Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA CompTIA Security+ Amazon AWS Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Mindfulness Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Freelancing Online Business Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Cyber Security

MS Cybersecurity Pro Track: Enterprise Security Fundamentals

Introduction to Enterprise Security Fundamental Concepts (Network security, information security, OS security,etc)
Rating: 4.3 out of 54.3 (101 ratings)
15,314 students
Created by Cristian Calinescu
Last updated 12/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Describe the current cybersecurity landscape
  • Explain the Assume Compromise approach to security
  • Red team versus Blue team exercises
  • Red team kill chain, including: Reconnaissance Beachhead Persistence Lateral movement Elevation Exfiltration.
  • Blue team kill chain, including Gathering baseline data Detection Alerting Investigation Response Execution
  • Organizational preparation, security processes, and responses

Requirements

  • Basic experience with Windows Server administration, maintenance, and troubleshooting.
  • Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, and cloud services concepts.
  • Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy.

Description

This course is the first course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more.


In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros (the red team) attacks some part or parts of a company’s security infrastructure, and an opposing group (the blue team) defends against the attack. Both teams work to strengthen a company’s defenses. 

You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.

      You will also learn the fundamental aspects of security in an Enterprise and overall like : CIA Triad concept or Assume Breach philosophy.

You will have a Quiz at the end of each Section and a Final Exam, so you can test the knowledge that you have gained throughout the course.


What you'll learn ?

After completing this course, students will be able to:


Describe the current enterprise security landscape

Define the Assume Compromise approach

Practice Red team versus Blue team exercises

Develop organizational security preparation, processes, and responses

Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

Who this course is for:

  • Security Administrators
  • Security Analysts
  • System Administrator
  • Everyone who wants to learn about the current cybersecurity landscape and how to improve your organization's security posture

Course content

7 sections • 18 lectures • 4h 16m total length

  • Preview01:36
  • Preview06:33

  • Preview36:08
  • Assume Compromise Philosophy
    16:06
  • Cost of Breach
    11:58
  • Section 2 Quiz
    7 questions

  • Red Team versus Blue Team exercises
    09:18
  • The Attacker's Objective
    19:10
  • Red Team Kill Chain
    37:48
  • Document Vulnerabilities
    03:12
  • Section 3 Quiz
    8 questions

  • Blue Team
    06:35
  • Blue Team Kill Chain
    19:18
  • Restrict Privilege Escalation
    13:05
  • Restrict Lateral Movement
    11:32
  • Attack Detection
    23:47
  • Section 4 Quiz
    9 questions

  • Preview11:55
  • Organization Preparations
    13:22
  • Developing and Maintaining Policies
    15:10
  • Section 5 Quiz
    3 questions

  • Final Exam
    45 questions

  • Preview00:18

Instructor

Cristian Calinescu
Security Operations Manager&Senior Infrastructure Engineer
Cristian Calinescu
  • 4.2 Instructor Rating
  • 2,288 Reviews
  • 53,321 Students
  • 31 Courses

My name is Cristian Calinescu a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager.

My areas of expertise are:

-Microsoft Windows Server 2008 R2, 2012 R2, 2016, 2019

-Microsoft Active Directory, Azure Active Directory

-Microsoft Exchange (2003 - 2019)

-Virtualization (Hyper-V, VMWare)

-Linux OS

-Azure

-Skype for Business ( Lync unified messaging)

-SCCM: SCOM and SCVMM

- Powershell (including scripting)

-Bash

- Cyber Security

- Security tools (cloud based or on-premises)

I've been involved in various maintenance and/or implementation projects based on technologies mentioned above. I have also participated to network design and implementations projects as well as assisting customers migrating to the latest technologies.

I am certified on the following technologies:

- Microsoft Technology Associate: Windows Operating System Fundamentals

- Microsoft Technology Associate: Networking Fundamentals

- Microsoft Technology Associate: Windows Server® Administration Fundamentals

- Microsoft® Certified Solutions Associate: Windows 8 (MCSA)

- Microsoft® Certified Solutions Associate: Windows Server 2012 R2 / 2016 (MCSA)

- Server Virtualization with Windows Server Hyper-V and System Center (MCSA)

- Microsoft® Certified Solutions Expert: Cloud Platform and Infrastructure (MCSE)

- Comptia Security +

- Microsoft Cyber Security Professional

- Certified Ethical Hacker (CEH v10)

- Micrsosoft Certified Azure Solutions Architect Expert

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.