-
$3,280.00
About this course
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
-
$820.00
About this course
This 1-day Instructor-led security workshop provides insight into security practices to improve the security posture of an organization. The workshop examines the concept of Red team – Blue team security professionals, where one group of security pros–the red team–attacks some part or parts of a company’s security infrastructure, and an opposing group–the blue team–defends against the attack. Both teams work to strengthen a company’s defences. Since the goal of the two teams is to help the business attain a higher level of security, the security industry is calling this function, the Purple team.
This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with this workshop in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.
-
$820.00
About this course
Introduced in 2006, Windows PowerShell is a scripting language, a command-line shell, and a scripting platform built on Microsoft .NET Framework. Despite the scripting designation, Windows PowerShell features a range of characteristics common for programming languages, including its object-oriented nature, extensibility, C#-like syntax, and the ability to interact directly with .NET classes, their properties, and methods.
The primary objective of Windows PowerShell was to help IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows.
To take advantage of the benefits that Windows PowerShell has to offer, while at the same time, minimize security-related risks, it is essential to understand the primary aspects of Windows PowerShell operational security. Another aspect that is critical to consider in the context of this course is the role of Windows PowerShell in security exploits.
This 1-day Instructor-led security workshop provides discussion and practical hands-on training for PowerShell. you will learn about PowerShell fundamentals, including its architectural design, its editions and versions, and basics of interacting with PowerShell
You will then explore the most common Windows PowerShell-based techniques employed by hackers in order to leverage existing access to a Windows operating system to facilitate installation of malicious software, carry out reconnaissance tasks, establish its persistency on the target computer, and promote lateral movement. You will also review some of Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the course, you will provide a summary of technologies recommended by the Blue Team that are geared towards implementing comprehensive, defense-in-depth security against Windows PowerShell-based attacks.
This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with the first course in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.
- 40551A: Microsoft Security Workshop: Enterprise Security Fundamentals
- 40552A: Microsoft Security Workshop: Managing Identity
- 40553A: Microsoft Security Workshop: Planning for a Secure Enterprise – Improving Detection
- 40554A: Microsoft Security Workshop: Implementing Windows 10 Security Features
- 40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices.
-
$820.00
About this course
This course is intended for both novice and experienced IT professionals. Students typically could have some experience or exposure to other IT-related areas, but have minimal or no exposure to cybersecurity or ransomware. Audience can include, but is not limited to, administrators, developers, testers, analysts, and students.
-
$820.00
About this course
This one-day instructor-led course is intended for IT professionals who are interested in expanding their knowledge and awareness of cybersecurity. In this course, the student will begin to understand the complexities of cybersecurity including the cybersecurity landscape, cryptography, and how users, devices, applications, and networks can influence the effectiveness of the security perimeter. They’ll then see how the use of a Zero Trust framework as an overarching strategy can bolster and improve their cybersecurity perimeter.
-
$820.00
About this course
Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.
-
$820.00
About this course
This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.
-
$820.00
About this course
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
-
$3,280.00
About this course
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.
Hello!
We are happy to see you again!
Login to your account
[wordpress_social_login]
Register to start learning
[wordpress_social_login]
My Cart 0