Free Online Training, Workshops & Masterclasses

We’re happy to present free online training, workshops, and masterclasses to improve your knowledge.

If you can’t make it to a particular session, go ahead and register anyway as every session is recorded and you can watch at a time that’s convenient for you.

Identities are the new passwords

Active Directory auditing – The Extended Capabilities

April 02, 2025 11AM GMT | 2 PM EDT

Active Directory auditing – The key to security and compliance success.

Active Directory is vital for authenticating users when they log on to a network. It is also the technology that authorizes users and gives them access to the resources that they are entitled to. Because of its importance to the functioning of any organization, it is continuously under threat from cyber attackers. As if that were not enough, its complexity can also lead to misconfigurations that make it perform differently from how it is intended.

This is exactly why you need to audit Active Directory in real time. Join this webinar to learn how you can accomplish this. We will go over the main AD-related configurations that you need to audit and how you can keep your AD proactively secure.

Identities are the new passwords

4 self-service best practices to supercharge your IT security

 

April 03, 2025 11AM EDT | 3:00 PM GMT

If your IT department spends much of their working hours on help desk tickets, then giving your employees a self-service portal is one of the best things you can do to boost your organization’s productivity. With a self-service portal, your IT department is freed up to focus on more pressing concerns and employees will spend less time waiting for their account to be unlocked or password to be reset.

However, one concern with self-service is that, if not configured properly, it has the potential to open up your environment to account takeover attacks and other security threats.

If you want to enjoy the benefits of self-service without worrying about your organization’s security, this webinar is for you.

In less than 30 minutes, our product expert will demonstrate four simple, yet incredibly effective practices that you can implement today to provide secure self-service to your users.

Identities are the new passwords

3 most overlooked Active Directory vulnerabilities and how to detect them

 

 

April 08, 2025 11AM EDT | 3:00 PM GMT

 

Active Directory is the core and always the primary target. Let’s not leave any loopholes for attackers to exploit and barge into your infrastructures. Not anymore.

In this webinar, let’s look at 3 Active Directory vulnerabilities that are often overlooked, and often exploited. We’ll discuss how these vulnerabilities can be detected using native tools. Even better, we’ll look at how these threats can be evaded using a SIEM solution.

Identities are the new passwords

Tracking Windows user logon 101

 

April 10, 2025 11AM EDT | 3:00 PM GMT

 

User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as:

Detecting suspicious activities like a high volume of logon failures. Tracking the active and idle time spent by users at their workstations. Maintaining a comprehensive audit trail of logons occurring across the domain and more.

However, the process of auditing logons has a steep learning curve. We’ve put together this webinar to make it easier for you to get on top of the process.

Identities are the new passwords

The Cost of AD Mismanagement: Hidden Risks, Compliance Failures & How to Fix Them

 

April 10, 2025 11AM EDT | 3:00 PM GMT

 

  • Uncover Hidden Risks: Learn how AD misconfigurations lead to security breaches, compliance failures, and operational inefficiencies.
  • Compliance Made Easy: Understand key regulatory requirements (GDPR, HIPAA, SOX) and how AD mismanagement impacts audits.
  • Real-World Case Studies: Explore incidents of AD mismanagement and how organizations suffered due to overlooked vulnerabilities.
  • Step-by-Step Fixes: Get a practical guide on optimizing AD security, auditing, and automation to prevent costly mistakes.
Identities are the new passwords

Modernizing IAM: AI-Driven Security and Adaptive Access with AD360

 

April 16, 2025 2PM GST | 3:30PM IST | 11 AM EDT

Discover how AI and machine learning are revolutionizing identity threat detection and response.

Learn how to implement adaptive authentication to strengthen security without impacting user experience.

Get insights into using AD360 for risk analysis and automated workflows.

Identities are the new passwords

How to build a team to run your SOC and SIEM

 

April 16, 2025 11AM GMT | 02 PM EDT

“How many analysts will this require?” This is the first question that comes to a decision-maker’s mind when adopting a new security solution. A comprehensive SIEM solution helps in everything from compliance to threat hunting and incident management. Your SOC team must be structured to use technology best while aligning with the organization’s overall security strategy. In this webinar, you will learn how to build a robust SOC and the best practices for its success.

Identities are the new passwords

How can DDI solutions supercharge connectivity in modern seaports

 

April 17, 2025 | 11:00 AM GMT

 

Seaports, one of the four important channels of transportation, have been rapidly experiencing digital transformation, integrating with advanced technologies such as IoT, AI, and automated logistics to enhance their operational efficiency and productivity. These initiatives require a secured network infrastructure to support a large number of connected devices, including sensors, surveillance systems, and cargo management solutions.

However, this network expansion results in a more complex and vulnerable environment that gets exposed to cyber threats. And, without a centralized network management solution, network administrators will find it difficult to manage, monitor, and troubleshoot issues, leading to inefficiencies, security risks, and operational disruptions, which could potentially impact global trade.

DNS, DHCP, and IP address management (DDI) solutions provide a unified platform to streamline seaport network operations, ensuring high availability, scalability, and security. In this webinar, we’ll explore how DDI solutions empower port authorities and network administrators with greater control and visibility over critical network resources.

Identities are the new passwords

How to detect and mitigate living off the land attacks

 

April 17, 2025 11AM AEST | 10 AM GST | 3:30 PM IST

 

Stealth attacks are becoming increasingly sophisticated, leveraging built-in system tools to evade detection. Threat actors use living off the land (LotL) attacks, where legitimate processes like PowerShell, WMI, and command-line utilities are weaponized to execute malicious activities under the radar. Traditional security measures often fail to detect these attacks because they blend in with normal operations.

In this 45-minute webinar, you will discover how event correlation can flag stealthy attack techniques. Learn how to track unusual system behaviour, trigger instant alerts, and automate responses to stay ahead of evolving threats.

Identities are the new passwords

Syslogs demystified: Leveraging syslogs from firewalls routers and switches

 

April 23, 2025 11AM EDT | 3PM GMT

Syslogs from firewalls, routers, and switches provide early warning signs of attacks, unauthorized access, and misconfigurations. Many security frameworks require network log monitoring. In the second webinar of the series, Syslogs Demysitified, learn how proper syslog management can simplify audits and compliance efforts.Get actionable strategies on which logs to monitor, how to filter noise, and how to set up alerts for real-time threat detection.

Identities are the new passwords

Credential theft & Active Directory: How to stop attackers from moving laterally within your network

 

April 24, 2025 11AM EDT | 3PM GMT

 

Credential theft serves as the foundation for many modern cyberattacks. Once a malicious actor secures even one set of user credentials, they can navigate your network freely, escalating privileges and endangering your most valuable data. Your Active Directory is a primary target for such exploits.

Identities are the new passwords

6 PowerShell tricks to discover critical network assets

 

April 29, 2025 11AM GMT | 02 PM EDT

 

PowerShell can give an attacker a lot of opportunities to discover and hand-pick a target which they can zero in on and take down. Attackers, with zero privileges, can look for lucrative and sensitive network resources and avenues to exfiltrate them stealthily.

In this webinar, we will look at 6 PowerShell scripts that you need to test out in your environment before the attackers do and identify vulnerable resources and secure them. The webinar will also cover detection mechanisms for such executions to keep attackers at bay.

Identities are the new passwords

Creating a 360° SRE dashboard for your organization

 

April 29, 2025 2AM AEST | 10AM GMT | 10PM PST

 

The modern IT environment is a whirlwind of rapid changes and intricate dependencies. With distributed systems, microservices, and cloud-native architectures, even minor glitches can trigger cascading failures. Outages and slowdowns aren’t just inconveniences; they’re disruptive blows to your bottom line.

But what if you could have a real-time, comprehensive view of all your ITOps? Imagine being able to identify and resolve issues before they escalate. This isn’t an IT utopia–this is the power of effective site reliability engineering (SRE) tracking.

In this webinar, discover how to build an intelligent SRE dashboard that can transform your ITOps. Gain the clarity and insights you need to navigate the challenges of modern IT.

Identities are the new passwords

Crafting the ideal employee journey with privileged access management

 

Apr 29, 2025  11am CEST 

A seamless remote access experience is key to productivity, but security can’t take a backseat. As organizations embrace hybrid work models and dynamic IT environments, ensuring secure yet frictionless access to critical systems is more important than ever. This is where privileged access management becomes a game-changer.

With the right PAM strategy, organizations can onboard employees, especially vendors and third-party employees, with the least privilege required, grant just-in-time access when needed, and securely off-board them once their tenure ends. By integrating PAM into the employee lifecycle, organizations create a balance between security and efficiency, empowering teams to work without disruption while keeping sensitive assets protected.

The result? A workplace where security is intuitive, productivity thrives, and risks are proactively managed. Come see for yourself.

Identities are the new passwords

Identity Governance & Data Unification : A Technical Approach

 

April 30, 2025 11AM EDT | 3PM GMT

 

In today’s complex IT environments, managing identity and data governance is a growing challenge. Organizations struggle with unifying access data across multiple directories, leading to security risks, privilege escalations, and compliance gaps. This webinar will provide a technical deep dive into solving these challenges using Azure AD and Native AD.

Whether you’re an IAM professional, IT admin, or security engineer, this webinar will equip you with the technical know-how to implement robust identity governance and data unification strategies.

Identities are the new passwords

Leveraging the Log360-Endpoint Central integration for advanced threat detection

 

May 06 2025 02 PM AEST | 02 PM GST | 11 AM EDT

 

Managing and securing endpoints requires a unified approach—but too often, security and endpoint data remain siloed, leading to blind spots in threat detection and incident response. While Endpoint Central streamlines endpoint management, security threats are evolving rapidly, making real-time threat detection more crucial than ever.

Join us for an exclusive webinar where we explore how integrating Endpoint Central with Log360 can fortify your security posture. This use case-driven session will highlight how Log360’s threat management capabilities empower Endpoint Central users with proactive threat detection, incident response, and compliance readiness.

Servaplex provide tailored training for customers, if you would like more information drop us a quick mail and we will get straight back to you.