
Windows Server 2019 Administration Fundamentals
What you'll learn
- What Windows Server is and its uses
- Concepts behind Windows Server installation
- What server roles are
- How Active Directory plays a part in Windows Server administration
- The various storage options for Windows Server storage
- Managing performance in Windows Server
- Concepts for maintaining Windows server
Requirements
- Familiarity with Windows operating systems

Computer Networking Fundamentals
What you'll learn
- Understand what a Network is all about
- Understand the OSI Model
- Learn about various types of networks (LAN, WAN, etc.)
- Understand the core concepts of TCP/IP protocol
- Understand the basics of subnetting
- Understand networking hardware and their purpose
- Understand the basics of IP addressing
- Understand captured network traffic
- Configure IPv4 and IPv6
Requirements
- Familiarity of Windows operating system
- Familiarity of Linux operating system

MS-500 Microsoft 365 Security Administration
What you'll learn
- Administer user and group access in Microsoft 365
- Explain and manage Azure Identity Protection
- Plan and implement Azure AD Connect
- Manage synchronized user identities
- Explain and use conditional access
- Describe cyber-attack threat vectors
- Explain security solutions for Microsoft 365
- Use Microsoft Secure Score to evaluate and improve the security posture
- Configure various advanced threat protection services for Microsoft 365
- Plan for and deploy secure mobile devices
- Explain and use sensitivity labels
- Implement information rights management
- Secure messages in Office 365
- Configure Data Loss Prevention policies
- Deploy and manage Microsoft Cloud App Security
- Plan and deploy a data archiving and retention system
- Create and manage an eDiscovery investigation
- Manage GDPR data subject requests
Requirements
· Basic conceptual understanding of Microsoft Azure
· Basic understanding of Windows 10 devices
· Basic understanding of Office 365
· Basic understanding of authorization and authentication concepts
Basic understanding of computer networks
AZ-104 Azure Adminitrator Associate
What you'll learn
- Administer Azure using the Azure portal, Cloud Shell, Azure PowerShell, CLI, and ARM templates
- Plan for, create, and scale virtual machines
- Implement Azure storage accounts, blob storage, Azure files, and shared access keys
- Configure virtual networks including planning, IP addressing, Azure DNS, and network security groups
- Configure data replication and backup files, folders, and virtual machines
- Configure intersite connectivity solutions like VNet Peering, VNet-to-VNet connections, Site-to-Site connections, and ExpressRoute
- Manage network traffic using service endpoints, network routing choices, Azure load balancer, Azure Traffic Manager, and Content Delivery Network
- Manage subscriptions, accounts, users, groups, and billing. Implement Azure policies
- Implement Azure Active Directory and Azure Active Directory Connect
- Secure identities with MFA, Azure AD Identity Protection, AD Join, and Self-Service Password Reset
- Share data using the Import and Export service, Data Box, and File Sync
- Monitor Azure infrastructure with Azure Monitor, Azure alerts, Log Analytics, and Network Watcher
Requirements
- Basic nderstanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks and Powershell
- Basic understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies
- Basic understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
- Basic understanding of resilience and disaster recovery, including backup and restore operations
- A Free or Paid Azure subscription

Course 9: Planning and Implementing a Security Incident Response
What you'll learn
- Manage an enterprise security incident
- Effectively prioritize the response to a security incident
- Build a computer security incident response team (CSIRT)
- Develop an incident response action plan
- Post-incident activity
Requirements
- Basic understanding of the current cybersecurity ecosystem
- Basic understanding of analysis of hacks on computers and networks
- Basic understanding of Risk Management

Course 7: Windows Server 2016 Security Features
What you'll learn
- Describe Windows Server 2016 security technologies
- Reduce the Windows Server 2016 attack surface through security baselines, device guard policies and Server Core first deployments
- Implement secure administrative techniques using credential guard, Just Enough Administration and Just In Time administration
- Workload isolation with containers
- Secure VM deployment and hosting with guarded fabrics
Requirements
- Basic understanding of Windows server operating system
- Basic understanding of computer networks
- Basic knowledge of accessing and using simple Windows PowerShell commands
- Basic knowledge of Active Directory domain services, Group Policy

Course 6: Windows 10 Security Features
What you'll learn
- Understand the current nature of the security threat landscape
- Explain the built-in security defenses Windows 10
- Windows 10 mitigations that you can configure
- Learn the Windows 10 mitigations that require no configuration
- Describe some of the external tools that enhance endpoint security
Requirements
- Basic understanding of Windows operating system
- Basic understanding of computer networks
- Basic knowledge of accessing and using simple Windows PowerShell commands

Course 05: Security in Office 365
What you'll learn
- Threats and data breaches targeting your data
- Microsoft Defender for Office 365 (former named Office 365 Advanced Threat Protection)
- Office 365 Threat Intelligence
- Auditing, alerting and reporting in Office 365
- Advanced Security Management in Office 365 (Cloud Application Security)
Requirements
- Basic understanding of Office 365
- Basic understanding of authorization and authentication concepts
- Basic understanding of computer networks
- Basic conceptual understanding of Microsoft Azure

Course 04: Managing Identity
What you'll learn
- Identity as a Service (IaaS), the new Control Plane
- Securing Privilege Access (SPA) Roadmap
- Securing Active Directory
- Azure Active Directory and Azure Security Architecture
- Authentication and Authorization in Active Directory
- Implement PAM infrastructure
- Implement and verify functionality of PAM users, groups, and roles
Requirements
- Experience with Windows Client administration, maintenance, and troubleshooting
- Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, DNS, DHCP, WiFi, and cloud services concepts
- Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy
- Knowledge of and relevant experience in systems administration, using Windows Server 2012 R2 and 2016
- Good foundation in
accessing and using simple Windows PowerShell commands

Course 03: PowerShell Security
What you'll learn
- Understand the architecture of Powershell
- Deploy Powershell operational security
- Analyze PowerShell Auditing and Logging
- Enhance server management with Desired State Configuration and Just Enough Administration
- Analyze and debug scripts
- Understand Powershell based exploits and their remediation
Requirements
- Basic understanding of Windows Powershell

Course 02: Threat Detection
What you'll learn
- Describe signature-based and behavioral / heuristic detection methods
- List the capabilities of on-premise threat detection and mitigation tools
- Name the capabilities of hybrid and cloud threat detection and mitigation tools
- Recognize the importance of Enterprise threat detection monitoring
Requirements
- Basic experience with the current cybersecurity ecosystem
- Basic analysis capabilities of hacks on computers and networks

Course 01: Enterprise Security Fundamentals
What you'll learn
- Describe the current cybersecurity landscape
- Explain the Assume Compromise approach to security
- Red team versus Blue team exercises
- Red team kill chain, including: Reconnaissance Beachhead Persistence Lateral movement Elevation Exfiltration.
- Blue team kill chain, including Gathering baseline data Detection Alerting Investigation Response Execution
- Organizational preparation, security processes, and responses
Requirements
- Basic experience with Windows Server administration, maintenance, and troubleshooting.
- Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, and cloud services concepts.
- Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy.