Microsoft Security Workshop: Enterprise Security Fundamentals

Download Course Contents

Microsoft Security Workshop: Enterprise Security Fundamentals Course Overview

The Microsoft Security Workshop: Enterprise Security Fundamentals training workshop provides the detailed overview of the used to strengthen the security landscape of an organization. This one day workshop is part of a complete series of Workshops offered by Microsoft on the practice of Security.

Who should do the Microsoft Security Workshop: Enterprise Security Fundamentals training?

  • IT Professionals who need a deeper understanding of Windows Security
  • Anyone interested to start a career in Cyber Security

This is a Rare Course and it can be take up to 3 weeks to arrange the training.

  • 1. Do you have limited Window for training?
  • 2. Can you only spend 4-hours per day?
  • 3. Do you want to start training immediately?
  • If your answer is yes to any one of the above, you need 1-on-1- Training
The 1-on-1 Advantage
Methodology
Flexible Dates
4-Hour Sessions
  • View video
  • The course will be free if we are not able to start within 7 days of booking.
  • Only applicable for courses on which this logo appears.

Your will learn:

Module 1: Understanding the cyber-security landscape
  • Current Cyber-security Landscape
  • Assume Compromise Philosophy
  • Red Team versus Blue Team Exercises
  • The Attackers Objective
  • Red Team Kill Chain
  • The Blue Team
  • Blue Team Kill Chain
  • Restricting Privilege Escalation
  • Restrict Lateral Movement
  • Attack Detection
  • CIA Triad
  • Organizational Preparations
  • Developing and Maintain Policies
  • Designing a Blue Team strategy
Live Online Training (Duration : 8 Hours) Fee On Request
Group Training Date On Request
1-on-1 Training
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Classroom Training is available. Enquire for the fee Click
Comfort Track

If you think 8 hours is too fast, we can offer Comfort Track for 16 hours

Course Prerequisites

Knowledge of the current cyber-security ecosystem
Analysis of hacks on computers and networks
Basic Risk Management knowledge

On completion of this training, you will know:

  • Understand the current cybersecurity landscape and assume compromise philosophy
  • Identify factors that contribute to the cost of a breach
  • Distinguish between responsibilities of red teams and blue teams
  • Identify typical objectives of cyber attackers
  • Describe a kill chain carried out by red teams
  • Role, goals, and kill chain activities of the blue team in red team exercises
  • Methods used to restrict lateral movement
  • Using telemetry monitoring to detect attacks
  • The concept of Confidentiality, Integrity, and Availability (CIA) triad
  • Identify the main principles of developing and maintaining policies

Request More Information

Add Name and Email Address of participant (If different from you)

FAQ's


Yes, fee excludes local taxes.
The Fee includes:
  • Official courseware
Yes, Koenig Solutions is a Microsoft Learning Partner