Microsoft Security Workshop: Enterprise Security Fundamentals Training & Certification Courses
 800 Ratings

Enquire Now


 
Loading...  

Processing data, please wait...

Instant Chat in 59 languages
Microsoft #1 Training Partner
Microsoft #1 Training Partner
Get Trained by Industry Expert
Get Trained by Industry Expert
Guarantee to Run the Classes
Guarantee to Run the Classes
Hello Koenig

Overview

The Microsoft Security Workshop: Enterprise Security Fundamentals training workshop provides the detailed overview of the used to strengthen the security landscape of an organization. This one day workshop is part of a complete series of Workshops offered by Microsoft on the practice of Security.

Who should do the Microsoft Security Workshop: Enterprise Security Fundamentals training?

  • IT Professionals who need a deeper understanding of Windows Security
  • Anyone interested to start a career in Cyber Security
Download course contents.
Need more info ? Email info@koenig-solutions.com  or   Enquire now!

Schedule & Prices

Delivery Mode Location Course Duration Fees Schedule
Instructor-Led Online Training (1-on-1) Client's Home/Office1 Days $ 1,530 As per mutual convenience (4-Hours Evenings & Weekends Possible
Classroom Training * Dubai 1 Days $ 1,080
23-23 Jun 2019 (1 Seat Left),
21 Jul -21 Jul 2019
Delhi, Bangalore, Dehradun (Rishikesh), Goa, Shimla, Chennai 1 Days $ 740
20 May 2019 ,
27 May 2019 (2 Seat Left) ,
3 Jun 2019 (1 Seat Left),
17 Jun 2019 (2 Seat Left) ,
24 Jun 2019 ,
1 Jul 2019 (1 Seat Left),
15 Jul 2019 (1 Seat Left),
22 Jul 2019 ,
29 Jul 2019 (2 Seat Left)
Fly-Me-a-Trainer Client's Location1 Days On Request As per mutual convenience
Need more clarity on schedule and prices? Email info@koenig-solutions.com  or   Enquire now!

Course Prerequisites

Knowledge of the current cyber-security ecosystem
Analysis of hacks on computers and networks
Basic Risk Management knowledge


Microsoft Security Workshop: Enterprise Security Fundamentals Benefits

On completion of this training, you will know:

  • Understand the current cybersecurity landscape and assume compromise philosophy
  • Identify factors that contribute to the cost of a breach
  • Distinguish between responsibilities of red teams and blue teams
  • Identify typical objectives of cyber attackers
  • Describe a kill chain carried out by red teams
  • Role, goals, and kill chain activities of the blue team in red team exercises
  • Methods used to restrict lateral movement
  • Using telemetry monitoring to detect attacks
  • The concept of Confidentiality, Integrity, and Availability (CIA) triad
  • Identify the main principles of developing and maintaining policies
Need more info ? Email info@koenig-solutions.com  or   Enquire now!
Delhi
Bangalore (Bengaluru)
Goa
Shimla (Himalayas)
Chennai
Dehradun
Dubai
USA Singapore
All rights reserved. ©1997 - 2019, Koenig Solutions Pvt. Ltd.
PMP® is a registered trademark of the Project Management Institute.
Koenig Solutions Pvt. Ltd. is rated 4.4 stars by www.facebook.com/KoenigSolutions based on 107 reviews

Please Input Captcha Below

Submit