BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Enderun Extension - ECPv4.2.2//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:Enderun Extension X-ORIGINAL-URL:https://www.enderunextension.com X-WR-CALDESC:Events for Enderun Extension BEGIN:VEVENT DTSTART;VALUE=DATE:20210904 DTEND;VALUE=DATE:20220507 DTSTAMP:20220124T054032 CREATED:20200814 LAST-MODIFIED:20211125 UID:23083-1630713600-1651967999@www.enderunextension.com SUMMARY:Microsoft Certification Courses: Cybersecurity DESCRIPTION:[vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern" css_animation=""][vc_column][vc_column_text]\nCourse Content\n\nIn Microsoft Future Ready Certification Course: Cybersecurity\, the student will learn to defend computers\, servers\, electronic systems\, networks\, and data. Safe from attacks\, unauthorized access or damage from both internal and external. The goal of any cybersecurity strategy is to ensure confidentiality\, data integrity\, and availability.\n\nDownload Brochure[/vc_column_text][/vc_column][/vc_row][vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern" css_animation=""][vc_column][vc_column_text]\nTOPICS\n\n\n \tEnterprise Security Fundamentals\n \tThreat Detection: Planning for a Secure Enterprise\n \tPlanning for a Security Incident Report\n \tPowershell Security Best Practices\n \tManaging Identity\n\nWHAT YOU'LL LEARN\nAfter completing this course\, students will be able to:\n\n \tDescribe the current enterprise security landscape\n \tDefine the Assume Compromise approach\n \tPractice Red team versus Blue team exercises\n \tDevelop organizational security preparation\, processes\, and responses\n \tDescribe signature-based and behavioral / heuristic detection methods\n \tList the capabilities of on-premise threat detection and mitigation tools\n \tName the capabilities of hybrid and cloud threat detection and mitigation tools\n \tRecognize the importance of Enterprise threat detection monitoring\n \tEffectively prioritize the response to a security incident\n \tBuild a computer security incident response team (CSIRT)\n \tDevelop an incident response action plan\n \tList appropriate post-incident activities\n \tUnderstand the architecture of Powershell;\n \tDeploy Powershell operational security;\n \tAnalyze PowerShell Auditing and Logging;\n \tEnhance server management with Desired State Configuration and Just Enough Administration;\n \tAnalyze and debug scripts;\n \tUnderstand Powershell based exploits and their remediation.\n \tHow identity is the new control plane\, the perimeter that is replacing the firewall.\n \tThe recommended steps to secure Active Directory.\n \tAzure Security Architecture and the Identity Federation and access solutions supported by Azure architecture.\n \tHow Kerberos and Privilege Attribute Certification function.\n\n[/vc_column_text][/vc_column][/vc_row][vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern" css_animation=""][vc_column][vc_column_text]\nInclusion\n\n\n \tReceive educational materials through the website\n \tSuit the student’s own learning pace and schedule within the given timeframe to access the platform\n \tLearn from Professional Security Analyst\, Security Engineer\, Security Administrator\, security consultant\n \tLearn individual\, and group activities online\n \tTake activities\, task\, and learn of Cybersecurity through online\n\n[/vc_column_text][/vc_column][/vc_row] URL:https://www.enderunextension.com/program/microsoft-certification-courses-cybersecurity/ CATEGORIES:Certificate Courses,Technology ATTACH;FMTTYPE=image/jpeg:https://www.enderunextension.com/wp-content/uploads/2020/08/square-06.jpg ORGANIZER;CN="Enderun Colleges":MAILTO:extension@enderuncolleges.com END:VEVENT END:VCALENDAR