Aspire Journeys

Cyber Specialist to MS Security Operations Analyst

  • 43 Courses | 41h 51m 12s
  • 2 Labs | 1h
  • Includes Test Prep
Do you have a desire to specialize in Microsoft analytics? Learn how to detect, analyze, and respond to potential threats and then how to use them in Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. This journey will move you along a security analytics certification path to ultimately go after your MS Security Operations Analyst Associate certification. This journey includes: On-demand content, Instructor-led training, exam prep, live mentoring, and additional books/resources.

Cyber Architecture

In this track of the Cyber Specialist to MS Security Operations Analyst journey, the focus will be on designing and deploying a security architecture. You will learn how to integrate security policies across network, application, information, and access control architectures as well as cloud and hybrid cloud models. You will review and implement industry standard best practices and policies (NIST, etc.), along with standard architecture framework models.

This track includes instructor-led training and on-demand content.

  • 4 Courses | 3h 4m 24s

Cyber Architecture On Demand

In this track of the Cyber Specialist to MS Security Operations Analyst journey, tthe focus will be on designing and deploying a security architecture. You will learn how to integrate security policies across network, application, information, and access control architectures as well as cloud and hybrid cloud models. You will review and implement industry standard best practices and policies (NIST, etc.), along with standard architecture framework models.

This track includes on-demand content.

  • 6 Courses | 4h 58m 25s

Analyst Essentials

In this track of the Cyber Specialist to MS Security Operations Analyst journey, the focus will be on the most effective steps to prevent attacks and detect adversaries with actionable techniques. You will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations.

This track includes instructor-led training and on-demand content and a practice test.

  • 5 Courses | 4h 26m 49s

Analyst Essentials On Demand

In this track of the Cyber Specialist to MS Security Operations Analyst journey, the focus will be on the most effective steps to prevent attacks and detect adversaries with actionable techniques. You will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations.

This track includes on-demand content and a practice test.

  • 17 Courses | 17h 5m 3s

Security Operations Analyst

In this track of the Cyber Specialist to MS Security Operations Analyst journey, you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting.

This track includes instructor-led training, on-demand content, and a challenge.

  • 4 Courses | 4h 51m 37s
  • 1 Lab | 30m

Security Operations Analyst On Demand

In this track of the Cyber Specialist to MS Security Operations Analyst journey, you will learn how to mitigate cyberthreats using different security technologies.

This track includes on-demand content, and a challenge.

  • 7 Courses | 7h 24m 54s
  • 1 Lab | 30m

COURSES INCLUDED

Frameworks, Life Cycles, and Architecture
Organizations require people with the skills to make decisions to secure information systems based on best practices, standards, and industry recommendations. Security architects fill this need. In this course, you'll learn about common IT life cycles and life cycle management, including the system development and security life cycles. You'll explore the importance of frameworks, including enterprise architecture frameworks. You'll then examine various stakeholders and the roles they play in architecture development. Next, you'll learn about the need for and types of security policies. Finally, you'll explore aspects of secure network architecture design, including network segmentation and components, applying industry best practices, and team member roles and responsibilities.
12 videos | 43m has Assessment available Badge
Secure Application and Data Architecture Design
Security architects design and implement secure architectures and translate business processes and risk into policy and implementation rules. In this course, you'll explore designing secure application and data architectures. First, you'll examine the history of development, the role of the application architect, and application architecture goals. Next, you'll learn about disciplines related to application architecture, as well as Service-oriented Architecture and its standards. You'll move on to learn about modular framework development, authentication, patching, and vulnerability testing. Next, you'll examine data architecture, data classification, data privacy, and database security. Finally, you'll learn about encryption and big data, as well as data architecture analysis and influences.
20 videos | 55m has Assessment available Badge
Access Control and Security Architecture Design
In this course, you'll learn about designing a secure access control architecture and updating a security architecture. First, you'll explore identity and access management, including the IAAA process and related entities. You'll move on to examine access control policies and models. You'll learn about centralized access control, as well as distributed access control, federated identity management frameworks, and supporting protocols. You'll explore the importance of access reviews, as well as access control considerations with bring your own device and Internet of Things. Next, you'll examine the impact of change on a security architecture and steps involved in life cycle management. Finally, you'll complete this course by learning about architecture change considerations and the importance of a change management policy.
13 videos | 46m has Assessment available Badge
Security Architecture Documentation and Alternative Architectures
In this course, you'll learn about documentation requirements for a security architecture and alternate architectures. First, you'll explore the types of documentation required to guide an architecture. You'll examine input documentation, including business requirements and objectives, standards and best practices, and laws and regulations. Next, you'll learn about architecture documentation, including how and what to document. You'll examine output documentation as well, including policies, procedures, and guidelines. You'll learn about the Security Requirements Traceability Matrix, including required fields. Finally, you'll learn about virtualization and how to evaluate cloud and hybrid cloud solutions, focusing on factors like shared responsibility, encryption, and key management.
12 videos | 38m has Assessment available Badge

COURSES INCLUDED

Frameworks, Life Cycles, and Architecture
Organizations require people with the skills to make decisions to secure information systems based on best practices, standards, and industry recommendations. Security architects fill this need. In this course, you'll learn about common IT life cycles and life cycle management, including the system development and security life cycles. You'll explore the importance of frameworks, including enterprise architecture frameworks. You'll then examine various stakeholders and the roles they play in architecture development. Next, you'll learn about the need for and types of security policies. Finally, you'll explore aspects of secure network architecture design, including network segmentation and components, applying industry best practices, and team member roles and responsibilities.
12 videos | 43m has Assessment available Badge
Secure Application and Data Architecture Design
Security architects design and implement secure architectures and translate business processes and risk into policy and implementation rules. In this course, you'll explore designing secure application and data architectures. First, you'll examine the history of development, the role of the application architect, and application architecture goals. Next, you'll learn about disciplines related to application architecture, as well as Service-oriented Architecture and its standards. You'll move on to learn about modular framework development, authentication, patching, and vulnerability testing. Next, you'll examine data architecture, data classification, data privacy, and database security. Finally, you'll learn about encryption and big data, as well as data architecture analysis and influences.
20 videos | 55m has Assessment available Badge
Access Control and Security Architecture Design
In this course, you'll learn about designing a secure access control architecture and updating a security architecture. First, you'll explore identity and access management, including the IAAA process and related entities. You'll move on to examine access control policies and models. You'll learn about centralized access control, as well as distributed access control, federated identity management frameworks, and supporting protocols. You'll explore the importance of access reviews, as well as access control considerations with bring your own device and Internet of Things. Next, you'll examine the impact of change on a security architecture and steps involved in life cycle management. Finally, you'll complete this course by learning about architecture change considerations and the importance of a change management policy.
13 videos | 46m has Assessment available Badge
Security Architecture Documentation and Alternative Architectures
In this course, you'll learn about documentation requirements for a security architecture and alternate architectures. First, you'll explore the types of documentation required to guide an architecture. You'll examine input documentation, including business requirements and objectives, standards and best practices, and laws and regulations. Next, you'll learn about architecture documentation, including how and what to document. You'll examine output documentation as well, including policies, procedures, and guidelines. You'll learn about the Security Requirements Traceability Matrix, including required fields. Finally, you'll learn about virtualization and how to evaluate cloud and hybrid cloud solutions, focusing on factors like shared responsibility, encryption, and key management.
12 videos | 38m has Assessment available Badge
Cybersecurity and Networking Fundamentals
The goal of cybersecurity is to protect systems, networks, data, and programs from digital attacks. As cyber-attacks continue to increase in frequency and sophistication, it is imperative that cybersecurity professionals learn how to quickly identify and mitigate vulnerabilities. In this course, you will learn common security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures. Discover the fundamentals of the confidentiality, integrity, and availability (CIA) triad, and explore the five elements of the AAA framework; identification, authentication, authorization, auditing, and accountability. You'll then explore risk considerations and management strategies, and discover how risks can be mitigated, accepted, transferred, and rejected. Lastly, explore core networking components and discover how information flow models are used to prevent unauthorized information flow in any direction. This course was originally created by Global Knowledge (GK).
13 videos | 42m has Assessment available Badge
Getting Started with Security Architecture
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).
19 videos | 1h 11m has Assessment available Badge

COURSES INCLUDED

Introduction to Networking
The fundamental components and concepts that comprise networking represent a collection of technology and resources used to deliver a single web page or fuel an entire enterprise. In this course, you'll explore the fundamentals of networking technology, beginning with the building blocks of networking, the various devices that can be connected to networks, and the basics of network infrastructure. You'll go onto discover the role of media in networking, the purpose of switches, access points, and routers, network services, types, and topologies. Finally, you'll learn about peer-to-peer and client-server networking, virtual computing, and cloud computing. This course was originally created by Global Knowledge (GK).
18 videos | 40m has Assessment available Badge
Network Hardening, Network Segmentation, and Secure Connections
Network hardening can help identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. In this course, you'll learn how to secure administrative and remote access connections. You'll discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls, and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points. This course was originally created by Global Knowledge (GK).
27 videos | 1h has Assessment available Badge
Fundamentals of Malware Analysis and Remediation
Malware is any software with the intention to wreak destruction or gain access to sensitive information. Malware is often used as a blanket term for common computer worms, viruses, and trojans. In this course, you'll learn how to protect systems from malware by implementing and managing anti-malware software. Explore different malware infection methods and learn how to differentiate between different types of malware. Explore how viruses can attach themselves to system applications and learn about common virus threats. Discover how to differentiate between worms, trojans, rootkits, and bots, and explore how spyware and adware spyware can be embedded into applications that look free and interesting to use. Lastly, explore how ransomware works and discover countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activity. This course was originally created by Global Knowledge (GK).
23 videos | 56m has Assessment available Badge
Social Engineering Threats and Prevention
Social engineering is a form of attack that is accomplished using malicious activities through human interactions. In a common social engineering attack, humans are tricked into making security mistakes or giving away sensitive information. In this course, you'll explore the goals of social engineering including gaining access to sensitive data, physical locations, and systems. Discover vulnerabilities that make social engineering possible, explore common targets, and learn about indirect and direct social engineering attacks. Explore how searching a person or business's trash can produce information that can be used to carry out an attack, and discover the importance of staying up to date with the latest social engineering stats and trends. Explore the importance of cyber awareness and reporting workplace abnormalities, and discover the various social media site types including social networks, video sharing, blogging, and photo sharing. Lastly, explore factors that drive people to post compromising material on social media. This course was originally created by Global Knowledge (GK).
27 videos | 1h 2m has Assessment available Badge
Physical Security, Safety Procedures, and Access Control
Physical security measures can help organizations protect personnel, hardware, software, and data from physical actions and events that could result in unauthorized or unwanted disclosure or theft of property. In this course, you'll learn how defense-in-depth solutions can provide multiple layers of security as well as the various types of physical security controls. Explore the importance of surge protectors, uninterrupted power supplies (UPS), and power generators, and discover how device security concerns should encompass all company-owned equipment. Discover why non-disclosure agreements (NDA) should be used in locations where proprietary information may be accessible to employees, vendors, or visitors, and explore how background checks should be an essential part of security management. Lastly, explore the importance of ensuring the correct level of security access levels. This course was originally created by Global Knowledge (GK).
18 videos | 47m has Assessment available Badge

COURSES INCLUDED

Introduction to Networking
The fundamental components and concepts that comprise networking represent a collection of technology and resources used to deliver a single web page or fuel an entire enterprise. In this course, you'll explore the fundamentals of networking technology, beginning with the building blocks of networking, the various devices that can be connected to networks, and the basics of network infrastructure. You'll go onto discover the role of media in networking, the purpose of switches, access points, and routers, network services, types, and topologies. Finally, you'll learn about peer-to-peer and client-server networking, virtual computing, and cloud computing. This course was originally created by Global Knowledge (GK).
18 videos | 40m has Assessment available Badge
Cybersecurity Awareness and Threat Vectors
Cybersecurity is often defined as the protection of computer systems and networks from unauthorized or unwanted information disclosure, theft or damage. In this course, explore the potential impacts of a personal or business security breach, and discover the fundamentals of the confidentiality, integrity, and availability triad. Explore how baselining can be used to better understand an IT environment and learn to differentiate between natural, malicious human, chemical, and non-malicious threats. Explore security concerns as they relate to internal and external human activity, and discover how to identify drivers for security controls. Explore common functions and purposes of security controls and discover the importance of testing corrective controls in place. Lastly, explore how to differentiate between quantitative and qualitative risk analysis, as well as between data in motion and data at rest. This course was originally created by Global Knowledge (GK).
20 videos | 42m has Assessment available Badge
Network Discovery Tools and Techniques
Network discovery is the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network. In this course, you'll learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Explore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and SuperScan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database. This course was originally created by Global Knowledge (GK).
21 videos | 1h 1m has Assessment available Badge
Systems Hardening
Security hardening is the process of securing systems and networks by reducing the surface of vulnerability. In this course, you'll learn the types of systems that can be hardened as well as how security baselines can be used to define normal conditions on a network. Explore how Group Policy can be used to apply computer settings to numerous systems at once, and discover the benefits of performing ongoing security patching. Explore steps used to harden systems by role including: client, server, database, web server, FTP, DNS, DHCP, network, and mobile devices. Lastly, learn how to differentiate between free and commercial hardening tools, recognize steps to properly implement authentication, authorization, and accounting, and implement physical security to contribute to overall security stability. This course was originally created by Global Knowledge (GK).
24 videos | 1h 4m has Assessment available Badge
Getting Started with Security Architecture
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).
19 videos | 1h 11m has Assessment available Badge
Securing Information using Cryptography
Cryptography is a process used to keep information secret and safe by transforming it into an unrecognizable form that unwanted and unintended recipients cannot understand. In this course, you'll explore how cryptography can be used for confidentiality and integrity. Discover when to use symmetric and asymmetric encryption and discover the advantages and disadvantages of both. Explore practical use cases for cryptography and explore how hashing can be used to ensure data integrity. Discover how digital signatures can provide message integrity, authenticity, and non-repudiation and learn how to implement digital signatures. Discover how to differentiate between rights and permissions and explore access control methods such as discretionary access control, mandatory access control, and role-based access control. Lastly, explore how steganography can be used to hide secret information in or on another object, and how digital rights management (DRM) tools can be used to control access to protected data. This course was originally created by Global Knowledge (GK).
25 videos | 1h 20m has Assessment available Badge
Public Key Infrastructure and Certificate Distribution
Public-key infrastructure (PKI) is the framework of encryption and cybersecurity used to safely distribute, verify and revoke certificates in an organization and manage public-key encryption. In this course, you will learn the fundamentals of PKI and explore considerations when implementing trust structures through technology and public key-based digital certificates. Explore PKI components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templates, and discover how certificate authorities (CA) are used to issue certificates to entities and manage trust relationships. Discover how to differentiate between root and subordinate CAs as well as internal and external PKIs, and explore public key certificates and how they can represent the digital identity of the subject. Lastly, explore common certificate acquisition methods including web, auto-enrollment, MMCs, and native consoles, and explore use cases for common access cards (CAC). This course was originally created by Global Knowledge (GK).
17 videos | 53m has Assessment available Badge
Identity Management, Directory Services, and Federation
Identity management is a framework used to ensure appropriate access controls are in place to grant authenticated users access to enterprise assets. In this course, you will learn about the key fundamentals of identity management, including privilege administration, access control, and system scalability. Explore identification, authentication, authorization, accountability (IAAA) services and discover how personally identifiable information (PII) can be used to identify a subject. Explore the three main types of authentication factors: something you know, something you have, and something you are, and discover how to choose appropriate and accurate biometric criteria. You'll also learn about directory services and how they can be used to organize network resources. Explore password cracking techniques and tools, and discover when to use same sign-on and single sign-on authentication schemes. Lastly, explore how federation can be used to link together different authentication systems. This course was originally created by Global Knowledge (GK).
27 videos | 1h 19m has Assessment available Badge
Network Hardening, Network Segmentation, and Secure Connections
Network hardening can help identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. In this course, you'll learn how to secure administrative and remote access connections. You'll discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls, and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points. This course was originally created by Global Knowledge (GK).
27 videos | 1h has Assessment available Badge
Fundamentals of Malware Analysis and Remediation
Malware is any software with the intention to wreak destruction or gain access to sensitive information. Malware is often used as a blanket term for common computer worms, viruses, and trojans. In this course, you'll learn how to protect systems from malware by implementing and managing anti-malware software. Explore different malware infection methods and learn how to differentiate between different types of malware. Explore how viruses can attach themselves to system applications and learn about common virus threats. Discover how to differentiate between worms, trojans, rootkits, and bots, and explore how spyware and adware spyware can be embedded into applications that look free and interesting to use. Lastly, explore how ransomware works and discover countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activity. This course was originally created by Global Knowledge (GK).
23 videos | 56m has Assessment available Badge
Social Engineering Threats and Prevention
Social engineering is a form of attack that is accomplished using malicious activities through human interactions. In a common social engineering attack, humans are tricked into making security mistakes or giving away sensitive information. In this course, you'll explore the goals of social engineering including gaining access to sensitive data, physical locations, and systems. Discover vulnerabilities that make social engineering possible, explore common targets, and learn about indirect and direct social engineering attacks. Explore how searching a person or business's trash can produce information that can be used to carry out an attack, and discover the importance of staying up to date with the latest social engineering stats and trends. Explore the importance of cyber awareness and reporting workplace abnormalities, and discover the various social media site types including social networks, video sharing, blogging, and photo sharing. Lastly, explore factors that drive people to post compromising material on social media. This course was originally created by Global Knowledge (GK).
27 videos | 1h 2m has Assessment available Badge
Software Engineering, Security and Vulnerabilities
The principles of software engineering include designing, developing, implementing, and maintaining a software solution. One crucial aspect of software security is to determine if software is safe to release to an organization or public. In this course, you'll explore the Software Development Life Cycle (SDLC) and learn about maturity levels used to define agility and effectiveness of a development solution. Discover how security guidelines can help improve the quality and security of a software development, and explore the importance of staying current with the types and trends of software threats and exploits. Continue to learn about software vulnerabilities while exploring common attacks including buffer overflows, database injection, cross-site scripting, and directory traversal attacks. Lastly, explore how misconfiguration of servers increases the likelihood of attacks, and discover how permissions are used to secure directories used by applications. This course was originally created by Global Knowledge (GK).
15 videos | 57m has Assessment available Badge
Environment Monitoring, Retention, and Data Logging
Logging is used to record events that occur within an organization's systems and networks. Oftentimes, logging information can help with the identification and isolation of any intruder or malware. In this course, explore acceptable use policies (AUP) and how they apply to employee monitoring. Discover how monitoring as a service can benefit an organization, and explore devices that can be monitored on a network including routers, switches, laptops, and wireless access points. Explore how retention policies can identify how long different types of data are maintained and discover when to implement a centralized enterprise logging service. Lastly, explore how keystroke loggers can capture and track what is typed on a keyboard and learn the importance of protecting log information. This course was originally created by Global Knowledge (GK).
23 videos | 52m has Assessment available Badge
Physical Security, Safety Procedures, and Access Control
Physical security measures can help organizations protect personnel, hardware, software, and data from physical actions and events that could result in unauthorized or unwanted disclosure or theft of property. In this course, you'll learn how defense-in-depth solutions can provide multiple layers of security as well as the various types of physical security controls. Explore the importance of surge protectors, uninterrupted power supplies (UPS), and power generators, and discover how device security concerns should encompass all company-owned equipment. Discover why non-disclosure agreements (NDA) should be used in locations where proprietary information may be accessible to employees, vendors, or visitors, and explore how background checks should be an essential part of security management. Lastly, explore the importance of ensuring the correct level of security access levels. This course was originally created by Global Knowledge (GK).
18 videos | 47m has Assessment available Badge
Incident Response, Backup and Recovery Strategies, and Documentation
It is imperative that organizations outline instructions to help IT staff identify, respond, and recover from network security incidents. By doing so, organizations can quickly recover from cybercrime events potentially resulting in data loss and service outages. In this course, you'll explore common disaster types, including natural disasters and malicious human actions that threaten organizations. Discover business continuity and disaster recovery planning goals, resources, and concepts. Discover how operational recovery planning can help ensure businesses resume day to day operations in a timely manner, as well as the importance of planning for user recovery. You'll also learn about backup technologies and strategies, and discover the importance of proper documentation. Lastly, explore how to prepare for incident responses and learn about reporting incidents and legal considerations. This course was originally created by Global Knowledge (GK).
41 videos | 1h 34m has Assessment available Badge
Legal Considerations and Cybercrime Investigations
Cybercrime laws apply to incidents in which a crime was directed at a computer, or crimes committed using a computer. In this course, you'll explore aspects of service-level agreements (SLA) and privacy-level agreements (PLA), and discover considerations when dealing with international regulatory compliance. You'll also learn how cybercrime intersects with different legal fields including intellectual property, privacy laws, jurisdiction, criminal, and civil, and explore methods in which to investigate cybercrime activity. Explore key considerations when dealing with criminal, civil law, and administrative laws, and learn to differentiate between civil, common, statutory, and religious legal systems. Lastly, explore tools used to perform a cybercrime investigation, and discover cybercrime investigative best practices, including how to notify management and protect the crime scene. This course was originally created by Global Knowledge (GK).
22 videos | 55m has Assessment available Badge
Trends in Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from cyber threats and exploits. Therefore, organizations are required to allocate a growing number of resources to protect their data from unwanted and unauthorized data breaches and disclosures. In this course, you'll explore the possible constraints that may prevent an organization from having an ideal IT security solution including budget, regulations, design limitations, and political issues. Discover driving forces in cybersecurity including money, mobile devices, education, and new technologies, and explore the risks associated with portable electronic devices (PED) such as geolocations. Explore how supervisory control and data acquisition (SCADA) systems can be used to monitor important infrastructure including electric grids, water supplies, and pipelines, and discover how most people now use the Internet daily to send email, shop, and watch TV. Lastly, discover how cybersecurity and IT standards continue to evolve and how no one standard is foolproof or future proof. This course was originally created by Global Knowledge (GK).
18 videos | 45m has Assessment available Badge

COURSES INCLUDED

Microsoft 365 Fundamentals: Protecting Your Information
In this 18-video course, learners can explain security with Microsoft 365 business, including identity protection and management and protecting one's information with Microsoft 365. Specific topics covered in the course include identity protection, document safety, network security and device security. You will learn about other key topics, such as on-premises identity protection, cloud identity protection, hybrid identity protection, and multifactor authentication. Then explore key elements of Azure information protection, and how to prepare for and enable multifactor authentication. Finally, listen to a discussion of Windows analytics tools and watch demonstrations of how to add them in the Azure portal. The concluding exercise asks learners to describe information protection features; explain three principles of Microsoft 365 Threat Protection; list tools used in Microsoft 365 Threat Protection and three principles of security management; and to explain three choices for cloud authentication and explain how users interact with Azure Information Protection. This course can be used as part of preparations for the Microsoft 365 Fundamentals (MS-900) exam.
18 videos | 51m has Assessment available Badge
Microsoft 365 Mobility & Security: Windows Defender Threat Protection
Learners discover features of the Windows Defender Advanced Threat Protection (ATP) security platform while preparing for the MS-101: Microsoft 365 Mobility and Security exam. Key concepts covered in this 13-video course include dealing with malware by using Windows Defender ATP, a comprehensive security platform designed to help prevent attacks, detect them, if or when they occur; approaches for reducing the attack surface; and how to configure features and settings provided by Windows Defender Antivirus. Next, learn how to use Group Policy settings to configure and manage Windows Defender Antivirus; manage antivirus updates and apply baselines; use Microsoft Safety Scanner; and describe benefits of threat analytics. Learners see how to configure Windows Defender Security Center settings and configure Windows Defender roles and machine groups. Then learn about adding onboard systems into Defender Security Center; provide an overview of Windows Defender Exploit Guard; and configure antivirus settings. Finally, use Group Policy settings to configure and manage Windows Defender Antivirus; use the Microsoft Safety Scanner; configure Windows Defender Security Center settings; and configure Windows Defender permissions.
13 videos | 1h 10m has Assessment available Badge
Microsoft 365 Mobility & Security: Threat Management
Explore various threat protection tools and techniques for detecting and preventing cyber attacks and security breaches in this 18-video course, which examines spoofing, malware, spam, encryption, and unauthorized access to data, while helping prepare learners for MS-101: Microsoft 365 Mobility and Security exam. Key concepts covered here include malware solutions, such as quarantine and analysis; zero-day protection solutions, such as auto purge, safe attachments, and safe links; and anti-phishing techniques such as spoof intelligence. Study anti-spam protection solutions; explore encryption options and settings; and learn how privileged access management protects organizations. Next, examine ATP features; access and examine default ATP policies; learn advanced threat analytics (ATA) features; and monitor ATA incidents. Learners explore Azure ATP options and settings; how to monitor for threats in organizations; and how to configure custom ATP policies and configure advanced audit policy checks. Finally, learn to run simulated attacks to detect vulnerabilities and monitor current global threats; access and examine ATP default policies; configure custom ATP policies and the Azure ATP Advanced Audit Policy Check feature; and perform simulated attacks.
18 videos | 1h 38m has Assessment available Badge
Microsoft 365 Mobility & Security: Azure Information Protection
Azure Information Protection (AIP) is a cloud-based solution that helps secure and protect sensitive data. As learners prepare for the MS-101: Microsoft 365 Mobility and Security exam, they can explore planning, deploying, and managing AIP in this 14-video course. Key concepts covered here include how to plan an AIP deployment with different approaches by using classification, labeling and protection, and data protection only; implementing Azure Information Protection; and deploying and monitoring the Azure Rights Management Connector. Next, learn how to configure super users for Azure Rights Management; deploy AIP clients; configure AIP labels; and learn how to use AIP policies and work default policies that exist. You will learn how to plan and implement an Azure Information Protection tenant key; demonstrate how to use AIP to protect enterprise data; collect WIP audit event logs; and manage AIP activation status. Finally, the course demonstrates how to deploy and monitor Azure Rights Management Connector; configure super users for Azure Rights Management; use labels and policies; and use AIP to protect enterprise data.
14 videos | 1h 11m has Assessment available Badge

COURSES INCLUDED

Microsoft 365 Fundamentals: Protecting Your Information
In this 18-video course, learners can explain security with Microsoft 365 business, including identity protection and management and protecting one's information with Microsoft 365. Specific topics covered in the course include identity protection, document safety, network security and device security. You will learn about other key topics, such as on-premises identity protection, cloud identity protection, hybrid identity protection, and multifactor authentication. Then explore key elements of Azure information protection, and how to prepare for and enable multifactor authentication. Finally, listen to a discussion of Windows analytics tools and watch demonstrations of how to add them in the Azure portal. The concluding exercise asks learners to describe information protection features; explain three principles of Microsoft 365 Threat Protection; list tools used in Microsoft 365 Threat Protection and three principles of security management; and to explain three choices for cloud authentication and explain how users interact with Azure Information Protection. This course can be used as part of preparations for the Microsoft 365 Fundamentals (MS-900) exam.
18 videos | 51m has Assessment available Badge
Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
Learners can explore the fundamental key features in Microsoft 365 of Enterprise Mobility + Security, Microsoft's Global Data Centers. Cloud App Security, and the security and reporting features found in the Office 365 Security & Compliance Center, in this 16-video course. Other key topics covered in the course include Microsoft Enterprise Mobility + Security's purpose and how it enables organizations to utilize mobile devices in a protected environment; Azure Information Protection, which classifies and protects data in the cloud; Azure Advanced Threat Protection, which detects suspicious behavior; and Microsoft's Advanced Threat Analytics, which protects in-house networks from attacks. Learn more about the concepts of mobility and adoption. A concluding exercise directs learners to describe trust relationship mechanisms; describe the two core functions of Microsoft Intune; explain how MDM (mobile device management) provides access control; describe device availability in MDM versus Intune and describe the controls of Microsoft's global data centers. The course can be used to prepare for the Microsoft 365 Fundamentals (MS-900) exam.
16 videos | 46m has Assessment available Badge
Microsoft 365 Mobility & Security: Windows Defender Threat Protection
Learners discover features of the Windows Defender Advanced Threat Protection (ATP) security platform while preparing for the MS-101: Microsoft 365 Mobility and Security exam. Key concepts covered in this 13-video course include dealing with malware by using Windows Defender ATP, a comprehensive security platform designed to help prevent attacks, detect them, if or when they occur; approaches for reducing the attack surface; and how to configure features and settings provided by Windows Defender Antivirus. Next, learn how to use Group Policy settings to configure and manage Windows Defender Antivirus; manage antivirus updates and apply baselines; use Microsoft Safety Scanner; and describe benefits of threat analytics. Learners see how to configure Windows Defender Security Center settings and configure Windows Defender roles and machine groups. Then learn about adding onboard systems into Defender Security Center; provide an overview of Windows Defender Exploit Guard; and configure antivirus settings. Finally, use Group Policy settings to configure and manage Windows Defender Antivirus; use the Microsoft Safety Scanner; configure Windows Defender Security Center settings; and configure Windows Defender permissions.
13 videos | 1h 10m has Assessment available Badge
Microsoft 365 Mobility & Security: Threat Management
Explore various threat protection tools and techniques for detecting and preventing cyber attacks and security breaches in this 18-video course, which examines spoofing, malware, spam, encryption, and unauthorized access to data, while helping prepare learners for MS-101: Microsoft 365 Mobility and Security exam. Key concepts covered here include malware solutions, such as quarantine and analysis; zero-day protection solutions, such as auto purge, safe attachments, and safe links; and anti-phishing techniques such as spoof intelligence. Study anti-spam protection solutions; explore encryption options and settings; and learn how privileged access management protects organizations. Next, examine ATP features; access and examine default ATP policies; learn advanced threat analytics (ATA) features; and monitor ATA incidents. Learners explore Azure ATP options and settings; how to monitor for threats in organizations; and how to configure custom ATP policies and configure advanced audit policy checks. Finally, learn to run simulated attacks to detect vulnerabilities and monitor current global threats; access and examine ATP default policies; configure custom ATP policies and the Azure ATP Advanced Audit Policy Check feature; and perform simulated attacks.
18 videos | 1h 38m has Assessment available Badge
Microsoft 365 Mobility & Security: Security Reports & Alerts
There are numerous security reporting and alerting features when discussing Microsoft 365. Learners will discover how to create and manage both security and Azure Identity Protection alerts, while preparing for the MS-101: Microsoft 365 Mobility and Security exam. The key concepts covered in this 11-video course include the service assurance feature. which is available in the Security and Compliance center; features of the Service Assurance Dashboard and how to add users to access the information; and identity protection capabilities and the Azure AD Identity Protection directory roles. Next, you will learn the benefits of the Azure AD Identity Protection dashboard and investigate events by using the dashboard; create and manage alerts by using the dashboard; access and manage Microsoft 365 alerts and advanced alerts; and access and use the Service Assurance dashboard and Identity Protection dashboard. Finally, investigate Identity Protection events, view and manage alerts, and create and configure a new alert policy and learn about preset default alert policies.
11 videos | 52m has Assessment available Badge
Microsoft 365 Mobility & Security: Data Loss Prevention
Examine how to create and manage Data Loss Prevention (DLP) policies to help protect sensitive information, and comply with business standards and industry regulations, as you prepare for the MS-101: Microsoft 365 Mobility and Security exam. Key concepts covered in this 10-video course include an overview of DLP policies and details of what a DLP policy contains; how DLP policies are prioritized as data loss prevention rules; and how to access DLP policy templates and configure data loss prevention policies by using the pre-configured templates. Next, learn how to configure a custom DLP policy; learn the details of how DLP conditions and exceptions work; and learn how to access DLP reports to view DLP policy matches and incidents. Learners can explore properties and permissions for DLP reports; receive an overview of retention policies; and access DLP policy templates. Finally, see how to configure a custom DLP policy and an exception in a DLP policy, and access DLP reports to identify policy matches and incidents.
10 videos | 54m has Assessment available Badge
Microsoft 365 Mobility & Security: Azure Information Protection
Azure Information Protection (AIP) is a cloud-based solution that helps secure and protect sensitive data. As learners prepare for the MS-101: Microsoft 365 Mobility and Security exam, they can explore planning, deploying, and managing AIP in this 14-video course. Key concepts covered here include how to plan an AIP deployment with different approaches by using classification, labeling and protection, and data protection only; implementing Azure Information Protection; and deploying and monitoring the Azure Rights Management Connector. Next, learn how to configure super users for Azure Rights Management; deploy AIP clients; configure AIP labels; and learn how to use AIP policies and work default policies that exist. You will learn how to plan and implement an Azure Information Protection tenant key; demonstrate how to use AIP to protect enterprise data; collect WIP audit event logs; and manage AIP activation status. Finally, the course demonstrates how to deploy and monitor Azure Rights Management Connector; configure super users for Azure Rights Management; use labels and policies; and use AIP to protect enterprise data.
14 videos | 1h 11m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)