We may not have the course you’re looking for. If you enquire or give us a call on 01344203999 and speak to our training experts, we may still be able to help with your training requirements.
close
Press esc to close
close
Press esc to close
close
Fill out your contact details below and our training experts will be in touch.
If you wish to make any changes to your course, please log a ticket and choose the category ‘booking change’
Back to Course Information
Online Instructor-led (4 days)
Classroom (4 days)
Online Self-paced (32 hours)
Module 1: Introduction to Zero Trust and Best Practice Frameworks
Module 2: Design Solutions that Align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Module 3: Design Solutions that Align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB)
Module 4: Design a Resiliency Strategy for Common Cyberthreats Like Ransomware
Module 5: Case study: Design solutions that align with security best practices and priorities
Module 6: Design Solutions for Regulatory Compliance
Module 7: Design Solutions for Identity and Access Management
Module 8: Design Solutions for Securing Privileged Access
Module 9: Design Solutions for Security Operations
Module 10: Case study: Design Security Operations, Identity and Compliance Capabilities
Module 11: Design Solutions for Securing Microsoft 365
Module 12: Design solutions for Securing Applications
Module 13: Design Solutions for Securing an Organisation's Data
Module 14: Case study: Design Security Solutions for Applications and Data
Module 15: Specify Requirements for Securing SaaS, PaaS, and IaaS Services
Module 16: Design Solutions for Security Posture Management in Hybrid and Multicloud Environments
Module 17: Design Solutions for Securing Server and Client Endpoints
Module 18: Design Solutions for Network Security
Module 19: Case Study: Design Security Solutions for Infrastructure
(344 remaining)
This Microsoft Cybersecurity Architect SC100 Course is beneficial for those who want to gain an in-depth understanding of Microsoft's Cybersecurity Solutions, especially for Microsoft 365 and Azure services. The professionals who will benefit from this course are:
There are no formal prerequisites for attending this Microsoft Cybersecurity Architect SC100 Training. However, The SC-100 exam is an advanced, expert-level exam that covers a wide range of cybersecurity topics, so advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications is recommended.
The Microsoft Cybersecurity Architect SC100 Course is a comprehensive training that equips professionals with the knowledge to design and evaluate cybersecurity strategies in crucial areas such as Zero Trust, Governance Risk Compliance (GRC), Security Operations (SecOps), and data and applications. In today's increasingly digital world, cybersecurity is of paramount importance, making this a highly relevant course.
Understanding the Microsoft Cybersecurity Architect SC100 is essential for professionals aiming to become proficient in security strategy design and evaluation. Security experts, IT professionals, system architects, and anyone involved in safeguarding critical data and infrastructure should strive to master this subject. By doing so, they can contribute to their organisation's resilience against cyber threats and stay ahead in the field of cybersecurity.
The 4-day training offered by the Knowledge Academy is designed to provide delegates with a comprehensive understanding of the Microsoft Cybersecurity Architect SC100. This course empowers participants to design a Zero Trust strategy and architecture, evaluate GRC technical strategies and security operations, design security for infrastructure, and create a strategy for data and applications.
Course Objectives:
Upon completion of this Microsoft Security Engineer Training Course, delegates will benefit from an enhanced skill set and a thorough understanding of cybersecurity strategies. They will be well-equipped to design and evaluate security solutions, ensuring the protection of their organisation's digital assets and contributing to its overall resilience against cyber threats.
Online Instructor-led (4 days)
Classroom (4 days)
Online Self-paced (32 hours)
Module 1: Introduction to Microsoft 365 Threat Protection
Module 2: Mitigate Incidents Using Microsoft 365 Defender
Module 3: Protect Your Identities with Azure AD Identity Protection
Module 4: Remediate Risks with Microsoft Defender for Office 365
Module 5: Safeguard Your Environment with Microsoft Defender for Identity
Module 6: Secure Your Cloud Apps and Services with Microsoft Defender for Cloud Apps
Module 7: Respond to Data Loss Prevention Alerts Using Microsoft 365
Module 8: Manage Insider Risk in Microsoft Purview
Module 9: Investigate Threats by Using Audit Features in Microsoft 365 Defender and Microsoft Purview Standard
Module 10: Investigate Threats Using Audit in Microsoft 365 Defender and Microsoft Purview (Premium)
Module 11: Investigate Threats with Content Search in Microsoft Purview
Module 12: Protect Against Threats with Microsoft Defender for Endpoint
Module 13: Deploy the Microsoft Defender for Endpoint Environment
Module 14: Implement Windows Security Enhancements with Microsoft Defender for Endpoint
Module 15: Perform Device Investigations in Microsoft Defender for Endpoint
Module 16: Perform Actions on a Device Using Microsoft Defender for Endpoint
Module 17: Perform Evidence and Entities Investigations Using Microsoft Defender for Endpoint
Module 18: Configure and Manage Automation Using Microsoft Defender for Endpoint
Module 19: Configure for Alerts and Detections in Microsoft Defender for Endpoint
Module 20: Utilise Vulnerability Management in Microsoft Defender for Endpoint
Module 21: Plan for Cloud Workload Protections Using Microsoft Defender for Cloud
Module 22: Connect Azure Assets to Microsoft Defender for Cloud
Module 23: Connect Non-Azure Resources to Microsoft Defender for Cloud
Module 24: Manage Your Cloud Security Posture Management
Module 25: Explain Cloud Workload Protections in Microsoft Defender for Cloud
Module 26: Remediate Security Alerts Using Microsoft Defender for Cloud
Module 27: Construct KQL Statements for Microsoft Sentinel
Module 28: Analyse Query Results Using KQL
Module 29: Build Multi-Table Statements Using KQL
Module 30: Work with Data in Microsoft Sentinel Using Kusto Query Language
Module 31: Introduction to Microsoft Sentinel
Module 32: Create and Manage Microsoft Sentinel Workspaces
Module 33: Query Logs in Microsoft Sentinel
Module 34: Use Watchlists in Microsoft Sentinel
Module 35: Utilise Threat Intelligence in Microsoft Sentinel
Module 36: Connect Data to Microsoft Sentinel Using Data Connectors
Module 37: Connect Microsoft Services to Microsoft Sentinel
Module 38: Connect Microsoft 365 Defender to Microsoft Sentinel
Module 39: Connect Windows Hosts to Microsoft Sentinel
Module 40: Connect Common Event Format Logs to Microsoft Sentinel
Module 41: Connect Syslog Data Sources to Microsoft Sentinel
Module 42: Connect Threat Indicators to Microsoft Sentinel
Module 43: Threat Detection with Microsoft Sentinel Analytics
Module 44: Automation in Microsoft Sentinel
Module 45: Security Incident Management in Microsoft Sentinel
Module 46: Identify Threats with Behavioral Analytics
Module 47: Data Normalisation in Microsoft Sentinel
Module 48: Query, Visualise, and Monitor Data in Microsoft Sentinel
Module 49: Manage Content in Microsoft Sentinel
Module 50: Explain Threat Hunting Concepts in Microsoft Sentinel
Module 51: Threat Hunting with Microsoft Sentinel
Module 52: Use Search Jobs in Microsoft Sentinel
Module 53: Hunt for Threats Using Notebooks in Microsoft Sentinel
(344 remaining)
This Microsoft Security Operations Analyst SC200 Course is designed for individuals who are interested in developing their skills and expertise in the field of Security Operations and Threat Detection and Response using Microsoft technologies. This training course is especially beneficial for the following professionals:
There are no formal prerequisites for this Microsoft Security Operations Analyst SC200 Course. However, basic knowledge of Cybersecurity and IT concepts would be beneficial for the delegates.
The Microsoft Security Operations Analyst SC200 Training is a vital course that equips professionals with the knowledge and skills needed to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In today's cybersecurity landscape, the ability to mitigate cyberthreats is of utmost importance, making this course highly relevant and valuable.
Professionals involved in Security Operations roles, including Security Engineers, Analysts, and those responsible for safeguarding digital assets, should aim to master this subject. With the increasing sophistication of cyber threats, knowing how to effectively use these technologies and Kusto Query Language (KQL) is crucial for ensuring the security and resilience of an organisation's digital infrastructure.
The 4-day training course offered by the Knowledge Academy is designed to empower delegates with the practical skills and knowledge necessary to excel in a Security Operations job role. This course focuses on configuring and using Microsoft Sentinel and utilising KQL for detection, analysis, and reporting. It also prepares learners for the SC-200: Microsoft Security Operations Analyst exam, making it a comprehensive and valuable training opportunity.
Course Objectives:
Upon completion of this Microsoft Security Engineer Training Course, delegates will benefit from an advanced skill set and in-depth knowledge of threat mitigation using Microsoft security technologies. They will be well-prepared to effectively respond to cyber threats, enhancing their organisation's security posture and contributing to a safer digital environment.
Online Instructor-led (4 days)
Classroom (4 days)
Online Self-paced (32 hours)
Module 1: Explore Identity and Azure AD
Module 2: Implement Initial Configuration of Azure Active Directory
Module 3: Create, Configure, and Manage Identities
Module 4: Implement and Manage External Identities
Module 5: Implement and Manage Hybrid Identity
Module 6: Secure Azure Active Directory Users with Multi-Factor Authentication
Module 7: Manage User Authentication
Module 8: Plan, Implement, and Administer Conditional Access
Module 9: Manage Azure AD Identity Protection
Module 10: Implement Access Management for Azure Resources
Module 11: Plan and Design the Integration of Enterprise Apps for SSO
Module 12: Implement and Monitor the Integration of Enterprise Apps for SSO
Module 13: Implement App Registration
Module 14: Plan and Implement Entitlement Management
Module 15: Plan, Implement, and Manage Access Review
Module 16: Plan and Implement Privileged Access
Module 17: Monitor and Maintain Azure Active Directory
(344 remaining)
This Microsoft Identity and Access Administrator SC300 Course is designed for individuals who are interested in becoming proficient in managing Identity and Access Management using Microsoft technologies. This training course is especially beneficial for the following professionals:
There are no formal prerequisites for this Microsoft Identity and Access Administrator SC300 Course. However, basic knowledge of Cybersecurity and IT concepts would be beneficial for the delegates.
The Microsoft Identity and Access Administrator SC300 Course is a pivotal course focused on implementing, designing, and managing an organisation's identity and access management systems with Azure AD (Azure Active Directory). In today's digital landscape, the importance of secure authorisation and authentication access to enterprise applications cannot be overstated, making this course highly relevant.
Professionals responsible for identity and access management, including Security Engineers and Administrators, should aim to master this subject. As identity solutions are integral to modernising an organisation's security posture, implementing identity governance, and achieving hybrid identity solutions, this knowledge is crucial for enhancing an organisation's security and career prospects.
The 4-day training is designed to equip delegates with comprehensive knowledge and practical skills for implementing identity management solutions. Topics covered include user authentication management, Azure AD identity protection, App registration, and more. With experienced trainers, this course ensures a complete understanding of identity and access administration, enabling professionals to add valuable skills to their profiles.
Course Objectives:
Upon completion of this Microsoft Identity and Access Administrator SC300 Course, delegates will be capable of implementing and managing external and hybrid identities, securing Azure AD users with MFA, and effectively integrating enterprise applications for SSO. This knowledge will not only enhance an organisation's identity management but also open doors to valuable career opportunities in the field of security and access administration.
Online Instructor-led (3 days)
Classroom (3 days)
Online Self-paced (24 hours)
Module 1: Introduction to Information Protection and Data Lifecycle Management in Microsoft Purview
Module 2: Classify Data for Protection and Governance
Module 3: Create and Manage Sensitive Information Types
Module 4: Understand Microsoft 365 Encryption
Module 5: Deploy Microsoft Purview Message Encryption
Module 6: Protect Information in Microsoft Purview
Module 7: Apply and Manage Sensitivity Labels
Module 8: Prevent Data Loss in Microsoft Purview
Module 9: Configure DLP Policies for Microsoft Defender for Cloud Apps and Power Platform
Module 10: Manage Data Loss Prevention Policies and Reports in Microsoft 365
Module 11: Manage the Data Lifecycle in Microsoft Purview
Module 12: Manage Data Retention in Microsoft 365 Workloads
Module 13: Manage Records in Microsoft Purview
Module 14: Explore Compliance in Microsoft 365
Module 15: Search for Content in the Microsoft Purview Compliance Portal
Module 16: Manage Microsoft Purview eDiscovery (Standard)
Module 17: Manage Microsoft Purview eDiscovery (Premium)
Module 18: Manage Microsoft Purview Audit (Standard)
Module 19: Prepare Microsoft Purview Communication Compliance
Module 20: Manage Insider Risk in Microsoft Purview
Module 21: Implement Microsoft Purview Information Barriers
Module 22: Manage Regulatory and Privacy Requirements with Microsoft Priva
Module 23: Implement Privileged Access Management
(344 remaining)
This Microsoft Information Protection Administrator SC400 Course is designed for individuals who want to become proficient in managing and securing sensitive information within an organisation using Microsoft technologies. This training course is beneficial for the following professionals:
There are no formal prerequisites for this Microsoft Information Protection Administrator SC400 Training Course. However, basic knowledge of Cybersecurity and IT concepts would be beneficial for the delegates.
The Microsoft Information Protection Administrator SC400 Training is a critical course focused on planning, defining requirements, and implementing information protection in Microsoft 365. In today's data-centric world, the protection of sensitive information against theft and accidental loss is of paramount importance, making this course highly relevant and essential.
Professionals responsible for safeguarding data and ensuring organisational compliance, including Security Engineers and Administrators, should aim to master this subject. As organisations increasingly rely on digital data, understanding information protection and governance in Microsoft 365 is crucial for mitigating risks and meeting compliance requirements.
The 3-day training is designed to enhance delegates' knowledge and skills related to information protection and governance in Microsoft 365. The course covers topics such as Microsoft 365 encryption, message encryption deployment in Office 365, data loss prevention, and sensitivity label configuration. This training equips professionals with the expertise needed to excel in data security and governance roles.
Course Objectives:
Upon completion of this Microsoft Information Protection Administrator SC400 Training, delegates will have the skills and knowledge necessary to protect sensitive data, prevent data loss, and implement robust information protection and governance measures. This expertise will not only enhance their career prospects but also contribute to their organisation's data security and compliance efforts.
Online Instructor-led (1 days)
Classroom (1 days)
Online Self-paced (8 hours)
Module 1: Security and Compliance Concepts
Module 2: Identity Concepts
Module 3: The Function and Identity Types of Microsoft Entra ID
Module 4: Authentication Capabilities of Microsoft Entra ID
Module 5: Access Management Capabilities of Microsoft Entra ID
Module 6: Identity Protection and Governance Capabilities of Microsoft Entra
Module 7: Core Infrastructure Security Services in Azure
Module 8: Security Management Capabilities of Azure
Module 9: Security Capabilities of Microsoft Sentinel
Module 10: Threat Protection with Microsoft 365 Defender
Module 11: Microsoft’s Service Trust Portal and Privacy Capabilities
Module 12: Compliance Management Capabilities in Microsoft Purview
Module 13: Information Protection and Data Lifecycle Management in Microsoft Purview
Module 14: Insider Risk Capabilities in Microsoft Purview
Module 15: Discovery and Audit Capabilities of Microsoft Purview
Module 16: Resource Governance Capabilities in Azure
(344 remaining)
This Microsoft Security, Compliance, and Identity Fundamentals SC900 Course is designed for individuals who are interested in gaining a foundational knowledge of security, compliance, and identity concepts within the context of Microsoft technologies. This training course is especially beneficial for these professionals:
There are no formal prerequisites for this Microsoft Security, Compliance, and Identity Fundamentals SC900 Course. However, basic knowledge of IT concepts would be beneficial for the delegates.
The Microsoft Security, Compliance, and Identity Fundamentals SC900 Course introduces individuals to Microsoft's Security, Compliance, and Identity (SCI) solution, a framework that enhances organisational resilience and security by integrating platforms, clouds, and services. In today's ever-evolving digital landscape, the ability to strengthen cloud workload security and streamline security management is of utmost relevance, making this course highly important.
Professionals looking to excel in technical roles, such as Technical Specialists and Security Architects, should aim to master this subject. With the increasing importance of cloud security, authentication capabilities, access management, compliance management, and insider risk capabilities, understanding these topics is essential for enhancing an organisation's security posture and opening doors to reputable job profiles.
The 1-day training is designed to provide delegates with comprehensive knowledge of security, compliance, and identity. The course covers key areas, including authentication capabilities, access management, security capabilities, and compliance management. With highly experienced trainers, this course ensures a deep understanding of Microsoft's Security, Compliance, and Identity (SCI) solution, empowering professionals with valuable skills.
Course Objectives:
Upon completion of the Microsoft Security, Compliance, and Identity Fundamentals SC900 Course, delegates will possess the knowledge and skills needed to enhance cloud workload security, streamline security management, and contribute to organisational resilience. This expertise will not only enrich their careers, but also enhance their ability to drive effective security practices within their organisations.
Online Instructor-led (1 days)
Classroom (1 days)
Online Self-paced (8 hours)
Module 1: PowerShell Fundamentals
Module 2: PowerShell Operational Security
Module 3: Implementing PowerShell-based Security
Module 4: Windows PowerShell-based Exploits and their Mitigation
Lab: Implementing Windows PowerShell Security
(344 remaining)
The Implementing PowerShell Security Best Practices 40555A Training is designed for IT professionals and security practitioners who work with PowerShell, Microsoft's scripting and automation framework. This course is particularly suitable for the following professionals:
There are no formal prerequisites for attending this Implementing PowerShell Security Best Practices 40555A Training. However, having prior knowledge and experience of Windows PowerShell commands would be beneficial for the delegates.
The Implementing PowerShell Security Best Practices 40555A Course focuses on Windows PowerShell, a versatile scripting language and command-line shell integral to the Microsoft ecosystem. Understanding PowerShell's fundamentals, architectural design, and interaction basics is highly relevant in today's IT landscape. This course serves as a fundamental building block for IT professionals and enthusiasts seeking a comprehensive understanding of PowerShell.
Professionals across various IT domains, including Technical Leaders, Dynamics CRM Developers, Data Engineers, and anyone working with Microsoft technologies, should aim to master PowerShell. PowerShell plays a pivotal role in automating tasks, managing systems, and optimising operations. Knowledge of its best practices is crucial for efficiency, security, and career growth.
The 1-day training course by the Knowledge Academy is designed to provide delegates with an overview of Windows PowerShell-based security technologies. During this course, delegates will gain insights into managing remote execution of PowerShell core and learn to control the remote execution capabilities of Windows PowerShell. This training equips professionals with practical skills to enhance their PowerShell proficiency.
Course Objectives:
Upon completion of the Implementing PowerShell Security Best Practices 40555A Course, delegates will possess a strong foundation in PowerShell fundamentals and best practices. This knowledge will empower them to automate tasks, manage systems more efficiently, and ensure the security of their PowerShell environment. It opens doors to enhanced career prospects and greater proficiency in working with Microsoft technologies.
Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on 01344203999 or Enquire.
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
We are accredited by PeopleCert on behalf of AXELOS
Flexible delivery methods are available depending on your learning style.
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water