Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on 877-SOLARTECH
  • My Account
Solartech

INF246X Enterprise Security Fundamentals

$99.00

INF246X Enterprise Security Fundamentals

$99.00
Quantity:
Share

Product Description

INF246X Enterprise Security Fundamentals

About this course

 

According to the Wall Street Journal, “All IT Jobs Are Cybersecurity Jobs Now.”

In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros--the red team--attacks some part or parts of a company’s security infrastructure, and an opposing group--the blue team--defends against the attack. Both teams work to strengthen a company’s defenses.

You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.

What you'll learn

 

After completing this course, students will be able to:

  • Describe the current enterprise security landscape
  • Define the Assume Compromise approach
  • Practice Red team versus Blue team exercises
  • Develop organizational security preparation, processes, and responses

Course Syllabus

 

Module 1 Understanding the cybersecurity landscape

  • The current cybersecurity landscape
  • The evolution of attacks
  • Understanding “Assume Compromise”
  • Examples of compromises

Module 2 Red Team: Penetration, lateral movement, escalation, and exfiltration

  • Red Team versus Blue Team
  • Red Team kill chain
  • Beachhead
  • Lateral movement
  • Privileged escalation
  • Execution of attacker’s mission

Module 3 Blue Team: Detection, investigation, response, and mitigation

  • The Blue Team kill chain
  • Restricting privilege escalation
  • On-premises network security
  • Restrict lateral movement
  • Attack detection

Module 4 Organizational preparations

  • Processes
  • CIA Triad
  • Developing a strategic roadmap
  • Microsoft Security Response Center Exploitability Index

Prerequisites

 

  • A understanding of the current cybersecurity ecosystem. 

Microsoft Verified Certificate:

For a small fee ($99), once you complete this course, you will receive a Microsoft authenticated Certificate of Completion. This will allow you to showcase your achievement and document your expertise. You will have permission to add the certificate to your resume or post it directly to LinkedIn. If your company has access to Microsoft Software Assurance Training vouchers, you can redeem one voucher for one certificate.

Product Reviews

Find Similar Products by Category