Course 40551-A: Microsoft Security Workshop: Enterprise Security Fundamentals

Prihajajoče izvedbe

Nivo:For IT professionals
Kategorija prodajalca:Windows
Trajanje (dni):1
Tip učenja:V učilnici
Cena:338€ + DDV

This 1-day Instructor-led security workshop provides insight into security practices to improve the security posture of an organization. The workshop examines the concept of Red team – Blue team security professionals, where one group of security pros--the red team--attacks some part or parts of a company’s security infrastructure, and an opposing group--the blue team--defends against the attack.

  • Module 1: Understanding the cyber-security landscape

In this module, you will learn about the current cybersecurity landscape and learn how adopting the assume compromise philosophy, you can you restrict an attacker’s ability to move laterally between information systems and to restrict their ability to escalate privileges within those systems.

  • Module 2: Red Team: Penetration, Lateral Movement, Escalation, and Exfiltration

Red team versus blue team exercises involve the simulation of an attack against an organization’s information system. The red team simulates and, in some cases, performs proof of concept steps taken in the attack against the organization’s IT systems. 

  • Module 3: Blue Team Detection, Investigation, Response, and Mitigation

In this module you will learn about the Blue Team roles and goals in the attack exercises. You will learn the structure of an attack against an objective (Kill Chain) and the ways limiting how an attacker can compromise unprivileged accounts. You will also learn the methods used to restrict lateral movement that prevent attackers from using a compromised system to attack other systems and how telemetry monitoring is used to detect attacks.

  • Module 4: Organizational Preparations

You will learn about a conceptual model for thinking about the security of information and how to approach information security and to prepare properly including ensuring your organization has a deliberate approach to information security.

In addition to their professional experience, students who take this training should already have the following technical knowledge:


  • The current cyber-security ecosystem
  • Analysis of hacks on computers and networks
  • Basic Risk Management
Trenutno ni na voljo nobenih terminov. Za več informacij nas kontaktirajte na telefonsko številko: 01 568 40 40 ali