Available courses
Windows Server 2019 Administration Fundamentals
What you'll learn
- What Windows Server is and its uses
- Concepts behind Windows Server installation
- What server roles are
- How Active Directory plays a part in Windows Server administration
- The various storage options for Windows Server storage
- Managing performance in Windows Server
- Concepts for maintaining Windows server
Requirements
- Familiarity with Windows operating systems
Description
You will find that almost all support roles in IT require some level of Microsoft skills. It is especially important to have a good grasp of Windows Servers, as every day, thousands of new servers go live and require an engineer to deploy, support and maintain the infrastructure.
By the end of this course, you’ll have a good idea of how Windows Server works and what its capabilities are and you will be confortable with basic Windows Server Administration. You will cover the baseline knowledge of building and managing Microsoft Windows servers, Windows-based network operating systems, Active Directory, account management and system recovery tools.
This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:
- Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
- Links to additional resources/blogs/videos for further documentation and more in depth details reading.
Enroll now in Windows Server 2019 Administration Fundamentals and start learning about all fundamental concepts of Windows Server Administration, and also start your IT career as an IT Administrator.
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.
Who this course is for:
- Anyone who wants to learn about Windows Server administration concepts and kickstart their career in IT
Computer Networking Fundamentals
What you'll learn
- Understand what a Network is all about
- Understand the OSI Model
- Learn about various types of networks (LAN, WAN, etc.)
- Understand the core concepts of TCP/IP protocol
- Understand the basics of subnetting
- Understand networking hardware and their purpose
- Understand the basics of IP addressing
- Understand captured network traffic
- Configure IPv4 and IPv6
Requirements
- Familiarity of Windows operating system
- Familiarity of Linux operating system
Threat Detection
What you'll learn
- Describe signature-based and behavioral / heuristic detection methods
- List the capabilities of on-premise threat detection and mitigation tools
- Name the capabilities of hybrid and cloud threat detection and mitigation tools
- Recognize the importance of Enterprise threat detection monitoring
Requirements
- Basic experience with the current cybersecurity ecosystem
- Basic analysis capabilities of hacks on computers and networks
Enterprise Security Fundamentals
Introduction to Enterprise Security Fundamental Concepts (Network security, information security, OS security,etc)
What you'll learn
- Describe the current cybersecurity landscape
- Red team versus Blue team exercises
- Blue team kill chain, including Gathering baseline data Detection Alerting Investigation Response Execution
- Explain the Assume Compromise approach to security
- Red team kill chain, including: Reconnaissance Beachhead Persistence Lateral movement Elevation Exfiltration
- Organizational preparation, security processes, and responses
Requirements
- Basic experience with Windows Server administration, maintenance, and troubleshooting
- Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, and cloud services concepts
- Introductory level knowledge of Active Directory, including functions of a domain control, sign on services, and an understanding of group policy
Description
In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros (the red team) attacks some part or parts of a company’s security infrastructure, and an opposing group (the blue team) defends against the attack. Both teams work to strengthen a company’s defenses.
You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.
You will also learn the fundamental aspects of security in an Enterprise and overall like : CIA Triad concept or Assume Breach philosophy.
This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:
- Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
- Review questions (quizz) at the end of each section
- Final Exam at the end of the course - 50 questions to test your knowledge on the topics and concepts learned in the course
- Links to official Microsoft resources/blogs/videos for further documentation.
What you'll learn ?
After completing this course, students will be able to:
- Describe the current enterprise security landscape
- Define the Assume Compromise approach
- Practice Red team versus Blue team exercises
- Develop organizational security preparation, processes, and responses
This course is the 1st course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Microsoft Defender Suite, Office 365 security features and services, Microsoft Graph, Azure Active Directory Security and many more.
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.
Who this course is for:
- Security Administrators
- Security Analysts
- System Administrator
- Everyone who wants to learn about the current cybersecurity landscape and how to improve your organization's security posture
Effective Presentations and Meetings
An effective meeting and presentation brings a thoughtfully selected group of people together for a specific purpose, provides a forum for open discussion, and delivers a tangible result: a decision, a plan, a list of great ideas to pursue, a shared understanding of the work ahead.
Personal Grooming
Grooming plays a major role in maintaining a high self-esteem and self-confidence. It does this by influencing your appearance, which in turn affects the way you regard yourself. When your hair looks neat and beautiful, and your gel manicure is still intact, you can observe how your confidence will rise.