Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
DASA DevOps Professional: Enable and Scale: Virtual In-House Training DevOps embodies both cultural changes and practices through which organizations can facilitate the IT functions of software development (Dev) and software operation (Ops). The DevOps movement advocates automation and phase-based monitoring practices. Its objectives include: Decreasing development cycles · Increasing deployment frequency Improving the reliability of releases Developing a closer alignment with business objectives The DASA DevOps Professional: Enable and Scale course (formerly known as DevOps Practitioner) is designed to provide individuals with the core education necessary to put DevOps into practice. With the help of DevOps theory, pragmatic examples and exercises, and interactive group discussions, the course will help you understand how to apply the necessary skills to practice DevOps. Building on the knowledge learned on theFundamentals course (the 'why'), you will learn the 'how'. The DevOps Professional: Enable and Scale course focuses on improving the skill set of the DASA competency model, which includes competencies like Courage, Teambuilding, DevOps Leadership, and Continuous Improvement. On completion of the DASA DevOps Professional: Enable and Scale training and passing the exam, the certification is awarded. What you will Learn At the end of this program, you will be able to: Explain the importance of DevOps culture and the aspects that can influence it Explain why courage, teambuilding, leadership, and continuous improvement are required in a DevOps environment Explain why courage is essential to enable trust, honesty, and experimentation Identify and evaluate different types of behavior in a DevOps environment Recognize the signals indicating impediments and/or team dysfunctions Describe how to form good DevOps teams and assess their maturity List the effects of happiness and motivation on team performance Identify how leaders encourage feedback and transparency Discuss the factors that leaders can influence to build trust Explain how and why leaders promote a 'safe to fail' environment Analyze value streams to improve throughput and flow Facilitate the tools for continuous improvement: structured problem-solving workshops, Story Mapping sessions, and retrospectives TEAMBUILDING Teambuilding is about understanding the other's point of view, collaboration, mutual accountability, common purpose, and the ability to integrally support the service/product. Design Teams Characteristics of a DevOps team Skills of a DevOps Team Self-organization and autonomy Rules to consider when designing DevOps teams Build Teams Effects of happiness and motivation on performance Feedback Creating high-performance teams Governance Governance within teams and between multiple teams Governance between organizations DevOps contracts DEVOPS LEADERSHIP This module describes how to facilitate teams to high performance, DevOps behavior, transparency, and a service lifecycle mindset. Build Culture Creating the right environment and providing vision and purpose Stimulating the right behavior Servant leadership: giving control, supporting, and inspiring Create Purpose Defining and aligning purpose Purpose of having a purpose Alignment versus autonomy Be a Servant Leader Give control to the team Inspire and support the team Focus on Success Output versus outcome Measuring and steering COURAGE The Courage module is about coaching courageous behavior, proactivity, reflection, trust, open discussions, experimentation, fail fast, and the courage to change. Build Courage The importance of courage Courage in relationship with leadership and feedback Enabling courage at the team level Dealing with failure Think Different Courage day to day Encourage critical thinking Techniques to promote courageous behavior VALUE CUSTOMER-CENTRIC ACTION This module describes the important aspects that are relevant to identify and deliver the required and expected value for all relevant stakeholders. Aspects of Value and Managing Expectations The different aspects of value Stakeholder management Customer collaboration and using customer feedback How to do prioritization CONTINUOUS IMPROVEMENT Continuous improvement describes the importance of a Kaizen mindset, quality at the source, first time right, knowledge-sharing, and the ability to adapt. Build Flow Understanding the importance of flow Using Lean to optimize flow Kaizen as a mindset Radical change versus Kaizen Using Pull to optimize flow Continuous Improvement Tools Kaizen Event Value Stream Mapping Visual Management Retrospective Daily Standup Five Times Why
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is people who are moving into a database role, or whose role has expanded to include database technologies. Developers that deliver content from SQL Server databases will also benefit from this material. Overview After completing this course, you will be able to: Describe key database concepts in the context of SQL Server Describe database languages used in SQL Server Describe data modelling techniques Describe normalization and denormalization techniques Describe relationship types and effects in database design Describe the effects of database design on performance Describe commonly used database objects This course is provided as an introductory class for anyone getting started with databases. It will be useful to programmers and other IT professionals whose job roles are expanding into database management. Students will learn fundamental database concepts through demonstrations and hands-on labs on a SQL Server instance. This material updates and replaces course Microsoft course 10985 which was previously published under the same title. Module 1: Introduction to databases Introduction to Relational Databases Other Databases and Storage Data Analysis SQL Server Database Languages Module 2: Data Modeling Data Modelling Designing a Database Relationship Modeling Module 3: Normalization Fundamentals of Normalization Normal Form Denormalization Module 4: Relationships Introduction to Relationships Planning Referential Integrity Module 5: Performance Indexing Query Performance Concurrency Module 6: Database Objects Tables Views Stored Procedures, Triggers and Functions
XSLT training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Transform and style XML documents using XSLT. XSLT training course details Who will benefit: Anyone working with XSLT. Prerequisites: XML primer Duration 2 days XSLT training course contents Introduction Extensible Stylesheet Language (XSL), transforming and formatting XML. XML refresher The basic rules for building an XML document. An introduction to XSLT The basic concepts of XSLT, xsl:output, xsl:template, xsl:value-of. XML documents as trees How the original XML is transformed into a set of nodes, the general terms for manipulating node trees. Paths (XPath) Use of path matching to select required nodes for transformation. Using templates xsl:apply-templates, xsl:template match, nested templates, xsl:copy , <comment> and <element> , default templates, parameters. Control xsl:if, xsl:choose, xsl:for-each, xsl:sort. Constructing the result tree xsl:output, xsl:attribute, xsl:attribute-set, xsl:comment, xsl:processing-instruction, xsl:text, xsl:value-of, xsl:variable. Combining templates xsl:include, xsl:import, xsl:apply-imports. Transforming to text
Assuring Quality Through Acceptance Testing: In-House Training It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. It is the business analyst's job to define the business problem to be solved by IT. It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. The business analyst is not only concerned with the testing itself, but also with the management and monitoring of the users doing the acceptance testing, and recording, analyzing, and evaluating the results. What you will Learn Upon completion, participants will be able to: Create a set of acceptance test cases Manage and monitor an acceptance test stage where users perform the testing Work with the development team in the systems testing stage Assess the solution once it is in the business environment Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide BA roles and relationships through the project life cycle Introduction to assuring software quality through acceptance testing The Scope of IT Testing Overview of testing stages The testing process Testing documentation Pre-Acceptance Testing The BA's role in testing Early development testing stages (unit and integration) Late development testing stage (system) The Acceptance Test Stage - Part I (Planning, Design, and Development) Overview of user acceptance testing Acceptance test planning Designing user acceptance tests Developing individual user acceptance test cases Building effective user acceptance test scenarios The Acceptance Test Stage - Part II (Execution and Reporting) Operating guidelines Execution Reporting Post-Acceptance Testing Overview Project implementation Project transition (project closure) Production through retirement Testing Commercial Off-the-Shelf (COTS) Software Overview Selecting the software Implementing the software Summary What did we learn and how can we implement this in our work environments?
Server Load Balancing course description This two-day Server Load Balancing course introduces the concepts of SLB from the reasons to implement, through the basics and then onto details studies of load distribution, health checks, layer 7 switching and Global SLB. What will you learn Explain packet paths when implementing SLB. Recognise the impact of different topologies. Evaluate SLB load distribution methods. Describe how load balancers can improve security. Explain how GSLB works. Server Load Balancing course details Who will benefit: Anyone working with SLB. Prerequisites: None. Duration 2 days Server Load Balancing course contents Introduction Concept, reasons, benefits, alternatives. Other features: Security, Caching. SLB concepts Architectures, Virtual servers, real servers, Virtual IP address, health checks. DNS load balancing. Packet walk using SLB. Load balancing 6 modes of bonding and load balancing without SLB. ISP load balancing. Health. Distribution policies: Round Robin, least connections, weighted distributions, response time, other variations. Persistent versus concurrent. Layer 4 switching L2 SLB, L3 SLB, single arm SLB, DSR, more packet walking, TCP versus UDP, Port numbers. Layer 7 switching Persistence. Cookie switching, Cookie hashing, Cookie insertion, URL switching, URL Hashing, SSL. Health checks Layer 3: ARP, ping. Layer 4: SYN, UDP. Layer 7: HTTP GET, Status codes, HTTP keepalives, content verification, SSL. Other application keepalives. What to do after failure and recovery. Security DOS attack protection, SYN attack protection, Rate limiting: connections, transactions. SSL offload. Redundancy Hot standby, Active standby, Active active. Stateful, stateless. VRRP, STP. GSLB Anycasting. DNS, TTL, DNS load balancing, problems with DNS load balancing,. HTTP redirect, health, thresholds, round trip times, location.
Layer 3 switching training course description A hands on switching course for those already familiar with the basics of Ethernet switching. The course focuses on L3 switching along with the QoS and security features that layer 3 switches can add to the network. What will you learn Explain how layer 3 switches work. Troubleshoot layer 3 switching. Implement QoS on switches. Secure networks with L3 switches. Layer 3 switching training course details Who will benefit: Technical staff working with Ethernet switches. Prerequisites: Definitive Ethernet switching for engineers Duration 2 days Layer 3 switching training course contents Switches Switch review, VLANs, inter VLAN routing. Hands on VLANs and tagging, separating networks with routers. VLANs and IP addressing IP addresses, subnet masks, default gateways. Hands on L3 switches and VLANs What are layer 3 switches Routers in switches, configuring a switch to route, switch ports, router ports, when to switch, when to route. What is the difference between a router and a L3 switch? Hands on Analysing packet flows through a L3 switch. L3 switches and static routes Why use static routes? Default routes. Hands on Configuring static routes. L3 switches and routing protocols RIP, OSPF. Hands on RIP, OSPF. First hop redundancy Default gateways, VRRP/HSRP/GBLP. Load sharing, critical IP addresses. Interaction between STP and L3 redundancy Hands on VRRP. Multicasting and L3 switches IGMP, IGMP snooping, multicasts and routers, PIM. Hands on Multicasts between VLANs. IPv6 IPv6 and L2 switches, IPv6 and L3 switches. Hands on Adding IPv6 into the network. QoS DSCP, 802.1Q, 802.1p, mapping, classification, policy, Ingress queues, Egress queues. Dropping frames, limiting bandwidth. Hands on Voice through switches. Security Layer 2 security, filtering at layer 3. Hands on Controlling inter VLAN traffic.
Total STP training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores in depth how the protocol works and the implications this has on network performance. We also study STP variants including 802.1w (RSTP) and 802.1s (MSTP). What will you learn Explain how STP works. Explain how RSTP works. Explain how MSTP works. Troubleshoot STP and variants. Total STP training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total STP training course contents STP What is 802.1D, what is STP, resilience, broadcast storms, forwarding and blocking, single path. Hands on Impact of broadcast storms, enabling disabling STP. Operation STP frames, BPDUs, root bridge election, blocked ports, root ports, designated ports. STP path costs. Hands on Analysing STP, troubleshooting implications. Topology changes Hello timer, Forward delay timer, max age timer, Topology Change Notification (TCN) BPDU. Hands on STP convergence. STP enhancements and tuning Bridge ID, Bridge priority, port priority, 30 second delay, Edge ports, PortFast, root guard, loop guard, BPDU guard. Hands on Root bridge positioning, improving STP convergence. RSTP 802.1w, Improvements, convergence times. RSTP bridge port roles, RSTP switch port states. Edge ports, link ports. Hands on RSTP configuration and convergence. VLANs and STP Access/untagged ports, trunk/tagged ports, PVST, PVST+, RPVST, MISTP, MSTP and 802.1s. MSTP BPDUs. Instances, Load balancing, impact on CPU. Hands on MSTP load balancing. Interoperability Regions, Virtual bridges, domains. Hands on STP, RSTP and MSTP interoperation.
Copper cabling systems training course description A hands on training course covering installation, termination and testing of copper cables in an internal environment. The course covers all copper cabling but hands on sessions focus on unshielded Twisted Pair. What will you learn Recognise different copper cables and when to use them. Install and terminate UTP cables. Test and certify UTP cables. Copper cabling systems training course details Who will benefit: Professional cable installers. Prerequisites: None Duration 2 days Copper cabling systems training course contents Communications principles Use of cables in data networks, Use of cables in telephone networks, conductors and insulators, current, resistance, voltage and Ohms law. Copper cabling per cabling Coaxial versus twisted pair. UTP and STP. Cat 5, 5e, 6 and 7. Straight through, cross over, others. Hands on: Building a simple network. Cable termination Cable termination Preparing cables for termination, termination techniques, termination tools. Wiring standards, colour codes. Hands on: Making your own cables and using them in the simple network. Cable architectures Structure cabling system components, topologies, horizontal wiring, vertical wiring, telecomms rooms, server rooms. Hubs, switches and routers implications. Trunking. Cabling documentation, symbols and abbreviations. Hands on: punch blocks, testing continuity. Cable installation Site surveys: pathways and spaces, support structures, distance limitations. Recommended installation practices, laying and setup, retrofits. Health and safety factors, fire and building codes. Hands on: Performing a site survey, installing cable with floor boxes. Testing Basic testing, volt meters, tone set, Cat 5 testers, Cat 5e testers, Cat 6 testers. Certifying performance, Cat 5, 5e and 6 performance parameters. External factors. Common faults. Hands on: Testing an installation, troubleshooting faults. Other aspects Telephony cables, shielded cables. Hands on: installing telephone cable, testing continuity.