliability engineering (SRE) tracking.
In this webinar, discover how to build an intelligent SRE dashboard that can transform your ITOps. Gain the clarity and insights you need to navigate the challenges of modern IT.
Crafting the ideal employee journey with privileged access management
A seamless remote access experience is key to productivity, but security can’t take a backseat. As organizations embrace hybrid work models and dynamic IT environments, ensuring secure yet frictionless access to critical systems is more important than ever. This is where privileged access management becomes a game-changer.
With the right PAM strategy, organizations can onboard employees, especially vendors and third-party employees, with the least privilege required, grant just-in-time access when needed, and securely off-board them once their tenure ends. By integrating PAM into the employee lifecycle, organizations create a balance between security and efficiency, empowering teams to work without disruption while keeping sensitive assets protected.
The result? A workplace where security is intuitive, productivity thrives, and risks are proactively managed. Come see for yourself.
Identity Governance & Data Unification : A Technical Approach
In today’s complex IT environments, managing identity and data governance is a growing challenge. Organizations struggle with unifying access data across multiple directories, leading to security risks, privilege escalations, and compliance gaps. This webinar will provide a technical deep dive into solving these challenges using Azure AD and Native AD.
Whether you’re an IAM professional, IT admin, or security engineer, this webinar will equip you with the technical know-how to implement robust identity governance and data unification strategies.
Leveraging the Log360-Endpoint Central integration for advanced threat detection
May 06 2025 02 PM AEST | 02 PM GST | 11 AM EDT
Managing and securing endpoints requires a unified approach—but too often, security and endpoint data remain siloed, leading to blind spots in threat detection and incident response. While Endpoint Central streamlines endpoint management, security threats are evolving rapidly, making real-time threat detection more crucial than ever.
Join us for an exclusive webinar where we explore how integrating Endpoint Central with Log360 can fortify your security posture. This use case-driven session will highlight how Log360’s threat management capabilities empower Endpoint Central users with proactive threat detection, incident response, and compliance readiness.