This course is the first course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the first course from a series of 9 courses:
Cyber Security Fundamentals (Introduction to Cybersecurity)
Threat Detection ( Detect security breaches early – explore the capabilities of Microsoft’s threat detection and mitigation tools – including hands on Lab)
Powershell Security ( Learn how to use Powershell to enhance security and remediate new threats. Learn how to implement and use Desired State Configuration (DSC), Just Enough Administration (JEA) and many more – including hands on Lab)
Manage Identity (Learn the industry’s best practices in regards to managing identity and especially privileged identities. This course takes a hands-on approach to identity management. You will create a bastion host, configure Privileged Access Management, set up Microsoft Identity Manager PAM, and more – including hands on Lab)
Office 365 Security ( Review the different types of threats that can target your organization and learn how to implement and manage Office 365 security features like Advanced Threat Protection, Threat Intelligence, and Advanced Security Management)
Securing Windows 10 Operating System ( Learn about the continually evolving security features of the Windows 10 operating system. Discover how to deploy its advanced capabilities – including hands on Lab)
Windows Server 2016 Security Features ( Windows Server 2016 provides layers of protection that help address both known and emerging threats. This course addresses how to implement and leverage all these security features. Learn how it actively contributes to securing your infrastructure so you can better safeguard against security breaches – including hands on Lab)
Microsoft Azure Security Features ( Learn Azure security best practices and understand the terminology, tools, and techniques for creating a highly secure, resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune)
Planning and Implementing a Security Incident Response (Learn to manage an enterprise security incident while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts)
In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros (the red team) attacks some part or parts of a company’s security infrastructure, and an opposing group (the blue team) defends against the attack. Both teams work to strengthen a company’s defenses.
You’ll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.
You will also learn the fundamental aspects of security in an Enterprise and overall like : CIA Triad concept or Assume Breach philosophy.
You will have a Quiz at the end of each Section and a Final Exam, so you can test the knowledge that you have gained throughout the course.
What you’ll learn ?
After completing this course, students will be able to:
Describe the current enterprise security landscape
Define the Assume Compromise approach
Practice Red team versus Blue team exercises
Develop organizational security preparation, processes, and responses
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.
Who this course is for:
Security Administrators
Security Analysts
System Administrator
Everyone who wants to learn about the current cybersecurity landscape and how to improve your organization’s security posture
Requirements
Basic experience with Windows Server administration, maintenance, and troubleshooting.
Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, and cloud services concepts.
Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy.
Last Updated 12/2020
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
4 B
.pad/1
3.1 KB
.pad/10
12 KB
.pad/11
253.2 KB
.pad/12
36.7 KB
.pad/13
411.1 KB
.pad/14
161.1 KB
.pad/15
376.2 KB
.pad/16
136.2 KB
.pad/17
499.2 KB
.pad/18
331.3 KB
.pad/19
344.8 KB
.pad/2
271.8 KB
.pad/20
347.5 KB
.pad/21
350.1 KB
.pad/22
366.7 KB
.pad/23
366.8 KB
.pad/24
366.8 KB
.pad/25
369.4 KB
.pad/3
491.1 KB
.pad/4
144.1 KB
.pad/5
423.7 KB
.pad/6
299 KB
.pad/7
283.3 KB
.pad/8
40 B
.pad/9
193.4 KB
TutsNode.com.txt
63 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.en.srt
1.9 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.mp4
8.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.en.srt
8.3 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.mp4
24.1 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.en.srt
34.6 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.mp4
161.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 S2L1-CurrentCybersecurityLandscape-Documentation.txt
146 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.en.srt
15 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.mp4
51 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 S2L2-AsumeCompromise-Documentation.txt
115 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.en.srt
12.3 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.mp4
56.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 S2L3-CostOfBreach-Documentation.txt
332 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.en.srt
9.9 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.mp4
29 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 S3L1-RedTeamBlueTeamExercises-Documentation.txt
270 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 S3L2-AttackersObjective-Documentation.txt
77 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.en.srt
19.6 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.mp4
53.2 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.en.srt
39.2 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.mp4
135.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 S3L3-RedTeamKillChain-Documentation.txt
157 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.en.srt
3.7 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.mp4
10.1 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document-Vulnerabilities.pdf
657.2 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 S3L4-DocumentVulnerabilities-Documentation.txt
165 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.en.srt
7.7 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.mp4
21.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 BlueTeam.pdf
657.2 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 S4L1-BlueTeam-Documentation.txt
99 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.en.srt
20.7 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.mp4
67 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 BlueTeamKillChain.pdf
679.2 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 S4L2-BlueTeamKillChain-Documentation.txt
99 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.en.srt
14.2 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.mp4
57.1 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 RestrictPrivilegeEscalation.pdf
676.5 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 S4L3-RestrictPrivilegeEscalation-Documentation.txt
88 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.en.srt
13.3 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.mp4
41 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 RestrictLateralMovement.pdf
673.9 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 S4L4-RestrictLateralMovement-Documentation.txt
149 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.en.srt
25.8 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.mp4
85.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 AttackDetection.pdf
692.7 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 S4L5-AttackDetection-Documentation.txt
105 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/external-assets-links.txt
560 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.en.srt
13.6 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.mp4
29.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA-Triad.pdf
654.6 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 S5L1-CIA-Triad-Documentation.txt
87 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.en.srt
15.6 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.mp4
65.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization-Preparations.pdf
657.3 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 S5L2-OrganizationPreparations-Documentation.txt
209 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.en.srt
17 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.mp4
48.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 DevelopingPolicies.pdf
651.2 KB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 S5L3-DevelopingPolicies-Documentation.txt
48 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/external-assets-links.txt
305 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.en.srt
334 B
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.mp4
3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/external-assets-links.txt