Microsoft Security Workshop: Enterprise Security Fundamentals Training & Certification Courses
 800 Ratings

Enquire Now


 
Loading...  

Processing data, please wait...

Expert Chat
Microsoft #1 Training Partner
Microsoft #1 Training Partner
Get Trained by Industry Expert
Get Trained by Industry Expert
Guarantee to Run the Classes
Guarantee to Run the Classes

Overview

The Microsoft Security Workshop: Enterprise Security Fundamentals training workshop provides the detailed overview of the used to strengthen the security landscape of an organization. This one day workshop is part of a complete series of Workshops offered by Microsoft on the practice of Security.

Who should do the Microsoft Security Workshop: Enterprise Security Fundamentals training?

  • IT Professionals who need a deeper understanding of Windows Security
  • Anyone interested to start a career in Cyber Security
Need more info ? Email info@koenig-solutions.com  or   Enquire now!

Schedule & Prices

Delivery Mode Location Course Duration Fees  Schedule
Instructor-Led Online Training (1-on-1) Client's Home/Office1 Days $ 1,530 As per mutual convenience (4-Hours Evenings & Weekends Possible
Classroom Training * Delhi, Bangalore, Dehradun (Rishikesh), Goa, Shimla, Chennai 1 Days $ 740
19-19 Nov 2018 (2 Seat Left),
3-3 Dec 2018 (1 Seat Left),
7 Jan -7 Jan 2019,
4 Feb -4 Feb 2019
Fly-Me-a-Trainer Client's Location1 Days On Request As per mutual convenience
Need more clarity on schedule and prices? Email info@koenig-solutions.com  or   Enquire now!

Course Content / Exam(s)

Schedule for Microsoft Security Workshop: Enterprise Security Fundamentals

Course # Course Name Duration (days)
40551A Microsoft Security Workshop: Enterprise Security Fundamentals1

Course Prerequisites

Knowledge of the current cyber-security ecosystem
Analysis of hacks on computers and networks
Basic Risk Management knowledge


Need more info ? Email info@koenig-solutions.com  or   Chat with the Experts Now

Microsoft Security Workshop: Enterprise Security Fundamentals Benefits

On completion of this training, you will know:

  • Understand the current cybersecurity landscape and assume compromise philosophy
  • Identify factors that contribute to the cost of a breach
  • Distinguish between responsibilities of red teams and blue teams
  • Identify typical objectives of cyber attackers
  • Describe a kill chain carried out by red teams
  • Role, goals, and kill chain activities of the blue team in red team exercises
  • Methods used to restrict lateral movement
  • Using telemetry monitoring to detect attacks
  • The concept of Confidentiality, Integrity, and Availability (CIA) triad
  • Identify the main principles of developing and maintaining policies
Need more info ? Email info@koenig-solutions.com  or   Enquire now!