Microsoft Penetration Testing
Mastering cyber attacks successfully
The courses follow the «Assume Breach» principle of the Zero Trust model. They include live demonstrations of cyber attacks, evasion techniques and the implementation of Microsoft 365 Defender. Practical exercises and VM simulations deepen the knowledge.
These courses follow the «Assume Breach» principle of the Zero Trust model for Microsoft security architects.
It starts with a complete live demonstration of a cyber attack, from external information gathering to data extraction. The demonstration then delves into the evasion techniques used by experienced hackers. Later, Microsoft 365 Defender comes to the rescue. Components such as Microsoft Defender for Endpoints with rules to reduce the attack surface, Microsoft Defender for Office 365, and Microsoft Defender for Identity Configurations are implemented. In the final module, we explore the behaviour of ransomware and methods to protect against it.
Each module includes tailored, hands-on labs. These labs allow participants to apply the concepts learned in the course and practice their skills in a controlled environment. Participants have access to virtual machines where they can simulate cyber-attacks and practice evading detection and implementing Microsoft 365 Defender components to improve their organisation's security.
Participants will also learn about the latest trends in cyber-attacks and how to keep up to date with emerging threats. They will understand the importance of continuous monitoring and threat intelligence to effectively detect and respond to attacks.
By the end of the course, participants will have a comprehensive understanding of the «Assume Breach» principle, advanced evasion techniques, and how to implement Microsoft 365 Defender components for enhanced security. Hands-on labs allow you to apply your knowledge in real-world scenarios.