Showing 1–9 of 11 results

  • academy-it-microsoft-office-vendor-training
    $820.00

    About this course

    This one-day instructor-led course is intended for IT professionals who are interested in expanding their knowledge and awareness of cybersecurity. In this course, the student will begin to understand the complexities of cybersecurity including the cybersecurity landscape, cryptography, and how users, devices, applications, and networks can influence the effectiveness of the security perimeter. They’ll then see how the use of a Zero Trust framework as an overarching strategy can bolster and improve their cybersecurity perimeter.

    Course Outline

     

    Select options
  • academy-it-microsoft-office-vendor-training
    $820.00

    About this course

    This course is intended for both novice and experienced IT professionals. Students typically could have some experience or exposure to other IT-related areas, but have minimal or no exposure to cybersecurity or ransomware. Audience can include, but is not limited to, administrators, developers, testers, analysts, and students.

    Course Outline

     

    Select options
  • academy-it-microsoft-office-vendor-training
    $820.00

    About this course

    Introduced in 2006, Windows PowerShell is a scripting language, a command-line shell, and a scripting platform built on Microsoft .NET Framework. Despite the scripting designation, Windows PowerShell features a range of characteristics common for programming languages, including its object-oriented nature, extensibility, C#-like syntax, and the ability to interact directly with .NET classes, their properties, and methods.

    The primary objective of Windows PowerShell was to help IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows.

    To take advantage of the benefits that Windows PowerShell has to offer, while at the same time, minimize security-related risks, it is essential to understand the primary aspects of Windows PowerShell operational security. Another aspect that is critical to consider in the context of this course is the role of Windows PowerShell in security exploits.

    This 1-day Instructor-led security workshop provides discussion and practical hands-on training for PowerShell. you will learn about PowerShell fundamentals, including its architectural design, its editions and versions, and basics of interacting with PowerShell

    You will then explore the most common Windows PowerShell-based techniques employed by hackers in order to leverage existing access to a Windows operating system to facilitate installation of malicious software, carry out reconnaissance tasks, establish its persistency on the target computer, and promote lateral movement. You will also review some of Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the course, you will provide a summary of technologies recommended by the Blue Team that are geared towards implementing comprehensive, defense-in-depth security against Windows PowerShell-based attacks.

    This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with the first course in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.

    • 40551A: Microsoft Security Workshop: Enterprise Security Fundamentals
    • 40552A: Microsoft Security Workshop: Managing Identity
    • 40553A: Microsoft Security Workshop: Planning for a Secure Enterprise – Improving Detection
    • 40554A: Microsoft Security Workshop: Implementing Windows 10 Security Features
    • 40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices.

    Course Outline

     

    Select options
  • academy-it-microsoft-office-vendor-training
    $820.00

    About this course

    This 1-day Instructor-led security workshop provides insight into security practices to improve the security posture of an organization. The workshop examines the concept of Red team – Blue team security professionals, where one group of security pros–the red team–attacks some part or parts of a company’s security infrastructure, and an opposing group–the blue team–defends against the attack. Both teams work to strengthen a company’s defences. Since the goal of the two teams is to help the business attain a higher level of security, the security industry is calling this function, the Purple team.

    This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with this workshop in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.

    Course Outline

     

    Select options
  • academy-it-microsoft-office-vendor-training
    $3,280.00

    About this course

    This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

    Course Outline

    Select options
  • academy-it-microsoft-office-vendor-training
    $2,460.00

    About this course

    This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure.

    Course Outline

    Select options
  • academy-it-microsoft-office-vendor-training
    $820.00

    About this course

    This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

    Course Outline

    Select options
  • academy-it-microsoft-office-vendor-training
    $3,280.00

    About this course

    Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

    Course Outline

     

     

     

    Select options
  • academy-it-microsoft-office-vendor-training
    $3,280.00

    About this course

    The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

    Course Outline

    Add to cart