Location
-
Format
What’s this? Ways to train
Classroom
Live, instructor-led training in a standard, professional classroom environmentVirtual
Live, instructor-led training conducted over the internet, with hands-on labsOnline
An online, HTML5, self-paced learning experience available for all coursesOn-site
Private training for your entire team, delivered at your location, a training center, or onlineVideo classroom
Learn more about our training formats
High-definition video of our most popular courses, streamed to your laptop or personal device
-
5 Day with 08 hours per day
-
Mon 12 Sep 09:00 - Fri 16 Sep 17:00
-
HRDF SBL Claimable
-
Certificate of Attendance available
-
5 Days
Already purchased this offering? Log in
Request more information
Inquiry for: Myself My Company
By providing your contact details, you agree to our Privacy Policy
Thank You
Our learning consultant will get back to you in 1 business day
Certified Cloud Security Professional (CCSP) – Microsoft
WHAT YOU WILL LEARN
Cybertronium Certified Cloud Security Professional (CCSP) - Microsoft, covers all the security products of Microsoft with respect to latest attack vectors mapped to the Cyber Kill Chain, MITRE ATT&CK Framework Tactics, Techniques, and Procedures (TTP) with hands-on on each attack with its relevant defences. This CCSP certification course equips the security engineers, IT administrators, system engineers, security analysts, azure security engineers, azure administrators with skills to harden the configurations beyond the baseline security and defend their organisation from ever evolving threats.
AUDIENCE
• Security Engineers / Analysts / Consultants
• System Administrators / Engineers
• Certified Azure Associate and Administrators
• Cloud Engineers / Administrators
• IT Managers
• Professionals preparing for Microsoft Azure Exams : SC200, AZ500
• Penetration Testers
• Blue Team members, Defenders, and Forensic Analyst
PREREQUISITES
• Knowledge of Microsoft Windows ecosystem and networking
• Knowledge of Active Directory
• Basic understanding of Microsoft Azure
• Basic understanding of Microsoft 365
HANDS-ON LABS
CCSP is nearly a 100% hands-on training with practical exercises designed to get you be a security professional on a Microsoft security ecosystem from the word, GO!. You will be provided with access to VMs and all necessary licenses of Microsoft Defender, Microsoft 365 and Microsoft Azure products as part of the course to complete the labs.
COURSE OBJECTIVES
• Understand the MITRE ATT&CK Framework with details on techniques, tactics, and procedures (TTP) commonly used by threat actors.
• Learn about each stage of the attack lifecycle from initial compromise to full domain takeover, data hunting, and data exfiltration using various threat vectors.
• Understand how to protect an organisation from known and unknown threats in on-premise and cloud assets using end-to-end Microsoft Defender and Microsoft Azure security technologies.
• Understand how to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.
• Learn how to configure host level security
• Understand cloud computing vulnerabilities
• Understand how to implement secure infrastructure solutions in the Microsoft Azure platform
• Understand how to configure Key Vault secrets, keys and certificates. Learn to retrieve secrets using Azure web app
• Understand how to implement security controls in Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Cloud, Microsoft 365 Defender, Microsoft Defender for Cloud Apps, Microsoft Intune, and Microsoft Azure Sentinel
• Understand how to maintain the security posture of an organisation using Microsoft security ecosystem
• Understand how to manage Azure Cloud Security Operations
• Understand how to manage identity and access of users and assets
• Implement threat protection from endpoint security to cloud security, end-to-end using Microsoft Defender and Microsoft Azure security technologies: Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Cloud, Microsoft 365 Defender, Microsoft Defender for Cloud Apps, Microsoft Intune, and Microsoft Azure Sentinel
• Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
• Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
• Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
• Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
• Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
• Implement perimeter security strategies including Azure Firewall.
• Implement network security strategies including Network Security Groups and Application Security Groups.
• Implement Azure Key Vault including certificates, keys, and secrets.
• Implement application security strategies including app registration, managed identities, and service endpoints.
• Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
• Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
• Implement Azure Monitor including connected sources, log analytics, and alerts.
• Implement Microsoft Defender for Cloud including policies, recommendations, and just in time virtual machine access.
Modules
Microsoft Security Ecosystem – An Introduction
Microsoft Defender for Endpoint
Module 1: Introduction to Microsoft Defender for Endpoint
Module 2: Subscription and configuration
• Lab 1: Onboarding Endpoint device (Windows and Linux)
• Lab 2: Client Offboarding
• Lab 3: Network Assessment
• Lab 4: Roles Access
• Lab 5: Device Group
Module 3: Threat and Vulnerability Management
• Lab 1: Vulnerability Management Dashboard
Module 4: Endpoint Detection and Response (Malware testing)
• Lab 1: Incident Response
• Lab 2: Threat Hunting
• Lab 3: Web Content Filtering
• Lab 4: IOC Blocking
• Lab 5: Execute Antivirus Scan
• Lab 6: Isolated a Device
• Lab 7: Threat Analytics
• Lab 8: Microsoft Threat Experts
Microsoft Defender for Identity (AAD-AD)
Module 1: Introduction to Microsoft Defender for Identity
Module 2: Microsoft Defender for Identity configuration
• Lab 1: Onboarding AD DC to Defender for Identity
• Lab 2: Adding Manual Sensitive Entity
• Lab 3: Adding Honeytoken Accounts
Module 3: Threat and Vulnerability Management
• Lab 2: Secure Score and Remediation
Module 4: Incident and Response
• Lab 1: Configuration of Active directory Protection
• Lab 2: Threat hunting
Microsoft Defender for Cloud
Module 1: Introduction to Microsoft Defender for Cloud
Module 2: Managing Cloud Security Posture
• Lab 1: Secure Score and Remediation
• Lab 2: Inventory - resource health and remediation
• Lab 3: Recommendation - Configure malware detection for existing
• Lab 4: Installing Antimalware in a new VM during creation
• Lab 5: Workbooks for Data analysis and rich visual report creation
• Lab 6: Security Alert and Workflow Automations
Module 3: Regulatory Compliance and Remediation
Module 4: Workload Protection - Enable Just-In-Time VM Access
Module 5: Firewall Manager
Lab 1: Securing Virtual Hub Using Firewall Manager
Lab 2: Connect the Hub and spoke virtual network
Lab 3: Security Hub with firewall policy
Lab 4: Associate Firewall policy
Lab 5: Route traffic to Virtual Hub
Lab 6: Testing Application Rule
Lab 7: Testing Network Rule
Microsoft 365 Defender (Microsoft Zero Trust)
Module 1: Introduction to Microsoft Defender for Office 365
Module 2: Microsoft Defender for Office 365
• Lab 1: Modify Anti Phishing Policy
• Lab 2: Modify Anti-Spam Policy
• Lab 3: Modify Anti Malware Policy
• Lab 4: Create Safe Attachment Polic
• Lab 5: Create Safe Link Policy
• Lab 6: Spoof Mail Attack Simulation
• Lab 7: Malware with Attachment Attack Simulation
• Lab 8: Hyperlink Malware Attack Simulation
• Lab 9: Test Send Hyperlink Email and Understand Scanning Process
Module 3: Office 365 Security & Compliance
• Lab 1: Configure Retention Policy
• Lab 2: Audit Search
• Lab 3: User Sign-In Log Search
• Lab 4: Mailbox Non-Owner Access Audit
Module 4: Microsoft Sentinel
• Lab 1: Create Sentinel and Link to Defender for Office 365
• Lab 2: Configure Data Retention for Sentinel
Module 5: Microsoft Intune
• Lab 1: Create Auto Enrolment Policy
• Lab 2: Create Compliance Policy
• Lab 3: Create Conditional Access Policy
• Lab 4: Create Apps Policy
• Lab 5: Enrolment PC To Intune
Module 6: Microsoft Defender for Cloud App Security
• Lab 1: Connect Apps to Microsoft Cloud App Security
• Lab 2: Configure IP Addresses and Range in Cloud App Security
• Lab 3: Configure Reporting in Cloud App Security

Clement Arul
A professional who believes that adaptability of security is directly equal to the affordability of security products, services and trainings. Started creating security products, services and trainings and certifications that are affordable as well as be part of the team in creation Nation Cyber Security Frameworks.Clement is also a two-time recipient award of National Award from Govt of Malaysia: Cyber Security Professional of the Year in 2017 and 2014 as well as a three-time Regional Award winner of Cyber Security Professional of the Year Asia and APAC in 2020, 2019 and 2017. He was also awarded as APAC Cyber Security Educator of the Year in 2020 and 2019. Read More
Course Reviews
0
0 Ratings