Readynez Talent: Microsoft Professional Program for Cybersecurity

About our Talent Services

You want new efficiencies, new opportunities and growth from technology, and you will need skills to get them. With Readynez Talent Services you will answer real and burning business challenges. No wonder we’ve been awarded the Microsoft Learning Partner of the year global finalist award for helping businesses transform and achieve remarkable results.

Get started

I’m an opportunity Leader looking for talent

I’m an ambitious graduate looking for an exciting career

The Programme
Readynez Talent: Microsoft Professional Program for Cybersecurity is a completely new way of closing the skills gap. It´s a complete Training programme designed specifically to get you a highly skilled Cybersecurity talent ready to add value with knowledge – in no time and without any hassle.

Grow your business with a Cybersecurity Talent candidate
Readynez Talent Cybersecurity candidates challenge habits, push innovation into cultures and discover new solutions. They are ambitious, committed and flexible and they support an attitude that fuels growth.

And don’t forget, your Readynez Talent programme is all inclusive. We’ll recruit the perfect candidate for you. We’ll train your new employee into a highly skilled, fully-productive and value-adding Cybersecurity talent in no time. Plus we´ll give you the tools you´ll need for a seamless and successful retention process of the candidates. Or, if you already have a candidate in mind, they´re more than welcome to join the training programme as well.

Programme summary

Training programme

Readynez Talent: Microsoft Professional Program for Cybersecurity

Price

DKK 59 900 EX VAT

Duration

3-5 months

Courses

  • Microsoft Professional Program for Cybersecurity – Part 1
  • Microsoft Professional Program for Cybersecurity – Part 2
  • Value Creating Consultant

Program Overview

Cybersecurity threats are on the rise and now more than ever businesses need skilled team members to help prevent and mitigate breaches. This 10-course program will help you identify threats early on and minimize breach impacts.

Module 1

Enterprise Security Fundamentals

Learn to describe the current enterprise security landscape, define the Assume Compromise approach, practice red team versus blue team exercises, and develop organizational security preparation, processes, and responses.

View More

Duration

8-16 Hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Describe the current enterprise security landscape
  • Define the Assume Compromise approach
  • Practice Red team versus Blue team exercises
  • Develop organizational security preparation, processes, and responses

 

Go To course

Threat Detection: Planning for a Secure Enterprise

This course provides an overview of threat detection as part of a defense-in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.

View More

Duration

8-16 hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Describe signature-based and behavioral / heuristic detection methods
  • List the capabilities of on-premise threat detection and mitigation tools
  • Name the capabilities of hybrid and cloud threat detection and mitigation tools
  • Recognize the importance of Enterprise threat detection monitoring

 

Go To COurse

Planning a Security Incident Response

Learn to manage an enterprise security incident while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

View More

Duration

8-16 hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Effectively prioritize the response to a security incident
  • Build a computer security incident response team (CSIRT)
  • Develop an incident response action plan
  • List appropriate post-incident activities

 

Go To COurse

PowerShell Security Best Practices

Use PowerShell to enhance security and remediate new threats and exploits. Explore the functionality of administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) for configuring and securing servers

View More

Duration

8-16 Hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Understand the architecture of Powershell
  • Deploy Powershell operational security
  • Analyze PowerShell Auditing and Logging
  • Enhance server management with Desired State Configuration and Just Enough Administration.
  • Analyze and debug scripts
  • Understand Powershell based exploits and their remediation.

 

Go To Course

Managing Identity

Based on real-world experience from Microsoft incident response teams, this course takes a hands-on approach to identity management. You will create a bastion host, configure Privileged Access Management, set up Microsoft Identity Manager, and more.

View More

Duration

8-12

Certification

Verified Certificate

What you'll learn

  • How identity is the new control plane, the perimeter that is replacing the firewall.
  • The recommended steps to secure Active Directory.
  • Azure Security Architecture and the Identity Federation and access solutions supported by Azure architecture.
  • How Kerberos and Privilege Attribute Certification function.

 

Go To Course

Microsoft Professional Program for Cybersecurity – Part 1

View More

Type

Instructor led training

Duration

3 days

Description for Cybersecurity part 1

Module 2

Secure and Protect Data

More options available

View Options

Option 1

Security in Office 365

Review the different types of threats that can target your organization and learn how to implement and manage Office 365 security features like Advanced Threat Protection, Threat Intelligence, and Advanced Security Management.

Go To Course

Option 2

Securing Data in Azure and SQL Server

Learn how to secure data in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases. Join the experts for a look at user authentication, who the users are, authorization and what they are allowed to do. Topics include: Authenticating Users and Connections, Authorizing Users to Access Resources, Auditing Access to Data, and Encrypting Data.

Go To Course

Option 3

Microsoft SharePoint 2016: Authentication and Security

Learn how to plan and configure a SharePoint on-premises solution to help protect the environment. The course examines the necessary hardware and software requirements and the overall methodology to SharePoint security.

Go to Course

Type

Online Course

Duration

10-20 Hours

Certification

Verified Certificate

Type

Online Course

Duration

8-12 Hours

Certification

Verified Certificate

Type

Online Course

Duration

27-45 Hours

Certification

Verified Certificate

Windows 10 Security Features

Stay ahead of the security curve—learn about the continually evolving security features of the Windows 10 operating system. With a team of Microsoft security engineers, discover how to deploy its advanced capabilities.

View More

Duration

8-16 Hours

Certification

Cerified Certificate

What you'll learn

  • The current nature of the security threat landscape
  • The new security architecture and features of Windows 10 that mitigate threats
  • Insights into the security services bundled with Windows 10 latest edition
  • Knowledge of the supporting security external infrastructure
  • The new security baseline configurable using Group Policy Objects (GPO)

 

Go To Course

Windows Server 2016 Security Features

Windows Server 2016 provides layers of protection that help address both known and emerging threats. Learn how it actively contributes to securing your infrastructure so you can better safeguard against security breaches.

View More

Duration

10-20 Hours

Certification

Verified Certificate

What you'll learn

  • The current nature of the security threat landscape
  • New security architecture and features of Windows Server 2016 that mitigate threats
  • Insights into the security services bundled with Windows Server 2016 latest edition
  • Knowledge of the supporting security external infrastructure
  • Understanding of the new security features of Hyper-V
  • Learn about Desired State Configuration (DSC)

 

Go To Course

Microsoft Azure Security Services

Learn Azure security best practices and understand the terminology, tools, and techniques for creating a highly secure, resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune.

View More

Duration

8-16 Hours

Certification

Verified Certificate

What you'll learn

Understand and use of the additional security services offer in Azure and Intune
Understanding of the following:
  • Azure security architecture overview
  • Azure Networking Security
  • Network Security Groups
  • Secure Remote Access
  • Monitoring and threat detection
  • Reference architectures
  • Learn about IaaS workload security
  • Understand the features of Azure Security Center
  • Review how Azure deals with Distributed Denial of Services (DDoS) attacks
  • Examination of Azure Anti-malware
  • Understand Microsoft Intune for Windows , iOS, and Android devices
    • MDM
    • MAM
    • Data governance with GDPR
    • AutoPilot

 

Go To Course

Microsoft Professional Program for Cybersecurity – Part 2

View More

Type

Instructor led training

Duration

3 days

Cybersecurity part 2 Description

Module 3

Value Creating Consultant

In this module your candidates will learn the commercial and personal skills that will be invaluable when meeting customers and internal stakeholders and teammates as well.

View More

Type

Instructor led training

Duration

2 days

During the Value Creating Consultant module, your candidates will learn the most relevant and up to date best practice commercial insights, that will enable them to understand the business process mechanisms including: Buying processes, sales processes, how organizations buy etc. This insight will enable them to understand how businesses work, and they´ll learn the latest tools, methods and techniques that will support them when they interact with customers in their daily business. The course is highly interactive, with 40-50% of the time being spent on practical application and role playing, peer review etc.

 

Module 4

Microsoft Professional Capstone : Cybersecurity (Coming soon)

The Microsoft Professional Capstone in Cybersecurity provides a simulated environment at a fictitious company that you must protect by detecting and responding to a cyberthreat.

View More

Certification

Verified Certificate

Description coming soon

"Do not be so nervous to jump into it, it takes time and it is a long term investment in yourself, but it's worth it. I have unlimited opportunities in my career now, and the future looks very exciting."

a-solutions

Mads Svendsen - AX-consultant

"I think that the vast majority of higher education has processed data in databases or coded a bit, as part of their training, so the step to an IT career is probably less than you think."

KMD

Toke Fogh - IT-developer

"It simply builds a bridge between being a student and getting out into the labor market and start to contribute value to a business."

KMD

Thea Renneberg - IT-developer

Still looking?

Our facts

350+

Courses

With us you'll find 350+ accelerated course- and certification programmes and we can train talent in every single one. Whatever your chosen technology, we'll create your experts.

70%

Billable hours

Readynez candidates are quickly ready to deliver value. Within a year the candidates are, on average, billing 70% or more of their time to customers.

97%

Stay in their first job

We've currently recruited and trained more than 300 candidates and when we asked them after two years of employment, 97% of them had stayed on with the original employer.

Readynez uses cookies to improve your website experience. To learn more please read our policy.

Privacy policy OK