- 1.1 Welcome to the Course
- 1.2 Navigating Your Course
- 1.3 Course Syllabus
- Home
- CloudSwyft Global Systems, Inc
- Courses
- Microsoft Future Ready Fundamentals of Enterprise Security
Microsoft Future Ready: Fundamentals of Enterprise Security
Online
3 Weeks
Free
Quick facts
particular | details | ||
---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Learning efforts
5 Hours Per Week
|
Course and certificate fees
Type of course
certificate availability
certificate providing authority
certificate fees
The syllabus
Week 1: Introduction to Course and Understanding the Cybersecurity Landscape
Course Introduction
Understanding the Cybersecurity Landscape
- 1.4 Cybersecurity Landscape Overview
- 1.5 Technology Lag, Application Development Security, Skill Gap
- 1.6 Sophistication of attack tools, and Asymmetry of attack and defense
- 1.7 Monetization of malware
- 1.8 Automation of detection, Internet of Things, and Transition to the cloud
- 1.9 Increasing Regulation
- 1.10 Assume Compromise Philosophy
- 1.11 Compromise Examples
- 1.12 Cost of a breach
- 1.13 Breach Factors
- 1.14 Knowledge Check 1
Week 2: Red team versus Blue team
Red Team Penetration, Lateral Movement, Escalation, and Exfiltration
- 2.1 Red Team versus Blue Team Exercises
- 2.2 Lesson Review 1
- 2.3 The Attacker's Objective
- 2.4 Common Objectives
- 2.5 Lesson Review 2
- 2.6 Red Team Kill Chain
- 2.7 Standard Framework
- 2.8 Lesson Review 3
- 2.9 Document Vulnerabilities
- 2.10 Knowledge Check 2
Blue Team Detection, Investigation, Response, and Mitigation
- 2.11 Blue Team
- 2.12 Blue Team Kill Chain
- 2.13 Plan a response
- 2.14 Execute
- 2.15 Restrict Privilege Escalation
- 2.16 Privileged access workstations
- 2.17 Restrict Lateral Movement
- 2.18 Code Integrity Policies
- 2.19 Attack Detection
- 2.20 Microsoft attack detection products
- 2.21 Knowledge Check 3
Week 3: Beyond the Breach and Wrapping up the Course
Beyond the Breach
- 3.1 CIA Triad
- 3.2 Availability
- 3.3 Organization Preparations
- 3.4 Information Classification
- 3.5 Audit and Monitor
- 3.6 Developing and Maintaining Policies
- 3.7 Processes
- 3.8 Disclosure Responsibility
- 3.9 Knowledge Check 4
Course Conclusion
3.10 Final Exam
3.11 Wrapping Up the Course