MS Cybersecurity Pro Track: Enterprise Security Fundamentals

In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros (the red team) attacks some part or parts of a company’s security infrastructure, and an opposing group (the blue team) defends against the attack. Both teams work to strengthen a company’s defenses. 

You’ll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.

You will also learn the fundamental aspects of security in an Enterprise and overall like : CIA Triad concept or Assume Breach philosophy.

This course is part of a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the first course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

Microsoft Cybersecurity Pro Track: Threat Detection

In this course, we will examine the concepts of Threat Detection in an Enterprise using the Microsoft tools and security services for On-Premises, Hybrid and Cloud environments.

You will go through several threats and attack techniques and the tools to detect them and mitigate them as well.

After completing this course, you will be able to:

  • Describe signature-based and behavioral / heuristic detection methods
  • List the capabilities of on-premise threat detection and mitigation tools
  • Name the capabilities of hybrid and cloud threat detection and mitigation tools
  • Recognize the importance of Enterprise threat detection monitoring

This course is designed to get you started as quickly as possible.

This course is part of a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the second course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

Microsoft Cybersecurity Pro Track: PowerShell Security

In this course, we will examine the concepts of PowerShell from a security stand point. We will cover topics like PowerShell architecture, PowerShell Remoting capabilities, Desired State Configuration, Just Enough Administration and much more.

Later in the course we will examine some common Powershell-based attacks, sample payload and their mitigation/remediation.

After completing this course, you will be able to:

  • Understand the architecture of Powershell
  • Deploy Powershell operational security
  • Analyze PowerShell Auditing and Logging
  • Enhance server management with Desired State Configuration and Just Enough Administration
  • Analyze and debug scripts
  • Understand Powershell based exploits and their remediation

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities.

This course is part of a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the third course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

Microsoft Cybersecurity Pro Track: Managing Identity

In this course, we will examine the concepts of understanding the importance of securing identity and privileged access through combinations of encryption, cloud identity federated with on-premises identity providers (such as Active Directory), implement Privileged Access Management and Just In Time Administration to provide maximum control over privileged access in your domain, and other controls.

After completing this course, you will be able to:

• Understand Identity as a Service (IaaS), the new Control Plane

• Understand and explain Securing Privilege Access (SPA) Roadmap

• Understand Securing Active Directory

• Understand Azure Active Directory and Azure Security Architecture

• Understand Authentication and Authorization in Active Directory

• Implement PAM infrastructure

• Implement and verify functionality of PAM users, groups, and roles

This course is part of a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the fourth course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

Microsoft Cybersecurity Pro Track: Security in Office 365

The threat landscape across the globe has changed dramatically over the past several years with hackers using more sophisticated methods to compromise users and networks alike. At the same time, more and more organizations are enjoying the benefits of cloud computing. But as companies move to the cloud, they are understandably concerned how Office 365 will protect their users and data from being compromised by cybercriminals.

In this course, we will examine the types of threats organizations must deal with daily and provide an overview of the solutions within Office 365 that help organizations detect, protect, and remediate these risks. These solutions include Microsoft Defender for Office 365 and Threat Intelligence, which provide protection against advanced targeted threats in email and Office documents and actionable insights into the global threat landscape, respectively. Solutions also include advanced auditing and alerts and features like Cloud Application Security, which enable security administrators to monitor and remediate risky behaviors and vulnerabilities in their tenant. And we will introduce you to the Secure Score tool, which can help organizations understand their security profile and what they can do to identify risks and vulnerabilities within their tenant.

This course is the fifth course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the fifth course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

Microsoft Cybersecurity Pro Track: Win 10 Security Features

In this course we will examine the out-of-the-box security features and technologies in the Windows 10 Operating system. We will cover topics like the hardware security features (Secure Boot, VSM, etc.) and software security features (Device Guard, Windows Defender Firewall, Credential Guard, AppLocker, etc.)

After completing this course, you will be able to:

  • Understand the current nature of the security threat landscape
  • Explain the built-in security defenses Windows 10
  • Understand Windows 10 mitigations that you can configure
  • Understand the Windows 10 mitigations that require no configuration
  • Describe some of the external tools that enhance endpoint security

This course is the sixth course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the sixth course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

MS Cybersecurity Pro: Windows Server 2016 Security Features

In this course we will examine the out-of-the-box security features and technologies in the Windows Server 2016 Operating system. We will cover topics like the hardware security features (Secure Boot, VSM, etc.) and software security features (Credential Guard, workload isolation with containers, Just Enough Administration, DSC, AD security features, etc.). We will also discuss about attack surface reduction and server hardening processes and best practices.

After completing this course, you will be able to:

  • Describe Windows Server 2016 security technologies
  • Reduce the Windows Server 2016 attack surface through security baselines, device guard policies and Server Core first deployments
  • Implement secure administrative techniques using credential guard, Just Enough Administration and Just In Time administration
  • Workload isolation with containers
  • Secure VM deployment and hosting with guarded fabrics

This course is the seventh course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the sventh course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

MS CybersecurityPro Track: Microsoft Azure Security Services

In this course, you will gain insights into Azure Security services to help secure your services and data within Azure.

You will learn Azure security best practice andunderstandthe terminology, tools, and techniques for creating a secure resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune.

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:

  • Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
  • Review questions (quizz) at the end of each section
  • Hands-on Lab at the end of the course in which you will practice at your own pace. You will have a step by step instruction file available to complete the Lab tasks like: creating Virtual Networks, implement VNet peering, Log Analytics and much more.
  • Final Exam at the end of the course – 20 questions to test your knowledge on the topics and concepts learned in the course
  • Links to official Microsoft resources/blogs/videos for further documentation.

This course is the 8th course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the eighth course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price

Planning and Implementing a Security Incident Response

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

After completing this course, students will be able to:

  • Effectively prioritize the response to a security incident
  • Build a computer security incident response team (CSIRT)
  • Develop an incident response action plan
  • Post-incident activity

This course is the 9th course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the nineth course from a series of 9 courses (Please read full description on Udemy for a complete list of the courses).

Click on title or image to be redirected to the course on Udemy for a full description and the best Price