Program HighlightsPROGRAM

Foundations of Cybersecurity Program

Cybersecurity is one of the fastest growing professions in today's job market. It is also one of the most diverse career fields out there. Not only do you need to master the technology itself, but it's also critical to be well-versed in researching and understanding ever-evolving vulnerabilities.

Foundations of Cybersecurity Program Highlights

Course enrollment

Starts on

26 August 2020

Enrollment closes on
31 December 2021

  Course Fee

Fee

US$155 - US$310

Course enrollment

Starts on

26 August 2020

Enrollment closes on
31 December 2021

Course Fee

Fee

US$155 - US$310

About This Program

Cybersecurity is one of the fastest growing professions in today's job market. It is also one of the most diverse career fields out there. Not only do you need to master the technology itself, but it's also critical to be well-versed in researching and understanding ever-evolving vulnerabilities.

In this course, you will learn the many technologies that prepare you for a career working with Cybersecurity systems. You will be exposed to security fundamentals, how to recognize and defend yourself agains some of the most common cybersecurity threats. In addition, you will learn how to be part of the critical response team and response planning.

What you will learn:

  • The fundamentals of enterprise cybersecurity
  • Understand Threat detection and plan to keep your company safe
  • How to plan for a security incident response
  • Set security best practices with PowerShell
  • To manage network identities
  • To secure data in Azure and SQL server
  • Windows 10 security services
  • Microsoft Azure security services
  • Windows Server 2016 Security Features

Course Syllabus

  • Course 1: Enterprise Security Fundamentals
  • Course 2: Threat Detection: Planning for a Secure Enterprise
  • Course 3: Planning a Security Incident Response
  • Course 4: Powershell Security Best Practices
  • Course 5: Managing Identity
  • Course 6: Securing Data in Azure and SQL Server
  • Course 7: Windows 10 Security Features
  • Course 8: Windows Server 2016 Security Features
  • Course 9: Microsoft Azure Security Services

General Information

  • This course is self-paced.
  • It can be taken at any time.
  • It can be audited as many times as you wish.
  • There is only ONE chance to pass the course, but multiple attempts per question is allowed.

Recommended skills prior to taking this course

Basic Math

Program Outline

Topics Covered

  • Course Topic

    Getting Started

Topics Covered

  • Course Topic

    Welcome

Topics Covered

  • Course Topic

    Basic Concepts of Networking

Topics Covered

  • Course Topic

    Cybersecurity Definitions

  • Course Topic

    Current Cybersecurity Landscape

  • Course Topic

    Assume Compromise Philsophy

  • Course Topic

    Cost of a breach

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Red Team versus Blue Team Exercises

  • Course Topic

    The Attacker's Objective

  • Course Topic

    Red Team Kill Chain

  • Course Topic

    Document Vulnerabilities

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Blue Team

  • Course Topic

    Blue Team Kill Chain

  • Course Topic

    Restrict Privilege Escalation

  • Course Topic

    Restrict Lateral Movement

  • Course Topic

    Attack Detection

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    CIA Triad

  • Course Topic

    Organization Preparations

  • Course Topic

    Developing and Maintaining Policies

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Final Exam

Topics Covered

  • Course Topic

    Welcome

Topics Covered

  • Course Topic

    An Overview of the Modern Cyber Threat Landscape

  • Course Topic

    Basic Access Control Models

  • Course Topic

    Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats

  • Course Topic

    Comparing signature-based and behavioral heuristic detection methods

  • Course Topic

    Combating threat persistence

  • Course Topic

    Penetration Testing

  • Course Topic

    Posture Testing

  • Course Topic

    Ethical Hacking

  • Course Topic

    Module Exam

  • Course Topic

    Subsection

Topics Covered

  • Course Topic

    Windows Event Forwarding and intrusion detection

  • Course Topic

    Microsoft Advanced Threat Analytics (ATA)

  • Course Topic

    Windows Defender Advanced Threat Protection (ATP)

  • Course Topic

    Microsoft Enterprise Threat Detection

  • Course Topic

    Microsoft Security Risk Detection

  • Course Topic

    AntiMalware Scan Interface (AMSI)

  • Course Topic

    Logging and Auditing

  • Course Topic

    Threat Detection Tools

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Microsoft Cloud App Security and Office 365 Cloud App Security

  • Course Topic

    Office 365 Advanced Threat Protection

  • Course Topic

    Office 365 Threat Intelligence

  • Course Topic

    Azure Advanced Threat Detection

  • Course Topic

    Azure Logging and Auditing

  • Course Topic

    Microsoft Enterprise Mobility + Security (EMS)

  • Course Topic

    Microsoft 365

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Layered Machine Learning defenses in Windows Defender Antivirus

  • Course Topic

    Detecting persistent threats by using Windows Defender ATP

  • Course Topic

    Enterprise Threat Detection behavioral monitoring

  • Course Topic

    Microsoft comprehensive approach to cyber threat detection

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Final Exam

  • Course Topic

    Lab

Topics Covered

  • Course Topic

    Welcome to This Course

Topics Covered

  • Course Topic

    Introduction

  • Course Topic

    NIST-Framework

  • Course Topic

    Prepare

  • Course Topic

    Module Review

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Building a Secuirty Incident Response Team

  • Course Topic

    Preparation

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Introduction

  • Course Topic

    Practice Security Incident Response Report

Topics Covered

  • Course Topic

    Final Exam

Topics Covered

  • Course Topic

    Welcome

Topics Covered

  • Course Topic

    Windows PowerShell Architecture

  • Course Topic

    Powershell editions and versions

  • Course Topic

    Running Windows PowerShell

Topics Covered

  • Course Topic

    Managing Local Script Execution with Windows PowerShell Execution Policy

  • Course Topic

    Managing Remote Execution Capabilities of Windows PowerShell

  • Course Topic

    Constrained Endpoints

  • Course Topic

    Language Mode

  • Course Topic

    Anti-Malware Scan Interface (AMSI)

Topics Covered

  • Course Topic

    Windows PowerShell DSC

  • Course Topic

    Just Enough Administration (JEA)

  • Course Topic

    Windows PowerShell Auditing and Logging

Topics Covered

  • Course Topic

    Windows PowerShell-based attacks

  • Course Topic

    Windows PowerShell-based security tools

  • Course Topic

    Summary of Windows PowerShell-based security-related technologies

Topics Covered

  • Course Topic

    Final Exam

Topics Covered

  • Course Topic

    Getting Started

Topics Covered

  • Course Topic

    Identity as a Service (IaaS), the new Control Plane

  • Course Topic

    Security Privileged Access Roadmap: Stage 2

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Active Directory Security

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Identity Federation and Access Solutions for the Cloud

  • Course Topic

    Azure Security Architecture

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Introduction

  • Course Topic

    Authentication and Authorization in Active Directory

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Final Exam

  • Course Topic

    Module 5 - Labs

Topics Covered

  • Course Topic

    Welcome

  • Course Topic

    Hands-On Lab Environment

Topics Covered

  • Course Topic

    Authenticating Connections to SQL Server

  • Course Topic

    Authorizing Logins to Connect to Databases

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Working with Server Roles

  • Course Topic

    Working with Database Roles

  • Course Topic

    Authorizing User Access to Objects

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Options for Auditing Data Access in SQL Server

  • Course Topic

    Implementing SQL Server Audit

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Protecting Data With Encryption

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Securing Data in SQL Server

Topics Covered

  • Course Topic

    Final Exam

Topics Covered

  • Course Topic

    Introduction

Topics Covered

  • Course Topic

    Evolution of attacks

Topics Covered

  • Course Topic

    Secure boot and Unified Extensible Firmware Interface

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Built-in Windows 10 defenses

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Additional built-in software security features

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Windows 10 Creator Update

  • Course Topic

    Ransomware Case Study

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Final Exam

Topics Covered

  • Course Topic

    Welcome to This Course

Topics Covered

  • Course Topic

    Server Hardening

  • Course Topic

    Service Configuration

  • Course Topic

    Account Configuration

  • Course Topic

    Remote Administrative Access

  • Course Topic

    Application Restriction

  • Course Topic

    Firewall Configuration

  • Course Topic

    Software Updates

  • Course Topic

    Configuration Baselines

Topics Covered

  • Course Topic

    Restricting Administrator Access

  • Course Topic

    LAPS

  • Course Topic

    Credential Guard

  • Course Topic

    NTLM blocking

  • Course Topic

    Protected Users

  • Course Topic

    Authentication Policy Silos

  • Course Topic

    Just Enough Administration

  • Course Topic

    ESAE forests

  • Course Topic

    Just in Time Administration

Topics Covered

  • Course Topic

    Introduction to Containers

  • Course Topic

    Container Types

  • Course Topic

    Container Dependencies

  • Course Topic

    Managing Container Images

  • Course Topic

    Docker

  • Course Topic

    Container Security Benefits

  • Course Topic

    Containers versus VMs

Topics Covered

  • Course Topic

    Secure Virtualization Workload

Topics Covered

  • Course Topic

    Final Exam

Topics Covered

  • Course Topic

    Welcome

Topics Covered

  • Course Topic

    Azure Security Services

  • Course Topic

    Video Introduction to Azure Network Security

  • Course Topic

    Azure Public Cloud Services

  • Course Topic

    Azure Networking

  • Course Topic

    Network Access Control

  • Course Topic

    Secure Remote Access and Cross Premises Connectivity

  • Course Topic

    Video VNET Peering

  • Course Topic

    Availability

  • Course Topic

    Name Resolution

  • Course Topic

    DMZ Architectures

  • Course Topic

    Monitoring and Threat Detection

  • Course Topic

    Module Summary

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Cloud Adoption changes

  • Course Topic

    Dynamic cloud environments

  • Course Topic

    Services in the cloud

  • Course Topic

    Shared Responsibility for Security

  • Course Topic

    Azure Security Center

  • Course Topic

    Azure Security Center Case Study

  • Course Topic

    Azure Backup

  • Course Topic

    Azure Log Analytics

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Azure Application Gateway

  • Course Topic

    Azure Disk and Storage Encryption

  • Course Topic

    Data Security and Encryption Best Practices

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Understanding Microsoft Intune

  • Course Topic

    Device Health Attestation

  • Course Topic

    Security Aspects of Windows AutoPilot

  • Course Topic

    Module Exam

Topics Covered

  • Course Topic

    Final Exam

  • Course Topic

    Final Lab

Topics Covered

  • Course Topic

    NASSCOM Certificate

Course Certificate

Earn your certificate

Once you have completed this program, you will earn your certificate.