Product Image

Microsoft Security Workshop: Enterprise Security Fundamentals (MS-40551)

This one-day security training, led by a professor, offers insight into security procedures to strengthen an organization's security infrastructure.


Learning Style





1 Day

Course Duration

Course Info

Download PDF


See Sample

About Individual Course:
  • Individual course plan gives you access to this course
/ Seat

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

This one-day security training, led by a professor, offers insight into security procedures to strengthen an organization's security infrastructure.

Course Information

About this course:


This one-day security training, led by a professor, offers insight into security procedures to strengthen an organization's security infrastructure. This program explores the idea of Red and Blue Security Team Experts, where one team of security professionals 'the red team' targets some section or sections of the security infrastructure of an organization, and an opposing team 'the blue team' protects against the threat. Both groups work towards improving the defenses of an organization. Because the aim of the two groups is to support the organization to achieve a higher level of security, this function is named by the security industry 'the Purple team'.

This course is part of a larger series of workshops on the Security practice offered by MS. Although it is not mandatory that you have taken any of the other training in the Security Workshop program before completing this workshop, it is strongly recommended that you begin with the 1st course in this program, MS Security Workshop: Enterprise-Security-Fundamentals.


Course Objective:


· Determine variables which lead to breach costs

· Explain the kill chain activities, goals, and roles of the blue team in red team practices

· Explain the techniques to use telemetry monitoring to identify attacks.

· Determine targets common for cyber attackers

· Define the main activities that need to include in company preparations 

· Differentiate duties between the blue team and the red team 

· Define ways to restrict how unprivileged accounts may be exploited by an attacker

· Define Red Teams kill chain

· Explain existing conditions for cybersecurity 

· Define the concept of CIA triad

· Define the Doctrine of Compromise

· Explain the techniques utilized to restrain lateral movement

· Recognize the fundamental principles to develop and maintain policies




This one-day training is designed for IT specialists who need a deeper knowledge of Windows Security and want to increase their level of knowledge. This program also offers cyber-security history before taking the other security courses in this series.

Career & Salary Insight


More Information

More Information
Brand Microsoft
Subjects Information Security
Lab Access No
Technology Microsoft
Learning Style Virtual Classroom
Learning Type Certification
Difficulty Advanced
Course Duration 1 Day
Language English

Acclaim Badge


Monthly Payments With Affirm

QuickStart and Affirm have teamed up to offer you financing, allowing you to pay off your purchase over time, on your own terms. Simply select Affirm in checkout, and you will need to take a few moments to fill out some information for a real-time decision. Checking your eligibility and terms won't affect your credit score. Once you are qualified, you will have the option to choose from 3, 6, 12, 18 or 26-month financing terms*, with each term clearly showing your monthly payment. No hidden fees or costs! it's that simple!

Rates are between 0-30% APR. As an example, a $700 purchase might cost $63.24/mo for 12 months at 15% APR. A down payment may be required. Subject to eligibility check and approval. Payment options depend on your purchase amount. Estimated payment excluded taxes and shipping fees. Paid interest is nonrefundable. Actual terms may vary. Payment options through Affirm are provided by these lending partners: Visit for more info.


Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Course Expert:


Paul Jackson


Paul has over 2 decades of of technical experience as a senior engineer, operations manager & project lead.
He has had hands-on impact within internal IT infrastructure, as well as in hundreds of unique customer environments that resulted in an in-depth knowledge of a wide range of security, identity, cloud, and infrastructure products & features; and a breadth of knowledge in associated network devices and applications.

His specialties include:

Identity, AD, Azure AD, Azure AD Connect, Azure MFA, ADFS, WAP, e-Gap, IAG, UAG, Firewalls, DirectAccess, Load balancers, PKI, Troubleshooting application and network issues, quickly learning new applications/technologies, building and leading tech teams, project management, creating scalable processes.

click here