Program

Readynez Talent: Microsoft Professional Program for Cybersecurity

Om Talent

Smarta investeringar i människor och färdigheter kommer att förstärka din verksamhet och göra det möjligt för dig att uppnå vad som helst. Forma din framtid och täpp igen era mest komplexa kunskapsluckor med hjälp av en fokuserad lösning och ett omfattande utbildningsprogram för kandidater som kommer att vända spelet till er fördel. Se hur.

Kom vidare

Jag är en framåtdrivande ledare som söker en talangfull kandidat

Jag är en ambitiös kandidat som söker ett spännande jobb

Programöversikt

Utbildningsprogram

Readynez Talent: Microsoft Professional Program for Cybersecurity

Pris

SEK 77 900 EX VAT

Längd

3-5 months

Kurser

  • Microsoft Professional Program for Cybersecurity – Part 1
  • Microsoft Professional Program for Cybersecurity – Part 2
  • Value Creating Consultant

Program Overview

Cybersecurity threats are on the rise and now more than ever businesses need skilled team members to help prevent and mitigate breaches. This 10-course program will help you identify threats early on and minimize breach impacts.

Module 1

Enterprise Security Fundamentals

Learn to describe the current enterprise security landscape, define the Assume Compromise approach, practice red team versus blue team exercises, and develop organizational security preparation, processes, and responses.

Se mer

Längd

8-16 Hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Describe the current enterprise security landscape
  • Define the Assume Compromise approach
  • Practice Red team versus Blue team exercises
  • Develop organizational security preparation, processes, and responses

 

Go To course

Threat Detection: Planning for a Secure Enterprise

This course provides an overview of threat detection as part of a defense-in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.

Se mer

Längd

8-16 hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Describe signature-based and behavioral / heuristic detection methods
  • List the capabilities of on-premise threat detection and mitigation tools
  • Name the capabilities of hybrid and cloud threat detection and mitigation tools
  • Recognize the importance of Enterprise threat detection monitoring

 

Go To COurse

Planning a Security Incident Response

Learn to manage an enterprise security incident while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

Se mer

Längd

8-16 hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Effectively prioritize the response to a security incident
  • Build a computer security incident response team (CSIRT)
  • Develop an incident response action plan
  • List appropriate post-incident activities

 

Go To COurse

PowerShell Security Best Practices

Use PowerShell to enhance security and remediate new threats and exploits. Explore the functionality of administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) for configuring and securing servers

Se mer

Längd

8-16 Hours

Certification

Verified Certificate

What you'll learn

After completing this course, students will be able to:
  • Understand the architecture of Powershell
  • Deploy Powershell operational security
  • Analyze PowerShell Auditing and Logging
  • Enhance server management with Desired State Configuration and Just Enough Administration.
  • Analyze and debug scripts
  • Understand Powershell based exploits and their remediation.

 

Go To Course

Managing Identity

Based on real-world experience from Microsoft incident response teams, this course takes a hands-on approach to identity management. You will create a bastion host, configure Privileged Access Management, set up Microsoft Identity Manager, and more.

Se mer

Längd

8-12

Certification

Verified Certificate

What you'll learn

  • How identity is the new control plane, the perimeter that is replacing the firewall.
  • The recommended steps to secure Active Directory.
  • Azure Security Architecture and the Identity Federation and access solutions supported by Azure architecture.
  • How Kerberos and Privilege Attribute Certification function.

 

Go To Course

Microsoft Professional Program for Cybersecurity – Part 1

Type

Instructor led training

Längd

3 dagar

Module 2

Secure and Protect Data

More options available

View Options

Option 1

Security in Office 365

Review the different types of threats that can target your organization and learn how to implement and manage Office 365 security features like Advanced Threat Protection, Threat Intelligence, and Advanced Security Management.

Go To Course

Option 2

Securing Data in Azure and SQL Server

Learn how to secure data in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases. Join the experts for a look at user authentication, who the users are, authorization and what they are allowed to do. Topics include: Authenticating Users and Connections, Authorizing Users to Access Resources, Auditing Access to Data, and Encrypting Data.

Go To Course

Option 3

Microsoft SharePoint 2016: Authentication and Security

Learn how to plan and configure a SharePoint on-premises solution to help protect the environment. The course examines the necessary hardware and software requirements and the overall methodology to SharePoint security.

Go to Course

Type

Online Course

Längd

10-20 Hours

Certification

Verified Certificate

Type

Online Course

Längd

8-12 Hours

Certification

Verified Certificate

Type

Online Course

Längd

27-45 Hours

Certification

Verified Certificate

Windows 10 Security Features

Stay ahead of the security curve—learn about the continually evolving security features of the Windows 10 operating system. With a team of Microsoft security engineers, discover how to deploy its advanced capabilities.

Se mer

Längd

8-16 Hours

Certification

Cerified Certificate

What you'll learn

  • The current nature of the security threat landscape
  • The new security architecture and features of Windows 10 that mitigate threats
  • Insights into the security services bundled with Windows 10 latest edition
  • Knowledge of the supporting security external infrastructure
  • The new security baseline configurable using Group Policy Objects (GPO)

 

Go To Course

Windows Server 2016 Security Features

Windows Server 2016 provides layers of protection that help address both known and emerging threats. Learn how it actively contributes to securing your infrastructure so you can better safeguard against security breaches.

Se mer

Längd

10-20 Hours

Certification

Verified Certificate

What you'll learn

  • The current nature of the security threat landscape
  • New security architecture and features of Windows Server 2016 that mitigate threats
  • Insights into the security services bundled with Windows Server 2016 latest edition
  • Knowledge of the supporting security external infrastructure
  • Understanding of the new security features of Hyper-V
  • Learn about Desired State Configuration (DSC)

 

Go To Course

Microsoft Azure Security Services

Learn Azure security best practices and understand the terminology, tools, and techniques for creating a highly secure, resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune.

Se mer

Längd

8-16 Hours

Certification

Verified Certificate

What you'll learn

Understand and use of the additional security services offer in Azure and Intune
Understanding of the following:
  • Azure security architecture overview
  • Azure Networking Security
  • Network Security Groups
  • Secure Remote Access
  • Monitoring and threat detection
  • Reference architectures
  • Learn about IaaS workload security
  • Understand the features of Azure Security Center
  • Review how Azure deals with Distributed Denial of Services (DDoS) attacks
  • Examination of Azure Anti-malware
  • Understand Microsoft Intune for Windows , iOS, and Android devices
    • MDM
    • MAM
    • Data governance with GDPR
    • AutoPilot

 

Go To Course

Microsoft Professional Program for Cybersecurity – Part 2

Type

Instructor led training

Längd

3 dagar

Module 3

Value Creating Consultant

In this module your candidates will learn the commercial and personal skills that will be invaluable when meeting customers and internal stakeholders and teammates as well.

Type

Instructor led training

Längd

2 dagar

Module 4

Microsoft Professional Capstone : Cybersecurity (Coming soon)

The Microsoft Professional Capstone in Cybersecurity provides a simulated environment at a fictitious company that you must protect by detecting and responding to a cyberthreat.

Se mer

Certification

Verified Certificate

Description coming soon

"Jag tror de flesta med högre utbildning har processat data i databaser eller kodat som en del av sin utbildning så steget till en IT-karriär är troligen mindre än man tror."

KMD

Toke Fogh - IT-utvecklare

"Det bygger helt enkelt en bro mellan att vara en student och att komma ut på arbetsmarknaden och addera värde till en verksamhet."

KMD

Thea Renneberg - IT-utvecklare

Letar du fortfarande?

Our facts

350+

Courses

With us you'll find 350+ accelerated course- and certification programmes and we can train talent in every single one. Whatever your chosen technology, we'll create your experts.

70%

Billable hours

Readynez candidates are quickly ready to deliver value. Within a year the candidates are, on average, billing 70% or more of their time to customers.

97%

Stay in their first job

We've currently recruited and trained more than 300 candidates and when we asked them after two years of employment, 97% of them had stayed on with the original employer.

Readynez använder cookies för att förbättra din upplevelse av vår hemsida. Vill du veta mer vänligen läs vår integritetspolicy.

Integritetspolicy OK