Microsoft Penetration Testing

Improve your security knowledge and approach with our in-house developed courses and workshops. Learn about common misconfigurations and how to fix them.

Mastering cyber attacks successfully

The courses follow the «Assume Breach» principle of the Zero Trust model. They include live demonstrations of cyber attacks, evasion techniques and the implementation of Microsoft 365 Defender. Practical exercises and VM simulations deepen the knowledge.

128 Results

Red Hat Certified System Administrator - Remote Exam (RHCSA) («EX200R»)

CHF
550.–

Red Hat Certified Specialist in Security: Linux Exam («EX415»)

4 Std.
CHF
550.–

Red Hat System Administration I («RH124»)

5 Tage
  • Zürich
  • Live Virtual Training
CHF
3'150.–

Red Hat Certified Specialist in Enterprise Application Server Administration («EX248»)

4 Std.
CHF
550.–

Red Hat Certified Specialist in Ceph Cloud Storage Exam («EX260R»)

CHF
550.–

Red Hat Security: Linux in Physical, Virtual, and Cloud («RH415S»)

CHF
2'950.–

Red Hat System Administration II («RH134O»)

CHF
2'700.–

Red Hat Certified Specialist in Security: Linux - Remote Exam («EX415R»)

CHF
550.–

Getting Started with Linux Fundamentals («RH104»)

2 Tage
CHF
1'200.–

Preliminary Exam in Red Hat System Administration I («PE124»)

CHF
220.–

Red Hat Enterprise Linux Automation with Ansible and Exam («RH295»)

5 Tage
  • Zürich
  • Live Virtual Training
CHF
4'050.–

Red Hat Security: Identity Management and Authentication w/ exam («RH363»)

5 Tage
CHF
4'000.–

Red Hat Certified Specialist in Microsoft Windows Automation w/ Ansible – Remote Exam («EX417R»)

CHF
550.–

Red Hat Enterprise Linux Diagnostics and Troubleshooting with Exam («RH343»)

5 Tage
CHF
4'000.–

Red Hat Enterprise Linux Diagnostics und Troubleshooting («RH342»)

4 Tage
  • Live Virtual Training
CHF
3'700.–

Red Hat Satellite 6 Administration («RH403»)

4 Tage
  • Live Virtual Training
CHF
3'900.–

Red Hat System Administration III («RH254»)

4 Tage
CHF
3'300.–

Red Hat Gluster Storage Administration («RH236»)

3 Tage
CHF
2'800.–

Red Hat System Administration II («RH134»)

5 Tage
  • Zürich
  • Live Virtual Training
CHF
4'100.–

Red Hat Certified System Administrator (RHCSA) («EX200»)

3 Std.
CHF
550.–

Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting («EX342»)

4 Std.
CHF
550.–

Red Hat Certified Specialist in Deployment and Systems Management («EX403R»)

CHF
550.–

RHCSA Rapid Track mit RHCSA-Prüfung («RH200»)

5 Tage
  • Live Virtual Training
CHF
4'500.–

Red Hat Security: Identity Management and Authentication («RH362»)

4 Tage
  • Live Virtual Training
CHF
3'700.–
24 courses of 32

These courses follow the «Assume Breach» principle of the Zero Trust model for Microsoft security architects.

It starts with a complete live demonstration of a cyber attack, from external information gathering to data extraction. The demonstration then delves into the evasion techniques used by experienced hackers. Later, Microsoft 365 Defender comes to the rescue. Components such as Microsoft Defender for Endpoints with rules to reduce the attack surface, Microsoft Defender for Office 365, and Microsoft Defender for Identity Configurations are implemented. In the final module, we explore the behaviour of ransomware and methods to protect against it.

Each module includes tailored, hands-on labs. These labs allow participants to apply the concepts learned in the course and practice their skills in a controlled environment. Participants have access to virtual machines where they can simulate cyber-attacks and practice evading detection and implementing Microsoft 365 Defender components to improve their organisation's security.

Participants will also learn about the latest trends in cyber-attacks and how to keep up to date with emerging threats. They will understand the importance of continuous monitoring and threat intelligence to effectively detect and respond to attacks.

By the end of the course, participants will have a comprehensive understanding of the «Assume Breach» principle, advanced evasion techniques, and how to implement Microsoft 365 Defender components for enhanced security. Hands-on labs allow you to apply your knowledge in real-world scenarios.