Microsoft Security Workshop: Enterprise Security Fundamentals


Microsoft Security Workshop: Enterprise Security Fundamentals Certification Training Course Overview

The Microsoft Security Workshop: Enterprise Security Fundamentals training workshop provides the detailed overview of the used to strengthen the security landscape of an organization. This one day workshop is part of a complete series of Workshops offered by Microsoft on the practice of Security.

Who should do the Microsoft Security Workshop: Enterprise Security Fundamentals training?

  • IT Professionals who need a deeper understanding of Windows Security
  • Anyone interested to start a career in Cyber Security

Microsoft exam can be taken from home.

Microsoft Security Workshop: Enterprise Security Fundamentals Course schedule & Prices

Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 1 Day (2 Days for 4 Hours/Day)
Fee : On Request



July
8 Hours/Day
12
13
20
12-13
13-14
20-21
August
8 Hours/Day
03
09
10
17
03-04
09-10
10-11
17-18
September
8 Hours/Day
07
13
14
21
07-08
13-14
14-15
21-22
October
8 Hours/Day
05
05-06
Fly-Me-a-Trainer
Duration :
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Enquire Now




Input symbols

Course Prerequisites

Knowledge of the current cyber-security ecosystem
Analysis of hacks on computers and networks
Basic Risk Management knowledge



On completion of this training, you will know:

  • Understand the current cybersecurity landscape and assume compromise philosophy
  • Identify factors that contribute to the cost of a breach
  • Distinguish between responsibilities of red teams and blue teams
  • Identify typical objectives of cyber attackers
  • Describe a kill chain carried out by red teams
  • Role, goals, and kill chain activities of the blue team in red team exercises
  • Methods used to restrict lateral movement
  • Using telemetry monitoring to detect attacks
  • The concept of Confidentiality, Integrity, and Availability (CIA) triad
  • Identify the main principles of developing and maintaining policies