Product Image

Microsoft Security Workshop: Enterprise Security Fundamentals (MS-40551)

This one-day security training, led by a professor, offers insight into security procedures to strengthen an organization's security infrastructure.

Virtual

Learning Style

Microsoft

Provider

Advanced

Difficulty

1 Day

Course Duration

Course Info

Download PDF

Certificate

See Sample

Timezone
tab
About Individual Course:
  • Individual course plan gives you access to this course
$995.00
/ Seat

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

This one-day security training, led by a professor, offers insight into security procedures to strengthen an organization's security infrastructure.

Course Information

About this course:

 

This one-day security training, led by a professor, offers insight into security procedures to strengthen an organization's security infrastructure. This program explores the idea of Red and Blue Security Team Experts, where one team of security professionals 'the red team' targets some section or sections of the security infrastructure of an organization, and an opposing team 'the blue team' protects against the threat. Both groups work towards improving the defenses of an organization. Because the aim of the two groups is to support the organization to achieve a higher level of security, this function is named by the security industry 'the Purple team'.

This course is part of a larger series of workshops on the Security practice offered by MS. Although it is not mandatory that you have taken any of the other training in the Security Workshop program before completing this workshop, it is strongly recommended that you begin with the 1st course in this program, MS Security Workshop: Enterprise-Security-Fundamentals.

 

Course Objective:

 

· Determine variables which lead to breach costs

· Explain the kill chain activities, goals, and roles of the blue team in red team practices

· Explain the techniques to use telemetry monitoring to identify attacks.

· Determine targets common for cyber attackers

· Define the main activities that need to include in company preparations 

· Differentiate duties between the blue team and the red team 

· Define ways to restrict how unprivileged accounts may be exploited by an attacker

· Define Red Teams kill chain

· Explain existing conditions for cybersecurity 

· Define the concept of CIA triad

· Define the Doctrine of Compromise

· Explain the techniques utilized to restrain lateral movement

· Recognize the fundamental principles to develop and maintain policies

 

Audience:

 

This one-day training is designed for IT specialists who need a deeper knowledge of Windows Security and want to increase their level of knowledge. This program also offers cyber-security history before taking the other security courses in this series.

Outline

More Information

More Information
Brand Microsoft
Subjects Cloud Computing, Information Security, IT Ops & Management
Lab Access No
Technology Microsoft
Learning Style Virtual Classroom
Learning Type Course
Difficulty Advanced
Course Duration 1 Day
Language English
VPA Discount VPA Discount

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Course Expert:

Author

Paul Jackson

 

Paul has over 2 decades of of technical experience as a senior engineer, operations manager & project lead.
He has had hands-on impact within internal IT infrastructure, as well as in hundreds of unique customer environments that resulted in an in-depth knowledge of a wide range of security, identity, cloud, and infrastructure products & features; and a breadth of knowledge in associated network devices and applications.

His specialties include:

Identity, AD, Azure AD, Azure AD Connect, Azure MFA, ADFS, WAP, e-Gap, IAG, UAG, Firewalls, DirectAccess, Load balancers, PKI, Troubleshooting application and network issues, quickly learning new applications/technologies, building and leading tech teams, project management, creating scalable processes.

click here