Slider

Course Features

Training Type Online
Course Duration 24hrs
Price 49.999
Training Test Yes
Batch Available (Mon-Fri)&(Sat-Sun)
Skill Level Beginner
Latest Technology Coverage CISCO,AWS,MICROSOFT,Certificate Courses
Hands-on-Lab experience,one-to-one Problem Solving Session Yes

Register for Demo

    Microsoft 365 Certified Security Administrator Associate Training

    Microsoft, the technology giant, has a wide range of technologies and services that are used extensively by businesses across the world. Microsoft 365 suite of cloud productivity solutions is much sought after. A certification in this technology or solution can be rewarding for IT sector aspirants. However, these certifications are quite competitive. That is why you need WanForce’s Microsoft 365 Certified Security Administrator Associate Training.

    Microsoft 365 Security Administration Training

    Security operations and administration involve figuring out information assets of a company and the documentation required for policy implementation, guidelines, standards, procedures. These are necessary for ensuring integrity, confidentiality, and availability. You will be able to figure out processes required for working with the management and custodians, users, and information owners. This will lead to proper usage of electronic data as well as hard copy.

    Whenever you read about security breaches taking place in a reputed organization and hackers accessing confidential information, it has got something to do with a database breach. A huge amount of data is stored through apps, websites, and other online platforms, and these have to be secured. The job of a database administrator is to secure these digital assets.

    A capable database administrator ensures the database and other online data sources stay safe from hacking and unauthorized access. Cyber security architects plan and set up organizational security. The security engineers implement it, and the system is monitored by security administrators. They carry out routine checking and maintenance tasks on a daily basis. They set up new accounts and regulate access rights. The security engineers keep a tab on users accessing the systems too. The Microsoft 365 Security Administration Training will cover all these aspects.

    The security administrators also inform and update other departments about emerging information security threats. They are aware of the best practices and security policies too. The security administrators can have varying levels of expertise-including entry-level and seniors. In big entities, the senior security administrators are given the designations of Chief Security Officers. To become an entry-level security administrator, having a degree in computer science or cyber security is required.

    Module 1: Introduction to Network Security

    • Network topology; Network Types and the OSI Model

    Module 2: Network Protocols

    • Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
    • IP: Attacks and Countermeasures
    • TCP, UDP: Attacks and Countermeasures
    • FTP, TFTP, TELNET, SMTP: Vulnerabilities

    Module 3: Security Policy

    • What is Security Policy?
    • What Defines a good security policy
    • Security Policy Structure
    • Developing and Implementing security policies
    • Requirements of Effective Security Policy

    Module 4: Physical Security

    • Physical Security Threats
    • Locks and Keys
    • TEMPEST
    • Fire Safety: Fire Suppression, Gaseous Emission Systems
    • Laptop Security: Physical Security Countermeasures
    • Biometric Devices
    • PC Security: Boot Access

    Module 5: Network Attacks

    • Current Statistics
    • Defining Terms: Threats, Attack and Exploit
    • Classification of Hackers and Attacks
    • Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
    • Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
    • War Driving; War Chalking; War Flying
    • Denial of Service (DOS) Attacks and Distributed DOS

    Module 6: Intrusion Detection System

    • Characteristics of IDS
    • Host based IDS Vs Network based IDS
    • IDS Detection Methods; Types of Signatures
    • Intrusion Prevention System
    • IDS Vs IPS
    • IPS Tool

    Module 7: Firewalls

    • Handling threats and security tasks
    • Protection against hacking
    • Centralization and Documentation
    • Multi-layer firewall protection
    • Packet filtering and Stateful Packet Filtering
    • Multi firewall DMZ
    • Specialty firewalls and Reverse firewalls

    Module8: Packet Filtering and Proxy Servers

    • Network Address Translation
    • Application layer gateway and Proxying
    • Virtual Private Network and the Authentication process

    Module 9: Bastion Host and Honeypots

    • Bastion Host
    • Honeypots and Honeynet

    Module 10: Hardening Routers

    • Internet work Operating Systems (IOS)
    • Troubleshooting a router
    • Hardening a Router
    • Components of router security
    • Router security: testing tools

    Module 11: Hardening Operating Systems Security

    • Windows Security
    • Objects And Permissions
    • NTFS File System Permissions
    • Active Directory
    • Kerberos Authentication And Security
    • IP Security
    • Linux

    Module 12: Patch Management

    • Red Hat Up2date Patch Management Utility Installation Steps
    • Microsoft Patch Management Process and Windows Update Services
    • Patch Management Tools: Qchain
    • Patch Management Tool: Microsoft Baseline Security Analyzer
    • Other Patch Management Tools

    Module 13: Application Security

    • Securing Web Applications
    • IPSec And SSL Security
    • Writing Secure Code; Best Practices
    • Remote Administration Security

    Module 14: Web Security

    • Network Devices and Design
    • Altering the Network Addresses
    • Client Authorization and Secure Client Transmissions
    • Portable Applications
    • Malicious Code Detection
    • Browser Security Settings
    • Common Gateway Interface (CGI)
    • Web Application Input Data Validation and Buffer Overflows

    Module 15: E-Mail Security

    • Components Of An Email
    • E-mail protocols
    • E-Mail Security Risks
    • How to defend against E-Mail security risks

    Module 16: Encryption

    • Firewalls Implementing Encryption
    • Maintaining confidentiality
    • Digital certificates
    • Public and Private Keys (including PGP)
    • Choosing the size of keys
    • Analyzing popular encryption schemes including IPSEC

    Module 17: Virtual Private Networks

    • VPN Tunneling Protocols
    • PPTP and L2TP
    • VPN Security

    Module 18: WLAN

    • Wireless Network Types
    • Antenna
    • WLAN Standards
    • BlueTooth And Ultra Wideband
    • WEP Description Tool (Air Snort and WEPCrack)
    • WLAN Security;WPA; TKIP; WTLS
    • EAP Methods
    • Advanced Encryption Standards (AES); DES; RSA Encryption
    • RADIUS; Multifactor Authentication
    • Mobile Security Through Certificates
    • Certificate Management Through PKI

    Module 19: Creating Fault Tolerance

    • Network Security: Fault Tolerance
    • Why Create Fault Tolerance
    • Planning For Fault Tolerance
    • Reasons For System Failure
    • Preventive Measures

    Module 20: Incident Response

    • What Is an Incident
    • Step by Step Procedure
    • Managing Incidents
    • What Is an Incident Response
    • Six Step Approach for Incident Handling (PICERF Methodology)
    • Incident Response Team

    Module 21: Disaster Recovery and Planning

    • What is a Disaster Recovery
    • Disaster Recovery Planning
    • Business Continuity Planning Process
    • Disaster Prevention

    Module 22: Network Vulnerability Assessment

    • Vulnerability Assessment
    • Goals of vulnerability assessment
    • Network vulnerability Assessment methodology:
    • Selecting vulnerability assessment tool
    The objective of the Security Administration Course is safeguarding crucial information and thus keeping the assets of people safe.
    • Deploying several policies and making sure they are followed properly by the team.
    • Proficiency in using automation tools like Share Point, MS Office, and Lotus Notes.
    • Detailed knowledge of IP Networking.
    • Working knowledge of ICD 704 & 705.
    • Robust interpersonal and leadership skills and the capability to interact with various company stakeholders.
    • Detailed knowledge of handling intrusion detection, data leakage prevention, vulnerability management, and antivirus operations.
    • Proficiency in using applications like Microsoft Office Word and Excel.

    Why Choose Wanforce

    Robust IT Infrastructure

    24x7 Support

    Best Learning Environment

    Best Price Guaranteed

    Variable Length Subscription

    Stay Get in Touch

    Keep current with new training and certifications, updated learning resources, and more.






      Stay Informed