Skip links

Security in the Enterprise

Security in the Enterprise

Course Review: Security in the Enterprise

Another very popular course is Security in the Enterprise, instructed by Simon May and Erdal Ozkaya. This course is for those who wish to find out how cybercriminals operate. A good security professional knows that in order to provide the best possible defense, one must learn to think like a hacker. In this course, our duo of experts guides students through the ever-changing and increasingly-sophisticated virtual battlefield of enterprise security. The course provides tips, tricks, and very practical advice on better defending your system.

Gain a better understanding of the security landscape

Gain a better understanding of the security landscape

The topics covered in this course are:

  • The security landscape of today and tomorrow
  • Tips and practical advice on social media security
  • Advanced Windows defense
  • Free tools to protect your Windows environment
  • Information on vulnerability and patch management
  • Top mitigation methods to protect your enterprise

This course has no prerequisites, but it has a Level 200 status. It is meant for IT professionals with at least six months of experience. It is worth 66 points, and runs approximately five hours. It has six modules and six assessment exams. The course is rated 4 out of 5 stars.

Erdal is an IT Security Guru with business development and management skills, who focuses on Penetration Testing, IT Auditing, and sharing his real life skills as a Lecturer/ Trainer. He is currently working as Chief Information Security Officer at EMT, a specialist IT security products distributor.

Erdal has the following qualifications: Master of Information Systems Security (M.I.S), Bachelor of Information Technology (B.I.T.), MVP, Microsoft Certified Trainer, Microsoft Certified Leaning Consultant, ISO27001 Consultant, Certified Ethical Hacker (CEH), Certified Ethical Instructor, and Licenced Penetration Tester. He is a lecturer at Charles Sturt University and is also completing his Doctor of Philosophy (Ph.D.) in IT Security.

May is a Technical Evangelist and Enterprise Device Infrastructuralist at Microsoft. He is an author, speaker, blogger, video and keynote presenter. He is very passionate about Windows, Microsoft Client, and Cloud technologies.

These days, more than ever before, it is essential to be able to prevent attacks and defend your system. It is true for individuals, as well as large companies and enterprises. Data is everywhere, and it is up to IT security personnel to keep it safe and secure. Microsoft provides a wide range of tools for those who wish to remain secure, and these training courses will help users harness the power of these tools, and maintain a healthy, risk-free enterprise.

While no one can guarantee security 100% of the time, by using these techniques and resources the probability of attack and theft is great reduced. Who is to stop hackers and identity stealers from absconding with confidential information? You are. These courses serve as a “heads up” to those who wish to stay on top and be prepared.

Courses on handling security in a cloud-centered workspace, on advanced Microsoft Azure features, and on security in Office 365 – these are all here, at the enterprise security section of MVA. Top industry experts are here to guide you through the best practices and techniques, designed to keep your company’s information safe.

Image may contain: 1 person

Do you know how cybercriminals work? Get helpful insight, in this cybersecurity course. As an IT Pro, you know that the computer threat landscape is continually changing and that increasingly sophisticated attacks are targeting your organization’s infrastructure and confidential information. Walk with experts through social media platforms to discover how they really work. Get tips and practical advice on social networking security. Plus, explore methods of developing a secure baseline and how to harden your Windows Enterprise architectures and applications from pass-the-hash and other advanced attacks, and look at system patching. Finally, learn how to help improve your organization’s security with Microsoft operating systems and tools.

1 | Security Landscape of Today and Tomorrow

 

Learn about how the computer threat landscape is continually changing and how increasingly sophisticated attacks are targeting your organization’s infrastructure and confidential information.
 

 

2 | Social Media Security

 

In this eye-opening journey, venture into the very heart of social media platforms to discover how they really work. Get tips and practical advice on social networking security.
 

 

3 | Advanced Windows Defense

 

Explore methods of developing a secure baseline and how to harden your Windows Enterprise architectures and applications from pass-the-hash and other advanced attacks.
 

 

4 | Free Tools to Protect Your Windows Environment

 

Learn how Windows Clients are ready to mitigate some of these attacks and how you can utilize your security skills.
 

 

5 | Vulnerability and Patch Management

 

Do you patch your systems? How often? Do you know why you should take action against patching your systems? Find out, in this helpful module.
 

 

6 | Top Mitigation Methods to Protect Your Enterprise

 

Learn how to improve IT security with Microsoft operating systems and tools.
 
Learn
  • Take a look at the security landscape of today and tomorrow.
  • Get tips and practical advice on social media security.
  • Explore advanced Windows defense.
  • Get the details on free tools to protect your Windows environment.
  • Find helpful information on vulnerability and patch management.
  • Learn about top mitigation methods to protect your enterprise.

MVA-2015

Prerequisites: None
Level: 200
 
MVASecurity

Note:

The article was originally published by Erdal Ozkaya @ Erdal Ozkaya Personal Blog on September 27th, 2015. It is reproduced on this blog with an author’s permission.

 

This website uses cookies to improve your web experience.
Explore
Drag