Microsoft Security Workshop: Enterprise Security Fundamentals

Microsoft Security Workshop: Enterprise Security Fundamentals Certification Training Course Overview

The Microsoft Security Workshop: Enterprise Security Fundamentals training workshop provides the detailed overview of the used to strengthen the security landscape of an organization. This one day workshop is part of a complete series of Workshops offered by Microsoft on the practice of Security.

Who should do the Microsoft Security Workshop: Enterprise Security Fundamentals training?

  • IT Professionals who need a deeper understanding of Windows Security
  • Anyone interested to start a career in Cyber Security

Microsoft Security Workshop: Enterprise Security Fundamentals (8 Hours) Download Course Contents

Live Virtual Classroom Fee On Request
Group Training Date On Request
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Course Modules

Module 1: Understanding the cyber-security landscape
  • Current Cyber-security Landscape
  • Assume Compromise Philosophy
Module 2: Red Team: Penetration, Lateral Movement, Escalation, and Exfiltration
  • Red Team versus Blue Team Exercises
  • The Attackers Objective
  • Red Team Kill Chain
Module 3: Blue Team Detection, Investigation, Response, and Mitigation
  • The Blue Team
  • Blue Team Kill Chain
  • Restricting Privilege Escalation
  • Restrict Lateral Movement
  • Attack Detection
Module 4: Organizational Preparations
  • CIA Triad
  • Organizational Preparations
  • Developing and Maintain Policies
  • Designing a Blue Team strategy
Download Course Contents

Request More Information

Course Prerequisites

Knowledge of the current cyber-security ecosystem
Analysis of hacks on computers and networks
Basic Risk Management knowledge

On completion of this training, you will know:

  • Understand the current cybersecurity landscape and assume compromise philosophy
  • Identify factors that contribute to the cost of a breach
  • Distinguish between responsibilities of red teams and blue teams
  • Identify typical objectives of cyber attackers
  • Describe a kill chain carried out by red teams
  • Role, goals, and kill chain activities of the blue team in red team exercises
  • Methods used to restrict lateral movement
  • Using telemetry monitoring to detect attacks
  • The concept of Confidentiality, Integrity, and Availability (CIA) triad
  • Identify the main principles of developing and maintaining policies