Microsoft Modern Workplace
Was werden Sie in diesem Seminar erlernen?
Agenda
- Introduction to Zero Trust and best practice frameworks
- Introduction to best practices
- Introduction to Zero Trust
- Zero Trust initiatives
- Zero Trust technology pillars part
- Zero Trust technology pillars part 2
- Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Define a security strategy
- Introduction to the Cloud Adoption Framework
- Cloud Adoption Framework secure methodology
- Introduction to Azure Landing Zones
- Design security with Azure Landing Zones
- Introduction to the Well-Architected Framework
- The Well-Architected Framework security pillar
- Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
- Design solutions with best practices for capabilities and controls
- Design solutions with best practices for attack protection
- Design a resiliency strategy for common cyberthreats like ransomware
- Common cyberthreats and attack patterns
- Support business resiliency
- Ransomware protection
- Configurations for secure backup and restore
- Security updates
- Case study: Design solutions that align with security best practices and priorities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Design solutions for regulatory compliance
- Introduction to regulatory compliance
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Address privacy requirements with Microsoft Priva
- Address security and compliance requirements with Azure policy
- Evaluate infrastructure compliance with Defender for Cloud
- Design solutions for identity and access management
- Introduction to Identity and Access Management
- Design cloud, hybrid and multicloud access strategies (including Azure AD)
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Align conditional access and Zero Trust
- Specify requirements to secure Active Directory Domain Services (AD DS)
- Design a solution to manage secrets, keys, and certificates
- Design solutions for securing privileged access
- The enterprise access model
- Design identity governance solutions
- Design a solution to secure tenant administration
- Design a solution for cloud infrastructure entitlement management (CIEM)
- Design a solution for privileged access workstations and bastion services
- Design solutions for security operations
- Introduction to Security operations (SecOps)
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design security information and event management (SIEM) solutions
- Design solutions for detection and response
- Design a solution for security orchestration, automation, and response (SOAR)
- Design security workflows
- Design threat detection coverage
- Case study: Design security operations, identity and compliance capabilities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Design solutions for securing Microsoft 365
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
- Design solutions for securing applications
- Introduction to application security
- Design and implement standards to secure application development
- Evaluate security posture of existing application portfolios
- Design security lifecycle strategy for applications
- Secure access for workload identities
- Design a solution for API management and security
- Design a solution for secure access to applications
- Design solutions for securing an organization's data
- Introduction to data security
- Design a solution for data discovery and classification using Microsoft Purview
- Design a solution for data protection
- Design data security for Azure workloads
- Design security for Azure Storage
- Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
- Case study: Design security solutions for applications and data
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Specify requirements for securing SaaS, PaaS, and IaaS services
- Introduction to security for SaaS, PaaS, and IaaS
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
- Design solutions for security posture management in hybrid and multicloud environments
- Introduction to hybrid and multicloud posture management
- Evaluate security posture by using Microsoft Cloud Security Benchmark
- Design integrated posture management and workload protection
- Evaluate security posture by using Microsoft Defender for Cloud
- Posture evaluation with Microsoft Defender for Cloud secure score
- Design cloud workload protection with Microsoft Defender for Cloud
- Integrate hybrid and multicloud environments with Azure Arc
- Design a solution for external attack surface management
- Knowledge check - Design solutions for security posture management in hybrid and multicloud environments
- Design solutions for securing server and client endpoints
- Introduction to endpoint security
- Specify server security requirements
- Specify requirements for mobile devices and clients
- Specify internet of things (IoT) and embedded device security requirements
- Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
- Design solutions for network security
- Design solutions for network segmentation
- Design solutions for traffic filtering with network security groups
- Design solutions for network posture management
- Design solutions for network monitoring
- Knowledge check - Design solutions for network security
- Case study: Design security solutions for infrastructure
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Zielgruppe
Voraussetzungen
Partner
Infos zur Zertifizierung
Termine
18.11.2024 (4 Tage) Garantietermin
Online
2485,00 EUR zzgl. 19% MwSt.
Online
2485,00 EUR zzgl. 19% MwSt.
20.01.2025 (4 Tage)
Online
2485,00 EUR zzgl. 19% MwSt.
Online
2485,00 EUR zzgl. 19% MwSt.
07.04.2025 (4 Tage) Garantietermin
Online
2485,00 EUR zzgl. 19% MwSt.
Online
2485,00 EUR zzgl. 19% MwSt.
11.08.2025 (4 Tage)
Online
2485,00 EUR zzgl. 19% MwSt.
Online
2485,00 EUR zzgl. 19% MwSt.
09.12.2025 (4 Tage) Garantietermin
Online
2485,00 EUR zzgl. 19% MwSt.
Online
2485,00 EUR zzgl. 19% MwSt.
Ihr Ansprechpartner: Andreas Stammhammer
Standorte Braunschweig und Hannover
Gerne stehe ich Ihnen persönlich bei allen Fragen zur Verfügung!Telefon: 0531 70224942
E-Mail: a.stammhammer@kaemmer-consulting.de