Course Overview
Schedule Dates
Microsoft Security Workshop: Enterprise Security Fundamentals
Microsoft Security Workshop: Enterprise Security Fundamentals
Microsoft Security Workshop: Enterprise Security Fundamentals
Microsoft Security Workshop: Enterprise Security Fundamentals
Course Content
- Current Cyber-security Landscape
- Assume Compromise Philosophy
- Red Team versus Blue Team Exercises
- The Attackers Objective
- Red Team Kill Chain
- The Blue Team
- Blue Team Kill Chain
- Restricting Privilege Escalation
- Restrict Lateral Movement
- Attack Detection
- CIA Triad
- Organizational Preparations
- Developing and Maintain Policies
- Designing a Blue Team strategy
FAQs
This course is designed for IT security professionals aiming to strengthen their organizations’ defenses and develop a comprehensive understanding of both offensive and defensive cyber-security techniques.
Participants should have a basic understanding of IT security concepts and experience in managing or implementing security measures within their organizations.
You will learn to:
- Understand the current cyber-security landscape and prevalent threats.
- Adopt an “Assume Compromise” philosophy for better vigilance.
- Differentiate between Red Team and Blue Team exercises.
- Recognize penetration tactics and data exfiltration methods.
- Enhance detection, investigation, response, and mitigation strategies.
- Develop organizational security policies and an effective Blue Team strategy.
Yes, the course includes practical exercises and hands-on labs to ensure you can apply the concepts and techniques learned in real-world scenarios.
This course enhances your cyber-security skills, making you proficient in both offensive and defensive techniques. This proficiency can significantly improve your career prospects in IT security and related fields.