Free Online Training, Workshops & Masterclasses

We’re happy to present free online training, workshops, and masterclasses to improve your knowledge.

If you can’t make it to a particular session, go ahead and register anyway as every session is recorded and you can watch at a time that’s convenient for you.

AD, Exchange, & Microsoft 365 administration made easy : Day 1

January 05, 2026 02PM GST

Identity management across AD, Microsoft 365, and Google Workspace platforms

  • 360-degree user provisioning across AD, Microsoft 365, and Google Workspace applications using smart templates
  • Bulk object provisioning and deprovisioning using CSV files
  • Creating custom LDAP attributes based on your organization’s needs
  • Preventing duplication and avoiding conflicts during migration using naming formats
  • Preventing duplication using custom naming formats during user onboarding
  • Managing file server and share permissions, and restricting user access
  • Backing up and recovering entities across AD, Microsoft 365, and Google Workspace platforms, including incremental backups and granular restoration

AD, Exchange, & Microsoft 365 administration made easy : Day 2

January 06, 2026 02PM GST

Automated and orchestrated user onboarding and offboarding

  • Automating user provisioning, modification, and deprovisioning with automation policies
  • Onboarding and offboarding users across enterprise applications using webhooks and orchestration templates
  • Defining a sequence of tasks using logic and decision blocks with just drag-and-drop actions in orchestration templates
  • Integrating with various HCM applications, like Zoho People and BambooHR, and automating user management
  • Updating users’ records automatically from any HCM solution using APIs

Stop the Identity Kill Chain: A Practical Guide to ITDR

 

January 06, 2026 02PM AEST | 02PM GST | 3:30PM IST

Identity has become the most vulnerable attack surface, and attackers know it. From credential theft to privilege escalation, identity is exploited at every stage of the kill chain. ITDR (Identity Threat Detection & Response) helps you detect, disrupt, and respond before attackers get too far. This session will give you a practical look at how ITDR fits into your current cybersecurity startegy.

  • How modern attacks exploit identity gaps in AD, cloud apps, and endpoints
  • The anatomy of the “identity kill chain” — and where to break it
  • Practical ITDR use cases: spotting credential misuse, privilege escalation, and anomalous logins
  • How ITDR bridges IAM + SIEM for faster detection and response
  • A walkthrough of real-world ITDR policies and alerts

AD, Exchange, & Microsoft 365 administration made easy : Day 3

January 07, 2026 02PM GST

Workflow-controlled user access certification and delegation of tasks

  • Reviewing and validating users’ access rights using automated certification campaigns
  • Creating rules to dynamically assign certifiers for access certification campaigns
  • Granular delegation of tasks to help desk technicians without affecting their permissions in AD, Microsoft 365, and Google Workspace
  • Delegation of custom roles based on OUs and groups
  • Auditing technicians’ activity and detecting anomalies using audit and anomaly reports, respectively
  • Secure execution of delegated tasks with multi-level workflows consisting of requesters, reviewers, approvers, and executors
  • Improving resolution time with different levels of escalations using workflow SLAs

AD, Exchange, & Microsoft 365 administration made easy : Day 4

January 08, 2026 02pm gst

Script-free reporting, risk assessment and attack path management, while ensuring compliance

  • Comprehensive reporting on AD, and Microsoft 365, objects
  • Understanding the risk posture of AD and Microsoft 365 based on risk score, and identifying and mitigating risk indicators.
  • Managing objects from reports using on-the-fly management options
  • Scheduling reports to run at a specified time and exporting them in desired formats
  • Customizing reports as per an organization’s needs using advanced filters
  • Maintaining audit trails and meeting audit requirements using compliance-specific reports
  • Analysing and uncovering potential lateral movement paths to privileged entities in Active Directory and proactively remediate security gap

ManageEngine ADManager Plus Demo Webinar

January 08, 2026 02PM AEST | 02PM GST | 3:30PM IST

 

  • How to streamline Active Directory, Microsoft 365 and Google Workspace user and object management using ADManager Plus.
  • Bulk provisioning and deprovisioning: create, modify or remove users and groups in bulk using CSV files or smart templates.
  • Delegated administration and role-based task delegation without giving full admin rights.
  • Automating user onboarding and offboarding workflows with orchestration templates and HR system integrations.
  • Generating, scheduling and exporting compliance and audit-ready reports for AD objects, permissions and access history.

Active Directory GPOs for beginners

January 08, 2026 02PM AEST | 2PM GST | 3:30PM IST

 

  • How to streamline Active Directory, Microsoft 365 and Google Workspace user and object management using ADManager Plus.
  • Bulk provisioning and deprovisioning: create, modify or remove users and groups in bulk using CSV files or smart templates.
  • Delegated administration and role-based task delegation without giving full admin rights.
  • Automating user onboarding and offboarding workflows with orchestration templates and HR system integrations.
  • Generating, scheduling and exporting compliance and audit-ready reports for AD objects, permissions and access history.

5 Everyday Active Directory issues solved with automation

 

January 13, 2026 02PM AEST | 02PM GST | 3:30PM IST

 

 

Active Directory administration doesn’t have to be a constant cycle of repetitive updates and last-minute requests. From onboarding new employees to cleaning up stale accounts and ensuring timely privilege changes, many AD tasks follow predictable patterns making them ideal for automation.

In this webinar, we will walk through five everyday AD issues that can be solved with simple, reliable automation. You’ll see how automating routine operations not only saves time but also improves accuracy, strengthens security, and ensures policy compliance. Whether you’re a seasoned AD admin or just looking to streamline your workflows, this session will give you practical insights you can apply immediately.

Hijacking an organization in 30 minutes with nothing but PowerShell

 

January 13, 2026 02PM AEST | 2PM GST | 3:30 PM IST

PowerShell is an attacker’s holy grail. This webinar will give you insights on how an attacker can use PowerShell to hijack a network, establish initial access, get insights on services, web sessions, steal cookies, and take over the network.

Active Directory made accessible – 4 self-service features for everyday users

 

January 15, 2026 11AM AEST | 02PM GST | 3:30PM IST

  • Why self-service is crucial for hybrid password management.
  • Allow users to reset their hybrid Active Directory passwords.
  • Unlock AD accounts without Powershell.
  • Delegate self-update and mail group subscriptions to end-users.

ManageEngine Log360 Demo Webinar

 

January 21, 2026 02PM AEST | 02PM GST | 3:30PM IST

  • Live demonstration of log collection and analysis
  • Anomaly detection and alerting in action
  • Incident management workflow walkthrough
  • Overview of reporting and threat intelligence dashboards
  • Interactive Q&A to explore SOC and security scenarios

Building cloud policies to secure data in transit

 

January 21, 2026 02PM AEST | 02PM GST | 3:30PM IST

As the frequency of cloud-based attacks increases, ensuring that employees’ activities in the cloud do not impact security is becoming a growing need for organizations. In this webinar, our expert will explore the threats to organizations that stem from cloud usage, how monitoring web app accesses helps improve security, and ways to regulate cloud accesses and uploads.

Auditing permission and object changes that put you at risk

 

January 22, 2026 02PM AEST | 02PM GST | 3:30PM IST

 

Security breaches often involve quiet privilege escalations or subtle object changes. If you’re not auditing permission changes and object-level activity, you’re missing critical warning signs.

Join us to explore how to monitor permission updates and object-level changes, view the before-and-after states, and close privilege gaps. All this without deploying heavy infrastructure resources—with the help of AD auditing in Log360.

Maximizing Active Directory and Microsoft 365 security and compliance with automated access reviews

 

January 27, 2026 02PM AEST | 02PM GST | 3:30PM IST

Gartner’s The Future of Compliance 2030 highlights a staggering prediction: by 2025, 80% of organizations worldwide will face penalties for non-compliance, with fines averaging $1.5 million per incident. These statistics underscore the urgent need for robust data governance and compliance measures.

Join us in this webinar to explore one of the most powerful tools for achieving compliance and enhancing security: Access Certification Campaigns. By systematically reviewing and certifying user access rights in Active Directory and Microsoft 365, organizations can fortify their security posture and streamline compliance processes, mitigating risks of costly penalties and reputational damage.

ManageEngine ADSelfService Plus Demo Webinar

 

January 28, 2026 02PM AEST | 02PM GST | 3:30PM IST

 

  • Getting to Know ADSelfService Plus.
  • Password Resets Made Simple
  • MFA and Smart Security in Action
  • Seamless Access with SSO and Password Sync.
  • Adoption Strategies & Q&A Session.

A Practical Guide to Security & Compliance with Windows Logs

 

January 29, 2026 11AM AEST | 02PM GST | 3:30PM IST

Windows logs are one of the richest sources of security intelligence, but only if configured, collected, and analyzed correctly. This session will walk you through the essentials of using Windows logs to strengthen your security posture and achieve audit-ready compliance.

Whether you manage servers, oversee compliance programs, or handle security operations, this webinar will help you transform raw logs into actionable insights.

Servaplex provide tailored training for customers, if you would like more information drop us a quick mail and we will get straight back to you.