All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 6 Days!

Browse Library

Get Unlimited Learning Access
$29
6 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • Play & Pause Course Viewing
  • Attend weekly live webinar
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Cancel Anytime
$29
  • Describe the current cybersecurity landscape
  • Explain the Assume Compromise approach to security
  • Red team versus Blue team exercises
  • Red team kill chain, including: Reconnaissance Beachhead Persistence Lateral movement Elevation Exfiltration.
  • Blue team kill chain, including Gathering baseline data Detection Alerting Investigation Response Execution
  • Organizational preparation, security processes, and responses

This course is part of a series of 9 courses which address all aspects to become a Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the first course from a series of 9 courses which will be released in the next months, as follows:

  • Cyber Security Fundamentals 2019 (Introduction to Cybersecurity)

     

  • Threat Detection ( Detect security breaches early - explore the capabilities of Microsoft's threat detection and mitigation tools - including hands on Lab)

     

  • Powershell Security ( Learn how to use Powershell to enhance security and remediate new threats. Learn how to implement and use Desired State Configuration (DSC), Just Enough Administration (JEA) and many more - including hands on Lab)

     

  • Manage Identity  (Learn the industry's best practices in regards to managing identity and especially privileged identities. This course takes a hands-on approach to identity management. You will create a bastion host, configure Privileged Access Management, set up Microsoft Identity Manager PAM, and more - including hands on Lab)

     

  • Office 365 Security ( Review the different types of threats that can target your organization and learn how to implement and manage Office 365 security features like Advanced Threat Protection, Threat Intelligence, and Advanced Security Management)

     

  • Securing Windows 10 Operating System ( Learn about the continually evolving security features of the Windows 10 operating system. Discover how to deploy its advanced capabilities - including hands on Lab)

     

  • Windows Server 2016 Security Features ( Windows Server 2016 provides layers of protection that help address both known and emerging threats. This course addresses how to implement and leverage all these security features. Learn how it actively contributes to securing your infrastructure so you can better safeguard against security breaches - including hands on Lab)

     

  • Microsoft Azure Security Features ( Learn Azure security best practices and understand the terminology, tools, and techniques for creating a highly secure, resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune)

     

  • Planning and Implementing a Security Incident Response (Learn to manage an enterprise security incident while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts)


    In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros (the red team) attacks some part or parts of a company’s security infrastructure, and an opposing group (the blue team) defends against the attack. Both teams work to strengthen a company’s defenses. 

    You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.

      You will also learn the fundamental aspects of security in an Enterprise and overall like : CIA Triad concept or Assume Breach philosophy.

You will have a Quiz at the end of each Section and a Final Exam, so you can test the knowledge that you have gained throughout the course.

 

What you'll learn ?

After completing this course, students will be able to:


Describe the current enterprise security landscape

Define the Assume Compromise approach

Practice Red team versus Blue team exercises

Develop organizational security preparation, processes, and responses

  • Basic experience with Windows Server administration, maintenance, and troubleshooting.
  • Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, and cloud services concepts.
  • Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy.
  • Security Administrators
  • Security Analysts
  • System Administrator
  • Network Administrators
  • Everyone who wants to learn about the current cybersecurity landscape and how to improve your organization's security posture
View More...
  • Section 1 : Introduction 2 Lectures 00:07:46

    • Lecture 1 :
    • Lecture 2 :
    • Course Overview
  • Section 2 : Understanding the cybersecurity landscape 4 Lectures 01:04:15

    • Lecture 1 :
    • Current Cybersecurity Landscape
    • Lecture 2 :
    • Assume Compromise Philosophy
    • Lecture 3 :
    • Cost of Breach
    • Lecture 4 :
    • Section 2 Quiz
    • Test the knowledge on the concepts learned in Section 1
  • Section 3 : Red Team: Penetration, lateral movement, escalation, and exfiltration 5 Lectures 01:09:32

    • Lecture 1 :
    • Red Team versus Blue Team exercises
    • Lecture 2 :
    • The Attacker's Objective
    • Lecture 3 :
    • The Attacker's Objective
    • Lecture 4 :
    • Document Vulnerabilities
    • Lecture 5 :
    • Section 3 Quiz
    • Test your knowledge on the concepts learned in Section 3
  • Section 4 : Blue Team Detection, Investigation, Response and Mitigation 6 Lectures 01:14:21

    • Lecture 1 :
    • Blue Team
    • Lecture 2 :
    • Blue Team Kill Chain
    • Lecture 3 :
    • Restrict Privilege Escalation
    • Lecture 4 :
    • Restrict Lateral Movement
    • Lecture 5 :
    • Attack Detection
    • Lecture 6 :
    • Section 4 Quiz
    • Test the knowledge on the concepts learned in this lesson
  • Section 5 : Beyond The Breach 4 Lectures 00:40:30

    • Lecture 1 :
    • CIA Triad
    • Lecture 2 :
    • Organization Preparations
    • Lecture 3 :
    • Developing and Maintaining Policies
    • Lecture 4 :
    • Section 5 Quiz
    • Test the knowledge on the concepts learned in Section 5
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?

Cristian Calinescu,

My name is Cristian Calinescu a Microsoft certified Azure Solutions Architect Expert, Senior Infrastructure Engineer and Infrastructure Security Operations Manager. My areas of expertise are: -Microsoft Windows Server 2008 R2, 2012 R2, 2016, 2019 -Microsoft Active Directory, Azure Active Directory -Microsoft Exchange (2003 - 2019) -Virtualization (Hyper-V, VMWare) -Linux OS -Azure -Skype for Business ( Lync unified messaging) -SCCM: SCOM and SCVMM - Powershell (including scripting) -Bash - Cyber Security - Security tools (cloud based or on-premises) I've been involved in various maintenance and/or implementation projects based on technologies mentioned above. I have also participated to network design and implementations projects as well as assisting customers migrating to the latest technologies. I am certified on the following technologies: - Microsoft Technology Associate: Windows Operating System Fundamentals - Microsoft Technology Associate: Networking Fundamentals - Microsoft Technology Associate: Windows Server® Administration Fundamentals - Microsoft® Certified Solutions Associate: Windows 8 (MCSA) - Microsoft® Certified Solutions Associate: Windows Server 2012 R2 / 2016 (MCSA) - Server Virtualization with Windows Server Hyper-V and System Center (MCSA) - Microsoft® Certified Solutions Expert: Cloud Platform and Infrastructure (MCSE) - Comptia Security + - Microsoft Cyber Security Professional - Certified Ethical Hacker (CEH v10) - Micrsosoft Certified Azure Solutions Architect Expert
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80 Beginner Level 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17 Beginner Level 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6 Beginner Level 0:10:40
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lecture 18 Intermediate Level 2:4:20
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40 Beginner Level 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30 Beginner Level 3:28:56
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.