Key Features of this course
Dedicated Lab Access
All the participants will get dedicated lab access to do the hands on practice
Practice Questions
All the participants will get access to Unique exam portal Access which will Prepare you for Certification as well the Knowledge check
Daily Key Notes
Daily notes will be shared to everyone which is help to follow session and useful for the future reference
Microsoft Achievement code
All the paticipants will get the completion achievement code which is provided by Microsoft
This Course Deeply Covers Below
- Top Security threats
- Principles to detect, Investigate, respond and Report
- Architecture of the Microsoft 365 Security Services
Microsoft defender for Microsoft 365
- Microsoft defender for Endpoint
- Microsoft defender for Cloud
- Microsoft Defender For Entra ID
- Microsoft Defender for Identity
- Sentinel
New Batch Starts @ 21-DEC-2024
Batch Type : Weekend
Timing : 2:00 PM IST to 6:00 PM IST
Offer Price : 14750/- Incl All taxes (This price applicable the candidates who rigister before 07-DEC-2024
Course Curriculum
Talk to our Advisor
Module 1: Zero Trust and best Practice Frameworks
Lessons:
- Common Cyberthreats and attack patterns
- Zero-Trust Security Principles, MCRA and MCSB to fix the Cyberthreats and Attacks
- Understanding Security Components, Controls and Features to protect On-premises, Cloud Infrastructure (Azure, Microsoft 365 and Multicloud)
- Design Resiliency strategy for cyberattacks using Microsoft security best practices
Module 2: Design Identity Security and Compliance capabilities
Lessons:
- Design Security Controls for Credential Stealing and Credential Sharing
- Design Security Controls for Identity Risk
- Design privileged Access Model
- Design Cloud Infrastructure Entitlement
- Design Privileged Access Workstations and Bastions
- Design Security for Active Directory Domain Services from common directory service attack
- Design Solutions manage secrets, keys and certificates
- Design Modern authentication and Authorization strategies
Lab :
- Protect password stealing and password sharing
- Apply Conditional Access
- Preventing the user and sign-in risks
- Apply privileged Access (Just in time) for Identity
- Securing Secrets, keys, certificates using vault
Module 3: Design security for Infrastructure and Applications
Lessons:
- Design Security Solutions for Network segmentations
- Design Solutions for Network security Posture management
- Design Security Solutions for Servers, Virtual Machines, App Services, Containers
- Design Security Solution for Web applications attack
- Design Security Solution for Protecting Entire network infrastructure from DDOS Attack
Lab :
- Design and Implement Azure Firewall Appliance
- Design and Implement Traffic Filtering for Servers, Virtual Machines and Subnets
- Design and Implement Web Application Firewall
- Design and Implement DDOS Protection Service
- Design and Implement Bastion Host Services
- Design and Implement Just in Time access
Module 4: Design Security Storage and Organization’s data
Lessons:
- Design Security for Servers and Virtual Machines Disk
- Design Security for Storage Services (Blob, Table, Queue and files)
- Design Security for API and Databases
- Design Security for data in transit
Labs:
- Apply Encryption for Data At rest
- Apply Encryption for Data in transit
- Apply Firewall, Keys, certificates for API and Databases
Module 5:Design Security for Microsoft 365
Lessons:
- Security Architecture of Microsoft 365 Services (Exchange, SharePoint, Teams and Other Applications)
- Design Microsoft XDR and Purview Solution to Secure and Maintain Compliance of Microsoft 365 Services (Exchange, SharePoint, Teams)
- Implement Security for Operational Practices of Microsoft 365
- Design security Control for Microsoft 365 Co-Pilot Services
Lab:
- Apply Threat and Security Policies for Microsoft 365 Services
- Apply Rights to Access the Sensitive data in Microsoft 365 Services
- Apply Policies to Prevent Data loss
- Apply Policies for Secured Communication using Microsoft 365 Services
Module 6: Design Security for Endpoint Devices
Lessons:
- Design Security Architecture for End Point Devices
- Design Security baseline for End Point Devices
- Evaluate the compliance of Endpoint Devices
- Design Security solutions for Secure Remote access
- Design Endpoint devices security updates
Lab :'
- Apply Endpoint Firewall
- Apply EndpointEncryption
- Apply Endpoint Antivirus and Malware Solution
- Apply Endpoint Attack Surface Reduction policy
- Apply Account Protection Policy
- Apply Endpoint Compliance Policy
- Apply Endpoint Baseline Policy
Module 7:Design Security Information and Event Management
Lessons:
- Design to Evaluate Security posture Of Cloud and On-premises Infrastructure
- Design to Monitor the Incidents and alerts of security threats
- Design to automatic Investigation and Response AIR
- Design to Hunt the threats in the Entire Infrastructure
- Design to Evaluate Security Score
- Design to audit the Logs and Reports