Training Courses

Search Results for ""Azure Active Directory"" – Page 4

AZ-120: Planning and Administering Microsoft Azure for SAP Workloads

This course teaches IT Professionals experienced in SAP solutions how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. Students of this course will learn through concepts, scenarios, procedures, and hands-on labs how to best plan and implement migration and operation of an SAP solution on Azure. Your will receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution.

Audience Profile

This course is for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.

Job role: Solution Architect

Preparation for exam: AZ-120

Features: none

Skills gained

  • Migrate SAP Workloads to Azure
  • Design an Azure Solution to Support SAP Workloads
  • Build and Deploy Azure for SAP Workloads
  • Validate Azure Infrastructure for SAP Workloads
  • Operationalize Azure SAP Architecture

Prerequisites

Before attending this course, students should have:

  • Hands-on experience with Azure IaaS and PaaS solutions, including VM, VNet, Load Balancers, Storage (Blob, Files, Disks).
  • Understanding of on-premises and cloud virtualization technologies, including: VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts
  • Experience with Linux/Unix environments.
  • Solid knowledge of SAP Applications, SAP HANA, S/4HANA, SAP NetWeaver, SAP BW, OS  Servers for SAP Applications and Databases.
  • Understanding of SAP HANA deployment and configuration.
  • Hands-on experience with SAP HANA administration.

Prerequisite Courses (or equivalent knowledge and hands-on experience):

 

AZ-104: Microsoft Azure Administrator

This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.

Audience Profile

This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate.

Job role: Administrator

Preparation for exam: AZ-104

Features: none

Prerequisites

Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage.

  • Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks.
  • Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including users, groups, and role-based access control.
  • Understanding of resilience and disaster recovery, including backup and restore operations.

Prerequisite courses (or equivalent knowledge and hands-on experience):

 

Microsoft Azure Security Technologies Certification Boot Camp

Instructor-Led 5 Day Hands On Training Boot Camp Reserve Your Seat $2,625 Best Price Guarantee Have Questions? Give Us a Call. (866) 704-9244 GET TRAINED, GET CERTIFIED, GET AHEAD! AZ-500: Microsoft Azure Security Technologies Training Earn your Microsoft Certified Associate (MCA) certification. Advance your career and upgrade your skills by achieving the Microsoft Azure Security Technologies […]

Azure Solutions Architect Expert Boot Camp

Earn Your Microsoft Azure Solutions Architect expert Certification Instructor-Led 6 Day Hands On Training Boot Camp Reserve Your Seat $3,995 Best Price Guarantee​ Have Questions? Give Us a Call. (866) 704-9244 GET TRAINED, GET CERTIFIED, GET AHEAD! Microsoft Azure Solutions Architect Expert Certification Training Exams AZ-300 & AZ-301 Earn your Microsoft Certified Expert (MCE) certification. Advance […]

AZ-500: Microsoft Azure Security Technologies

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

Audience Profile

This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization’s data.

Job role: Security Engineer

Preparation for exam: AZ-500

Features: none

Skills gained

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
  • Implement perimeter security strategies including Azure Firewall.
  • Implement network security strategies including Network Security Groups and Application Security Groups.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
  • Implement Azure Key Vault including certificates, keys, and secretes.
  • Implement application security strategies including app registration, managed identities, and service endpoints.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
  • Implement Azure Monitor including connected sources, log analytics, and alerts.
  • Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
  • Implement Azure Sentinel including workbooks, incidents, and playbooks.

Prerequisites

Successful learners will have prior knowledge and understanding of:

  • Security best practices and industry security requirements such as defense in

depth, least privileged access, role-based access control, multi-factor authentication,

shared responsibility, and zero trust model.

  • Be familiar with security protocols such as Virtual Private Networks (VPN), Internet

Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.

  • Have some experience deploying Azure workloads. This course does not cover the basics

of Azure administration, instead the course content builds on that knowledge by adding

security specific information.

  • Have experience with Windows and Linux operating systems and scripting languages.

Course labs may use PowerShell and the CLI.

Prerequisite courses (or equivalent knowledge and hands-on experience):

MS-102: Microsoft 365 Administrator

This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.

In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments.

The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management.

In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365’s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization’s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint.

Once you have this understanding of Microsoft 365’s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels.

Information Security Measures for Remote Employees

When it comes to the option for professionals to work from home via the internet, the current possibilities are better than ever before. These new possibilities also bring new challenges and one of them is the of information security. This is especially the case when comes to sensitive data and employees who are working remotely/off-site […]

20347OD: Enabling Office 365 Services On-Demand

Course Duration: 6 hours 11 minutes

This Microsoft 70-347: Enabling Office 365 Services On-Demand Course includes:

  • EXPERT INSTRUCTOR-LED TRAINING: Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields
  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS: Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.
  • QUIZZES & EXAM SIMULATORS: Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.
  • SOCIAL LEARNING & NETWORKING: World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.
  • FLASH CARDS & EDUCATIONAL GAMES: Every Student learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

Choose the On-Demand Package that best fits your learning and certification needs:

Basic Package Standard Package Premium Package
  • 1-year access to instructor lecture video (based on availability)
  • 1-year access to hands-on exercises, labs, games and practice tests*
  • Email Help Desk Support
  • *Practice tests and/or labs may not be available for certain courses
  • *Includes reading materials and study guides, but official vendor courseware not included
  • Includes digital license for official vendor courseware
  • 1-year access to instructor lecture video (based on availability)
  • 1-year access to hands-on exercises, labs, games and practice tests*
  • Email Help Desk Support
  • *Practice tests and/or labs may not be available for certain courses
  • Standard Package plus:
  • Premium Certification Prep Package:
    • Lifetime License to premium online test simulator
    • Official Exam Voucher
  • 3 hours of Instructor Time:
    • One-on-one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments
$595 $795 $1295

CPSH: Certified PowerShell Hacker

Prerequisites:

General Understanding of Pen Testing

General Understanding of Active Directory

General Understanding of scripting and programming

Student Materials:


CPEs:
32


WHO SHOULD ATTEND?

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Active Directory Administrators
  • Anyone looking to learn more about security

This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques. You will leave with a real strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place!

Here are just a few things you will take away from this course:

  • Detailed Lab Manual
  • VMs for performing labs on your own
  • New ideas on testing your own AD infrastructure
  • Attacks you can use immediately
  • How to secure against PowerShell attacks

55238: SharePoint Online for Administrators

About this Microsoft SharePoint Online Training Course

This Microsoft SharePoint Online Training Course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The Microsoft SharePoint Online Training Course is appropriate for existing SharePoint on-premises administrators and new administrators to Office 365 who need to understand how to correctly setup SharePoint Online for their company. The Microsoft SharePoint Online Training Course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online.

At Microsoft SharePoint Online Training Course Completion

After completing this Microsoft SharePoint Online Training Course, students will be able to:

  • Understand the architecture of SharePoint Online
  • Have knowledge of all the components in SharePoint Online
  • Have on hands on experience configuring the components of SharePoint Online
  • Have hands on experience configuring the options
  • Work with Site Collections and storage options
  • Manage user profiles and social profiling
  • Understand and configure data connectivity in SharePoint Online
  • Build a taxonomy structure
  • Understand and configure Search in SharePoint Online
  • Configure and deploy apps
  • Understand and define Enterprise content management and data loss prevention.
  • Configure additional options and features in SharePoint Online such as Information Rights Management