Training Courses

Search Results for ""Azure Active Directory"" – Page 4

Microsoft Azure Security Technologies Certification Boot Camp

Instructor-Led 5 Day Hands On Training Boot Camp Reserve Your Seat $2,625 Best Price Guarantee Have Questions? Give Us a Call. (866) 704-9244 GET TRAINED, GET CERTIFIED, GET AHEAD! AZ-500: Microsoft Azure Security Technologies Training Earn your Microsoft Certified Associate (MCA) certification. Advance your career and upgrade your skills by achieving the Microsoft Azure Security Technologies […]

Azure Solutions Architect Expert Boot Camp

Earn Your Microsoft Azure Solutions Architect expert Certification Instructor-Led 6 Day Hands On Training Boot Camp Reserve Your Seat $3,995 Best Price Guarantee​ Have Questions? Give Us a Call. (866) 704-9244 GET TRAINED, GET CERTIFIED, GET AHEAD! Microsoft Azure Solutions Architect Expert Certification Training Exams AZ-300 & AZ-301 Earn your Microsoft Certified Expert (MCE) certification. Advance […]

AZ-500: Microsoft Azure Security Technologies

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

Audience Profile

This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization’s data.

Job role: Security Engineer

Preparation for exam: AZ-500

Features: none

Skills gained

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
  • Implement perimeter security strategies including Azure Firewall.
  • Implement network security strategies including Network Security Groups and Application Security Groups.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
  • Implement Azure Key Vault including certificates, keys, and secretes.
  • Implement application security strategies including app registration, managed identities, and service endpoints.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
  • Implement Azure Monitor including connected sources, log analytics, and alerts.
  • Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
  • Implement Azure Sentinel including workbooks, incidents, and playbooks.

Prerequisites

Successful learners will have prior knowledge and understanding of:

  • Security best practices and industry security requirements such as defense in

depth, least privileged access, role-based access control, multi-factor authentication,

shared responsibility, and zero trust model.

  • Be familiar with security protocols such as Virtual Private Networks (VPN), Internet

Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.

  • Have some experience deploying Azure workloads. This course does not cover the basics

of Azure administration, instead the course content builds on that knowledge by adding

security specific information.

  • Have experience with Windows and Linux operating systems and scripting languages.

Course labs may use PowerShell and the CLI.

Prerequisite courses (or equivalent knowledge and hands-on experience):

MS-102: Microsoft 365 Administrator

This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.

In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments.

The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management.

In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365’s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization’s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint.

Once you have this understanding of Microsoft 365’s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels.

Information Security Measures for Remote Employees

When it comes to the option for professionals to work from home via the internet, the current possibilities are better than ever before. These new possibilities also bring new challenges and one of them is the of information security. This is especially the case when comes to sensitive data and employees who are working remotely/off-site […]

20347OD: Enabling Office 365 Services On-Demand

Course Duration: 6 hours 11 minutes

This Microsoft 70-347: Enabling Office 365 Services On-Demand Course includes:

  • EXPERT INSTRUCTOR-LED TRAINING: Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields
  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS: Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.
  • QUIZZES & EXAM SIMULATORS: Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.
  • SOCIAL LEARNING & NETWORKING: World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.
  • FLASH CARDS & EDUCATIONAL GAMES: Every Student learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

Choose the On-Demand Package that best fits your learning and certification needs:

Basic Package Standard Package Premium Package
  • 1-year access to instructor lecture video (based on availability)
  • 1-year access to hands-on exercises, labs, games and practice tests*
  • Email Help Desk Support
  • *Practice tests and/or labs may not be available for certain courses
  • *Includes reading materials and study guides, but official vendor courseware not included
  • Includes digital license for official vendor courseware
  • 1-year access to instructor lecture video (based on availability)
  • 1-year access to hands-on exercises, labs, games and practice tests*
  • Email Help Desk Support
  • *Practice tests and/or labs may not be available for certain courses
  • Standard Package plus:
  • Premium Certification Prep Package:
    • Lifetime License to premium online test simulator
    • Official Exam Voucher
  • 3 hours of Instructor Time:
    • One-on-one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments
$595 $795 $1295

CPSH: Certified PowerShell Hacker

Prerequisites:

General Understanding of Pen Testing

General Understanding of Active Directory

General Understanding of scripting and programming

Student Materials:


CPEs:
32


WHO SHOULD ATTEND?

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Active Directory Administrators
  • Anyone looking to learn more about security

This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques. You will leave with a real strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place!

Here are just a few things you will take away from this course:

  • Detailed Lab Manual
  • VMs for performing labs on your own
  • New ideas on testing your own AD infrastructure
  • Attacks you can use immediately
  • How to secure against PowerShell attacks

55238: SharePoint Online for Administrators

About this Microsoft SharePoint Online Training Course

This Microsoft SharePoint Online Training Course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The Microsoft SharePoint Online Training Course is appropriate for existing SharePoint on-premises administrators and new administrators to Office 365 who need to understand how to correctly setup SharePoint Online for their company. The Microsoft SharePoint Online Training Course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online.

At Microsoft SharePoint Online Training Course Completion

After completing this Microsoft SharePoint Online Training Course, students will be able to:

  • Understand the architecture of SharePoint Online
  • Have knowledge of all the components in SharePoint Online
  • Have on hands on experience configuring the components of SharePoint Online
  • Have hands on experience configuring the options
  • Work with Site Collections and storage options
  • Manage user profiles and social profiling
  • Understand and configure data connectivity in SharePoint Online
  • Build a taxonomy structure
  • Understand and configure Search in SharePoint Online
  • Configure and deploy apps
  • Understand and define Enterprise content management and data loss prevention.
  • Configure additional options and features in SharePoint Online such as Information Rights Management

 

Latest Microsoft Updates for September 2017

If you have Microsoft products you will quickly see that regular updates are available to move your system along. This September, there are some major updates and service packs available through Windows Update.  Here is what you should look out for, especially if you are a Microsoft Certified Professional. Microsoft Certified Professional Employees Should Watch […]

20742: Identity with Windows Server 2016

About this Microsoft Windows Server 2016 Training Course

This five-day instructor-led Microsoft Windows Server 2016 Training Course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory€“related issues with Windows Server 2016. Additionally, this Microsoft Windows Server 2016 Training Course teaches how to deploy other Active Directory server roles such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS).

Audience Profile

This Microsoft Windows Server 2016 Training Course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. This would typically include:

  • AD DS administrators who are looking to train in identity and access technologies with Windows Server 2012 or Windows Server 2016.
  • System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2012 or Windows Server 2016.

The secondary audience for this Microsoft Windows Server 2016 Training Course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam.

Prerequisites

Before attending this Microsoft Windows Server 2016 Training Course, students must have:

  • Some exposure to and experience with AD DS concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Experience working with and configuring Windows Server 2012 or Windows Server 2016
  • Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
  • Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
  • An awareness of basic security best practices.
  • Hands-on working experience with Windows client operating systems such as Windows 7, Windows 8, Windows 8.1, or Windows 10.
  • Basic experience with the Windows PowerShell command-line interface.

 

At Microsoft Windows Server 2016 Training Course Completion

At Microsoft Windows Server 2016 Training Course completion:

  • After completing this Microsoft Windows Server 2016 Training Course, students will be able to:
  • Install and configure domain controllers.
  • Manage objects in AD DS by using graphical tools and Windows PowerShell.
  • Implement AD DS in complex environments.
  • Implement AD DS sites, and configure and manage replication.
  • Implement and manage Group Policy Objects (GPOs).
  • Manage user settings by using GPOs.
  • Secure AD DS and user accounts.
  • Implement and manage a certificate authority (CA) hierarchy with AD CS.
  • Deploy and manage certificates.
  • Implement and administer AD FS.
  • Implement and administer Active Directory Rights Management Services (AD RMS).
  • Implement synchronization between AD DS and Azure AD.
  • Monitor, troubleshoot, and establish business continuity for AD DS services.