Price:
$2,495.00
Days:
1
Virtual
– • Design a Zero Trust strategy and architecture
– • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
– • Design security for infrastructure
– • Design a strategy for data and applications
• Experience with hybrid and cloud implementations
• Advanced experience and knowledge in identity and access
• Platform protection
• Security operations
• Securing data
• Securing applications
– • Design solutions for securing applications
– • Design solutions for securing Microsoft 365
– • Case study: Design security operations, identity, and compliance capabilities
– • Design solutions for security operations
– • Design solutions for securing privileged access
– • Case study: Design security solutions for infrastructure
– • Design solutions for network security
– • Design solutions for securing server and client endpoints
– • Design solutions for securing an organization’s data
– • Case study: Design security solutions for applications and data
– • Specify requirements for securing SaaS, PaaS, and IaaS services
– • Design solutions for security posture management in hybrid and multi-cloud environments
– • Design solutions that align with security best practices and priorities
– • Design security operations, identity, and compliance capabilities
– • Design security solutions for applications and data
– • Design security solutions for infrastructure
– • Introduction to Zero Trust and best practice frameworks
– • Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
– • Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
– • Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
– • Case study: Design solutions that align with security best practices and priorities
– • Design solutions for regulatory compliance
– • Design solutions for identity and access management
– • Case study: Design security operations, identity and compliance capabilities
– • Design solutions for securing Microsoft 365
– • Design solutions for securing applications
– • Design solutions for securing an organization’s data
– • Design solutions for security posture management in hybrid and multicloud environments
– • Case study: Design security solutions for infrastructure
– • Design solutions for identity and access management
– • Design solutions for regulatory compliance
– • Design a resiliency strategy for common cyber threats like ransomware
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.