-
$4,100.00
About this course
This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches.
-
$3,280.00
About this course
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
-
$820.00
About this course
This 1-day Instructor-led security workshop provides insight into security practices to improve the security posture of an organization. The workshop examines the concept of Red team – Blue team security professionals, where one group of security pros–the red team–attacks some part or parts of a company’s security infrastructure, and an opposing group–the blue team–defends against the attack. Both teams work to strengthen a company’s defences. Since the goal of the two teams is to help the business attain a higher level of security, the security industry is calling this function, the Purple team.
This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with this workshop in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.
-
$820.00
About this course
Introduced in 2006, Windows PowerShell is a scripting language, a command-line shell, and a scripting platform built on Microsoft .NET Framework. Despite the scripting designation, Windows PowerShell features a range of characteristics common for programming languages, including its object-oriented nature, extensibility, C#-like syntax, and the ability to interact directly with .NET classes, their properties, and methods.
The primary objective of Windows PowerShell was to help IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows.
To take advantage of the benefits that Windows PowerShell has to offer, while at the same time, minimize security-related risks, it is essential to understand the primary aspects of Windows PowerShell operational security. Another aspect that is critical to consider in the context of this course is the role of Windows PowerShell in security exploits.
This 1-day Instructor-led security workshop provides discussion and practical hands-on training for PowerShell. you will learn about PowerShell fundamentals, including its architectural design, its editions and versions, and basics of interacting with PowerShell
You will then explore the most common Windows PowerShell-based techniques employed by hackers in order to leverage existing access to a Windows operating system to facilitate installation of malicious software, carry out reconnaissance tasks, establish its persistency on the target computer, and promote lateral movement. You will also review some of Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the course, you will provide a summary of technologies recommended by the Blue Team that are geared towards implementing comprehensive, defense-in-depth security against Windows PowerShell-based attacks.
This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with the first course in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.
- 40551A: Microsoft Security Workshop: Enterprise Security Fundamentals
- 40552A: Microsoft Security Workshop: Managing Identity
- 40553A: Microsoft Security Workshop: Planning for a Secure Enterprise – Improving Detection
- 40554A: Microsoft Security Workshop: Implementing Windows 10 Security Features
- 40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices.
-
$2,460.00
About this course
55318A is the updated version of the retired legacy MOC course 10962C. This three-day course teaches students how to automate administrative tasks using PowerShell. Students will learn crucial scripting skills such as creating advanced functions, writing controller scripts, and handling script errors. Candidates will learn how to use PowerShell when working with Microsoft Azure, SQL Server, Active Directory, IIS, Windows PowerShell Workflow, .NET resources, the REST API and XML, CSV & JSON formatted data files.
-
$820.00
About this course
This course is intended for both novice and experienced IT professionals. Students typically could have some experience or exposure to other IT-related areas, but have minimal or no exposure to cybersecurity or ransomware. Audience can include, but is not limited to, administrators, developers, testers, analysts, and students.
-
$820.00
About this course
This one-day instructor-led course is intended for IT professionals who are interested in expanding their knowledge and awareness of cybersecurity. In this course, the student will begin to understand the complexities of cybersecurity including the cybersecurity landscape, cryptography, and how users, devices, applications, and networks can influence the effectiveness of the security perimeter. They’ll then see how the use of a Zero Trust framework as an overarching strategy can bolster and improve their cybersecurity perimeter.
-
$820.00
About this course
Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.
-
$820.00
About this course
This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.