Course HighlightsCOURSE
Managing Information Security

Managing Information Security

Phishing schemes. Macro viruses. Spyware. These are some of the greatest threats of the digital age—and the world needs cybersecurity experts like never before. This course will provide you with the foundations on how to contribute to managing information security, plan for your security incident response, detect threats and Learn best practices on how to take advantage of Microsoft's Azure Security Services.

Managing Information Security Highlights

Course Enrollment

Starts on

06 July 2020

Enrollment closes on
31 December 2022

  Course duration

Duration

  • 10 Hours
  Course Fee

Fee

US$ 49 - US$ 99

Course Enrollment

Starts on

06 July 2020

Enrollment closes on
31 December 2022

Course duration

Duration

  • 10 Hours
Course Fee

Fee

US$ 49 - US$ 99

Welcome to Managing Information Security. There are three course in this program.
  1. Planning a Security Incident Response
  2. Threat Detection: Planning for a Secure Enterprise
  3. Microsoft Azure Security Services

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

Prerequisites

In addition to their professional experience, students who take this training should already have the following technical knowledge:

  • The current cybersecurity ecosystem.
  • Analysis of hacks on computers and networks.
  • Basic Risk Management

Course Objectives

After completing this course students will have the ability to:

      • Describe signature-based and behavioral / heuristic detection methods
      • List the capabilities of on-premise threat detection and mitigation tools
      • Name the capabilities of hybrid and cloud threat detection and mitigation tools
      • Recognize the importance of Enterprise threat detection monitoring
      • Understand the current nature of the security threat landscape and study the new security architecture and features of Microsoft’s Azure.
      • Insights into Azure Security services to help secure your services and data within Azure
      • Knowledge of Azure security best practices
      • Understanding of the terminology, tools, and techniques for creating a secure resilient cloud services

Course Content

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. Scored Questions are located at the end of each module to check your general understanding of the key concepts. Videos are located throughout the course to explain the concepts and provide system walk-throughs.

Final Exam: The Final Exam questions are scored and check your understanding of the key concepts in the course. The Final Exam plus the scored questions at the end of each module will count for 100% of your course grade.

Course Outline

Preparation Actions
Team Duties
Team Preparations
Establishing Team Roles
CSIRT Communications
Recovering
Reviewing Response and Updating Policies
Module Summary
Module Exam
The Security Incident Report - Exercise
Introduction
Practice-SIR
Incident-Overview
Disaster Recovery Plan
Assessment Questions
Final Exam
Overview
Phases of a cyber
Targeted attacks
Cryptocurrency mining
Ransomware
Rapid attacks
Living
Stealth
Assume breach
Evolving security perimeter
Lesson Review
Basic Access Control Models
Penetration Testing - Lab
Posture Testing
Ethical Hacking
Module Exam
Overview
Microsoft Cloud App Security vs Office 365 Cloud App Security
Configuring Microsoft Cloud App Security and Office 365 Cloud App Security
Lesson Review
Overview
Implementing Office 365 Advanced Threat Protection
Using Office 365 Advanced Threat Protection
Lesson Review
Overview
Lesson Review
Azure Active Directory Identity Protection
Azure Active Directory Privileged Identity Management
Microsoft Operations Management Suite
Azure Security Center
Advanced Threat Detection Features
Third party ATD capabilities through Azure Marketplace
Lesson Review
Overview
Types of logs and alerts in Azure
Log integration with on premises SIEM systems
Lesson Review
Overview
Azure Advanced Threat Protection
Overview
Microsoft 365 Enterprise
Lesson Review
Module Exam
About this Course
Course Syllabus
Course Resources
Introduction to Azure Security Architecture
Video Introduction to Azure Network Security
Azure Networking
Network Access Control
Secure Remote Access and Cross Premises Connectivity
The following video discusses Virtual Network Peering.
Availability
Name Resolution
DMZ Architecture
Monitoring and threat detection
Module Summary
What are Review Questions?
Mod 01 Assessment
Azure Security and Operations Management
Dynamic cloud environments
Services in the cloud
Shared Responsibility for Security
Azure DDoS Protection Service - Video
Azure Secure Center
Alert Validation in ASC - Video
Detecting unprotected resources
Security policies and recommendations
Azure Security Center Case Study
Recommended remediation and mitigation steps
Azure Backup – Guard against ransomware and human errors
Videos Azure Backup
Azure Log Analytics – an important component in an effective data protection strategy
Log Analytics architecture
Types of logs in Azure
Integrating Azure Security Center alerts with Azure log integration
Video Overview of Azure Log Analytics
What are Review Questions?
Mod 02 Assessment
Course Certificate

Earn your certificate

Once you have completed this course, you will earn your certificate.

Managing Information Security