Microsoft Security Workshop: Enterprise Security Fundamentals/ 40551-A


Microsoft Security Workshop: Enterprise Security Fundamentals Certification Training Course Overview

The Microsoft Security Workshop: Enterprise Security Fundamentals training workshop provides the detailed overview of the used to strengthen the security landscape of an organization. This one day workshop is part of a complete series of Workshops offered by Microsoft on the practice of Security.

Who should do the Microsoft Security Workshop: Enterprise Security Fundamentals training?

  • IT Professionals who need a deeper understanding of Windows Security
  • Anyone interested to start a career in Cyber Security

Microsoft Security Workshop: Enterprise Security Fundamentals Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 1 Day (2 Days for 4 Hours/Day)
Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




February
8 Hours/Day
01
07
08
01-02
07-08
08-09
March
8 Hours/Day
01
07
08
01-02
07-08
08-09
April
8 Hours/Day
05
11
12
19
05-06
11-12
12-13
19-20
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

Knowledge of the current cyber-security ecosystem
Analysis of hacks on computers and networks
Basic Risk Management knowledge



On completion of this training, you will know:

  • Understand the current cybersecurity landscape and assume compromise philosophy
  • Identify factors that contribute to the cost of a breach
  • Distinguish between responsibilities of red teams and blue teams
  • Identify typical objectives of cyber attackers
  • Describe a kill chain carried out by red teams
  • Role, goals, and kill chain activities of the blue team in red team exercises
  • Methods used to restrict lateral movement
  • Using telemetry monitoring to detect attacks
  • The concept of Confidentiality, Integrity, and Availability (CIA) triad
  • Identify the main principles of developing and maintaining policies
;