Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers' malicious backdoors/malware and trace them back to avoid possible future incidents.
Explore capture-the-flag exercises that will strengthen your ethical hacking skills
Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
In this course, you will get familiar with Microsoft Azure, its interface, and various services. You will provision and then use Microsoft Azure resources and services and have an appreciation for how everything connects and can contribute to your stable and modern application being developed.
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3.25 Days 19.5 CPD hours This course is intended for This course is intended for IT administrators with a minimum 2-5 years of experiencing working with Microsoft Windows Server, Windows 10, and Office 365 licensing. The course will utilize a pre-provisioned lab environment which includes Microsoft 365 E5 licenses and Enterprise Mobility and Security E5 licenses for each student. Powershell management topics will be discussed where applicable in the respective topics. This course will address Windows devices only enrolled in Intune. Configuring and Licensing Intune Endpoint Manager - quick discussion, portal access Discuss which licenses include Intune Discuss Microsoft Intune device-only subscription Discuss Azure Active Directory basic, P1, P2 licensing Intune setup and overview of capabilities Supported configurations Logging in and using Intune Admin portal via Azure Portal and via Endpoint manager site Configure a domain name (needed to support labs though may be done already for E1B/district) Add users and groups in Azure Portal Configure Azure AD connect and discuss AAD Connect Health Assigning licenses manually, via Powershell, and via AAD groups Set the MDM authority and enable device enrollment Add Apps to Intune - covered in detail in a later topic Configuring device profiles - covered in detail in a later topic Company Portal discussion - covered in detail in a later topic Configure app policies - covered in detail in a later topic Windows device management What is co-management - brief discussion on Endpoint Manager with Configuration Manager Registering, joining, hybrid join to Azure AD Enrollment method capabilities Azure AD joined Azure AD joined with Autopilot (User driven mode) Azure AD joined with Autopilot (Self deploying mode) Autopilot pre-provisioned deployment (formally known as white-glove) Device group tags for profile deployment Troubleshooting Autopilot Policy conflicts Known issues Using Powershell to connect to and manage Intune Software deployment Add apps to Intune Windows Store apps Microsoft Store for Business apps LOB apps - Sideloading Adding Win32 apps Running Powershell Scripts on devices Assigning Apps Monitor Apps Discovered Apps Configure Apps App Configuration Policies Office app policys Custom OMA-URI Policies Troubleshooting Managing devices Windows 10 Feature Updates Update rings to manage updates Mapping drives to SMB shares Discuss OneDrive for Business Manage Enterprise Wireless - Windows Configuration Designer, provisioning packages Implementing Conditional Access - device based, app based Printer management Universal Print Deploying printer settings Remote administration Intune Device Management Inventory Fresh Start Full Scan Remote Lock Restart Sync devices Bulk device actions Teamviewer integration requirements Intune Reporting Accessing Reports Exporting Reports using Graph
Duration 3 Days 18 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment. Overview At the completion of the course, you will be able to: Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy. Install and configure Symantec Endpoint Protection management and client components. Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients. Manage the client user interface. Manage content updates for Windows, Mac, and Linux. Perform server and database management. Configure replication and load balancing. Design a Symantec Endpoint Protection environment. This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. Introduction Course overview The classroom lab environment Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection? Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Extending Symantec Endpoint Protection Installing the Symantec Endpoint Protection Manager Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection upgrades and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Windows and Windows Embedded Clients Planning the client deployment Configuring client deployment package Deploying packages to clients Maintaining the client environment Upgrading Symantec Endpoint Protection clients Deploying Mac and Linux Clients Linux prerequisites Linux deployment Mac prerequisites Mac deployment Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configuration modes Configuring domains General client settings and Tamper Protection Configuring Content Updates for Windows Clients Introducing LiveUpdate Configuring the SEPM for LiveUpdate Configuring the LiveUpdate Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Configuring Content Updates for Mac and Linux Clients Describing content update methods Configuring the LiveUpdate policy Configuring the SEPM as a reverse proxy Monitoring updates Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Designing a Symantec Endpoint Environment Architecture components Architecture constraints Component placement Content delivery Determining client to SEPM ratios SEPM and database sizing best practices
Duration 1 Days 6 CPD hours This course is intended for Software developers, system administrators, and IT professionals who are focused on Microsoft Windows Overview Configuring Microsoft Windows and Microsoft SQL Server in Google Compute Engine. Deploying ASP.NET MVC applications to Google Compute Engine. Deploying .NET Core applications to Google Compute Engine, Google Compute Engine, and Google Container Engine Learn how to create Windows virtual machines on Google Cloud so that you can deploy and run Microsoft Windows applications. In this course, you'll learn how to run SQL Server in Compute Engine, how to deploy instances across Google Cloud zones, and how to get more out of ASP.NET on Compute Engine, Google Container Engine, and App Engine. Introduction to Google Cloud Platform Scope and structure of GCP. Options for Windows deployment on GCP. GCP interfaces. Windows Workloads on Google Compute Engine Google Compute Engine virtual machine options. Integrating Active Directory with Google Compute Engine virtual machines. Options for running SQL Server in Google Compute Engine. Configuring SQL Server for high availability. Developing ASP.NET MVC applications Model-view-controller structure. Using Microsoft Visual Studio?s Web Project template to develop in ASP.NET. Deploying applications to Microsoft Internet Information Server (IIS) in GCE. Configuring Resilient Workloads Deploying instances across GCP zones. Using instance groups to create pools of virtual machines. Load balancing Windows applications. Delivering Next-Generation ASP.NET Core on GCP Understanding .NET Core and EF Core. Options for deploying ASP.NET Core applications on Google Cloud Platform. Deploying ASP.NET Core applications on Google Compute Engine. Deploying ASP.NET Core applications on Google Container Engine. Deploying ASP.NET Core applications on Google App Engine. Additional course details: Nexus Humans Develop and Deploy Windows Applications on Google Cloud Platform training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Develop and Deploy Windows Applications on Google Cloud Platform course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course will help you pass the Microsoft 365 Identity and Services (Exam MS-100) certification and demonstrate a detailed understanding of evaluating, planning, migrating, deploying, and managing Microsoft 365 services.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others. Overview After completing this course, students will be able to: Describe the functionality of Windows PowerShell and use it to run and find basic commands. Identify and run cmdlets for server administration. Work with Windows PowerShell pipeline. Describe the techniques Windows PowerShell pipeline uses. Use PSProviders and PSDrives to work with other forms of storage. Query system information by using WMI and CIM. Work with variables, arrays, and hash tables. Write basic scripts in Windows PowerShell. Write advanced scripts in Windows PowerShell. Administer remote computers. Use background jobs and scheduled jobs. Use advanced Windows PowerShell techniques. This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows based servers. Getting Started with Windows PowerShell Overview and Background Understanding command syntax Finding commands Lab : Configuring Windows PowerShell Lab : Finding and Running Basic Commands Cmdlets for administration Active Directory administration cmdlets Network configuration cmdlets Other server administration cmdlets Lab : Windows Administration Working with the Windows PowerShell pipeline Understanding the Pipeline Selecting, Sorting, and Measuring Objects Filtering Objects Out of the Pipeline Enumerating Objects in the Pipeline Sending pipeline data as output Lab : Using the Pipeline Lab : Filtering Objects Lab : Enumerating Objects Lab : Sending output to a file Understanding How the Pipeline Works Passing the pipeline data Advanced considerations for pipeline data Lab : Working with Pipeline Parameter Binding Using PSProviders and PSDrives Using PSProviders Using PSDrives Lab : Using PSProviders and PSDrives Querying Management Information by Using WMI and CIM Understanding WMI and CIM Querying Data with WMI and CIM Making changes with WMI/CIM Lab : Working with WMI and CIM Working with variables, arrays, and hash tables Using variables Manipulating variables Manipulating arrays and hash tables Lab : Working with variables Basic scripting Introduction to scripting Scripting constructs Importing data from files Lab : Basic scripting Advanced scripting Accepting user input Overview of script documentation Troubleshooting and error handling Functions and modules Lab : Accepting data from users Lab : Implementing functions and modules Administering Remote Computers Using basic Windows PowerShell remoting Using advanced Windows PowerShell remoting techniques Using PSSessions Lab : Using basic remoting Lab : Using PSSessions Using Background Jobs and Scheduled Jobs Using Background Jobs Using Scheduled Jobs Lab : Using Background Jobs and Scheduled Jobs Using advanced Windows PowerShell techniques Creating profile scripts Using advanced techniques Lab : Practicing advanced techniques Lab : Practicing script development (optional)