Free Online Training, Workshops & Masterclasses
We’re happy to present free online training, workshops, and masterclasses to improve your knowledge.
If you can’t make it to a particular session, go ahead and register anyway as every session is recorded and you can watch at a time that’s convenient for you.
Identity Security Simplified: Practical strategies for safeguarding the new perimeter
May 13, 2025 02 PM GST | 3:30 PM IST | 11 AM EDT
The traditional network perimeter has dissolved, replaced by a complex web of on-premises, cloud, and remote access points. In this new reality, identity is the critical control plane. Managing and securing user identities across Active Directory, Azure AD, and various applications is paramount, yet often overwhelming.
This webinar demystifies modern identity security, providing practical, actionable strategies you can implement immediately. We’ll explore how to strengthen authentication, enforce least privilege, and maintain visibility across your hybrid environment, effectively safeguarding your organization’s assets against evolving identity-based threats, simplified through an integrated approach.
- Key challenges in securing identities across hybrid AD/Azure AD environments.
- Practical steps to implement stronger authentication methods like MFA.
- Strategies for enforcing the principle of least privilege effectively.
- Techniques for gaining visibility and auditing identity-related activities.
- How to simplify identity lifecycle management and access governance.
Attacking hybrid AD by abusing Azure AD Connect
May 14, 2025 02 PM AEST | 02 PM GST | 3:30 PM IST
In hybrid identity environments, Azure AD Connect plays a critical role by syncing identities between on-premises Active Directory and Azure AD. But what happens when this trust bridge becomes the attacker’s pivot point?
Azure AD Connect works using a high-privileged service account that does not have MFA enabled.
Join us as we walk through a step-by-step attack scenario where threat actors exploit Azure AD Connect to escalate privileges and perform unauthorized actions without triggering alerts. This webinar will explain how this vector works, what signs to look for, and how to harden your hybrid identity infrastructure.
Get ahead of AD issues: How to resolve account lockouts, track user productivity, and monitor critical changes
May 15, 2025 02 PM AEST | 02 PM GST | 10 AM GMT | 3.30 PM IST
Account lockouts and other password-related issues often drain help desk resources that could be better utilized on strategic tasks. Additionally, unmonitored Active Directory Federation Services (AD FS) logons expose organizations to credential-based attacks. Manually tracking user activity and AD changes only adds to the operational burden on IT teams, leading to inefficiencies and compliance risks.
With Log360 Cloud’s latest features—Account Lockout Analyzer, User Work Hours Tracker, and AD FS Logon Monitor—you can address these challenges with confidence. You can automate investigations, accelerate resolution, and gain real time visibility into user behavior and AD activity. This will in turn give you actionable insights for proactive security.
Join this 45-minute webinar to learn how these tools eliminate friction, enhance visibility, and streamline compliance management.
Effortless Microsoft 365 management with ZERO PowerShell scripts
May 20, 2024 02 PM AEST | 10 AM GST | 11 AM GMT
With the adoption of remote work and bring your own devices (BYOD), the avenues for launching cyberattacks have increased multifold.
Organizations need to be on their guard to prevent data breaches. Implementing CISA’s security recommendations will help protect your organization and strengthen its security posture.
Zero Trust and Beyond: Strengthening Access Security with AD360
May 20, 2025 02 PM GST | 3:30PM IST | 11 AM EDT
With cyber threats becoming increasingly sophisticated, traditional perimeter-based security models are no longer enough. This webinar will help you understand how the Zero Trust approach strengthens identity and access management (IAM).
You’ll gain practical insights into implementing passwordless authentication, setting up conditional access policies, and segmenting user access to reduce risk. Discover how ManageEngine AD360 supports your Zero Trust journey by enabling granular control and enforcing least privilege access across your IT environment.
SIEM for critical IT asset – If it’s critical, it better be logged
May 21, 2025 11 AM AEST | 10 AM GST | 3:30 PM IST
- What are critical assets and how to identify them in your environment?
- Why protect critical assets?
- Real life examples and consequences of inadequate monitoring.
- Best Logging practices for critical assets.
Credential theft & Active Directory: How to stop attackers from moving laterally within your network
May 27, 2025 02 PM AEST | 02 PM GST | 3:30 PM IST
Credential theft serves as the foundation for many modern cyberattacks. Once a malicious actor secures even one set of user credentials, they can navigate your network freely, escalating privileges and endangering your most valuable data. Your Active Directory is a primary target for such exploits.
Building cloud policies to secure data in transit
May 27, 2024 02 PM AEST | 2PM GST | 3:30PM IST
As the frequency of cloud-based attacks increases, ensuring that employees’ activities in the cloud do not impact security is becoming a growing need for organizations. In this webinar, our expert will explore the threats to organizations that stem from cloud usage, how monitoring web app accesses helps improve security, and ways to regulate cloud accesses and uploads
Why do stadiums, arenas, and large venues need DDI solutions
May 28, 2025 11 AM BST
In a stadium packed with tens of thousands, people can miss a beat, pause to cheer, or fumble their phones — and the moment moves on. But the network running the venue? It has to be flawless. When every ticket scan, live stream, and surveillance feed depends on uninterrupted DNS, DHCP, and IP address resolution, there’s no room for downtime. In this webinar, we’ll uncover why DDI solutions are the invisible engine behind connected experiences in modern venues — and how they help IT teams stay one step ahead of the crowd.
Join us to explore how DDI solutions bring order, control, and security to the high-stakes world of large venue networking. Whether you manage an arena, a stadium, a convention center, or any high-density space, this session will show you how DDI makes the digital experience seamless for every user — and stress-free for your IT team.
Why do stadiums, arenas, and large venues need DDI solutions
Jun 19 2pm AEST | 11am GMT | 10am PDT
In the first episode of the fourth season of our Masterclass series, we will extensively cover how to discover and onboard all your privileged users and resources in PAM360. We will discuss how you can manage granular access to resources based on user roles and privileges. Additionally, we will delve into the password rotation capabilities of the product, the basics of privileged session management, and the auditing controls within the PAM platform.
Here is a glimpse of the episode’s key highlights:
- Discovering, onboarding, and managing resources by their type, function, or location and performing bulk actions with one click
- Securely sharing credentials across accounts, resources, and groups based on user roles
- Resetting privileged passwords using agent-based or agentless methods and triggering automated post-reset actions
- Launching one-click access to remote systems and securely connecting to web applications behind firewalls
- Recording and monitoring privileged sessions, enabling bidirectional file transfers, providing app-only access, and managing third-party access permissions