Defensive Security Of Microsoft 365 - Hands On

2 Day Course
Hands On
Code QAM365HACK

Book Now - 1 Delivery Method Available:

Classroom Virtual Classroom Private Group - Virtual Self-Paced Online

Overview

We power your Microsoft 365 security capabilities through our immersive 2-day course featuring hands on labs. Learn Offensive and defensive skills to secure Microsoft 365 environments, ensuring you are equipped and ready to handle security issues from a typical cyber kill chain. Your future. Our passion. Let’s go!

This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions: Business, E3, E5.

Practical Labs- During the course students will create a trial free Microsoft 365 environment, which they will populate with data then implement the security features.

Objectives

Delegates will learn and deploy both offensive/defensive methods to secure Microsoft 365 deployments. This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions; Business, E3, E5.

The event contains 3 modules:

  • Infrastructure protection — Protecting Domain Infrastructure using Microsoft 365 components.
  • Don't pay a Ransom — Protect and recover your data from ransomware attacks.
  • Data leakage prevention — Protecting corporate data from unintentional or intentional sharing

Target Audience

  • Security Professionals
  • Microsoft 365 IT Professionals
  • Anyone who has an interest in how to make their Microsoft-based organization more secure with Microsoft 365

Additional Information

Please note: Due to the dynamic nature of updates to Office 365 functionality by Microsoft, elements of the syllabus of this course can be subject to change without notice.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

Infrastructure Protection (14 topics)

  • Introduction to Microsoft 365
  • Demo: From Phishing to Domain Admins
  • Demo: Getting Root in Linux
  • Preventing Overpass-the-Hash attack
  • Configuring Windows Defender Credentials Guard
  • Performing and Preventing Pass-the-Ticket attack
  • Detecting Active Directory attacks with User Behavior Analytics
  • Comparing Microsoft ATA and Azure ATP
  • Configuring Azure ATP
  • Advanced Endpoint Protection from the Cloud
  • Configuring Windows Defender ATP
  • Lab 1.1. Exploring Azure ATP
  • Lab 1.2. Configuring Windows Defender ATP
  • Lab 1.3. Cybersecurity challenge (Optional)

Don't pay Ransom (11 topics)

  • Demo: Ransomware attack
  • Stop phishing using Office 365 ATP
  • Mastering whitelisting with AppLocker
  • Whitelisting on steroids
  • Attack Surface Reduction rules
  • Docs protection with Controlled Folder Access
  • Windows Defender Application Guard - Rock-solid Browser
  • OneDrive for Business. Complete Recovery
  • Tuning Windows Defender Antivirus
  • Lab 2.1. Configuring and testing Office 365 Advanced Threat Protection with sample ransomware
  • Lab 2.2. Configuring Windows Defender Controlled Folder Access

Data leakage prevention (8 topics)

  • Endpoint Attacks with Physical Access
  • Device Protection. Configuring Bitlocker
  • Attacks on Mobile Devices
  • Mobile devices protection using Microsoft Intune
  • Protect data in the Cloud with Conditional Access & Cloud App Security
  • User's documents protection with Azure Information Protection
  • Lab 3.1 Configuring Azure AD Conditional Access
  • Lab 3.2 Exploring Cloud App Security

Prerequisites

Working knowledge of Microsoft 365 technologies.

Course PDF

Print

Share this Course

Share

Recommend this Course

Sections