Free Online Training, Workshops & Masterclasses
We’re happy to present free online training, workshops, and masterclasses to improve your knowledge.
If you can’t make it to a particular session, go ahead and register anyway as every session is recorded and you can watch at a time that’s convenient for you.
Build a resilient service management framework using a security-first approach
July 16 10AM EST
$ 9.36 million—that’s the average data breach cost in the United States, as of 2024. For the 14th year, the US led the world in average breach cost, according to a report from IBM.
Beyond the mounting financial toll, in today’s evolving threat landscape, building long-term resilience is also becoming an elusive goal. Organizations might believe they’ve covered all their bases, but the ongoing disconnect between ITSM and SecOps continues to make stronger defenses a pipe dream.
The result of these silos are gaps within service management workflows that threat actors can take advantage of. It’s time IT leaders step up as they no longer can afford to have their ITSM strategies be the weak link in their cybersecurity efforts.
Join this session to learn how to bridge silos, weave security across key ITSM practices, and become more resilient to modern cybersecurity challenges.
AD auditing and security with log360 Cloud—Live monthly workshop
July 17 10AM EDT | 3PM BST
This workshop is designed to provide IT administrators and security professionals with hands-on experience in Log360 Cloud AD auditing. In this workshop, you’ll learn to:
- Configure audit policies in Log360 Cloud
- Use out-of-the-box reports for fast insights
- Build custom dashboards and widgets
- Track changes across AD objects (users, OUs, GPOs, etc.)
- Set up real-time alerts for unauthorized activity
Enforcing least privilege access with PAM360’s granular privilege elevation controls
July 17 2pm AEST | 11am GMT | 10am PDT
In the second episode, we’ll focus on one of the core tenets of Zero Trust access: eliminating standing privileges, where we will walk you through how to replace permanent administrative access with just-in-time (JIT) privilege elevation, helping you reduce attack surfaces and enforce least privilege across your endpoints and critical systems.
We’ll break down PAM360’s privilege elevation framework, which is built on a maker-checker model and policy-based access. You’ll learn how you can leverage PAM360’s granular privilege elevation controls to configure and scrutinize access requests, automate approvals, and enable dynamic controls for applications and user actions.
Here’s a glimpse of the episode’s key highlights:
- Enforcing role-based access controls through request-release workflows based on user roles and responsibilities
- Granting JIT access and privilege elevation for both local and domain accounts, ensuring zero standing privileges
- Using policy-based conditional access with real-time risk signals and contextual controls
- Applying application control and command filtering through self-service privilege elevation with sandboxed access
- Managing local admin rights and application execution using PAM360’s built-in endpoint
Think like an Attacker, Defend like a Pro: Mastering Endpoint Security
Part 1 – Attack Surfaces and The Hacker’s Mindset
Part 1 – July 24, 2025 11:00 AM PM IST
Explore how attackers think and why endpoints remain prime targets in today’s evolving threat landscape.
Dissect some real-world attacks to understand what went right, what went wrong, and where defenses failed.
Uncover common endpoint security gaps that continue to expose organizations—especially SMBs—to risks.
Gain insights into how attackers bypass traditional protections and how threat hunting can help reveal early indicators of compromise.
Learn how to evolve from reactive security to a proactive, layered defence strategy.
Your Takeaway
- Explore how attackers think and why endpoints remain prime targets in today’s evolving threat landscape.
- Dissect some real-world attacks to understand what went right, what went wrong, and where defenses failed.
- Uncover common endpoint security gaps that continue to expose organizations—especially SMBs—to risks.
- Gain insights into how attackers bypass traditional protections and how threat hunting can help reveal early indicators of compromise.
- Learn how to evolve from reactive security to a proactive, layered defense strategy.
Equip yourself with practical insights to strengthen your organization’s cyber resilience and stay ahead of modern threats.
Think like an Attacker, Defend like a Pro: Mastering Endpoint Security
Part 2 -The Defence Blueprint: Building Endpoint Resilience
Part 2 – July 31, 2025 11:00 AM PM IST
Explore how attackers think and why endpoints remain prime targets in today’s evolving threat landscape.
Dissect some real-world attacks to understand what went right, what went wrong, and where defenses failed.
Uncover common endpoint security gaps that continue to expose organizations—especially SMBs—to risks.
Gain insights into how attackers bypass traditional protections and how threat hunting can help reveal early indicators of compromise.
Learn how to evolve from reactive security to a proactive, layered defence strategy.
Your Takeaway
- See it in action: We’ll walk you through a live demo of Endpoint Central — showcasing how its capabilities translate prevention, detection, and response into real-world defense outcomes
- Discover how AI and advanced threat detection are transforming modern endpoint protection.
- Get actionable strategies for building a unified, layered defense that stops attacks before they happen.
- Explore how to scale your threat detection and response without increasing the complexity.
- Uncover ways to simplify compliance, reporting, and response with centralized control.
Walk away with a tactical playbook for enhancing your organization’s cyber resilience and staying ahead of evolving threats.
Think like an Attacker, Defend like a Pro: Mastering Endpoint Security
July 24 11:00 AM BST
Zero silos. Centralized control. That’s full-stack DDI!
Join our free training to explore how ManageEngine’s full-stack DDI solution, DDI Central, helps you effectively manage Microsoft Windows DNS and DHCP clusters. Gain hands-on control over your core network services—DNS, DHCP, and IP address management—across distributed sites. Learn how DDI Central enables the enforcement of advanced security policies to protect your network infrastructure.