Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • Cybersecurity, Video Tutorials
  • Security in the Enterprise

Security in the Enterprise

Erdal2021-10-02T00:16:52-04:00

Security in the Enterprise

Course Review: Security in the Enterprise

Another very popular course is Security in the Enterprise, instructed by Simon May and Erdal Ozkaya. This course is for those who wish to find out how cybercriminals operate. A good security professional knows that in order to provide the best possible defense, one must learn to think like a hacker. In this course, our duo of experts guides students through the ever-changing and increasingly-sophisticated virtual battlefield of enterprise security. The course provides tips, tricks, and very practical advice on better defending your system.

Gain a better understanding of the security landscape

Gain a better understanding of the security landscape

The topics covered in this course are:

  • The security landscape of today and tomorrow
  • Tips and practical advice on social media security
  • Advanced Windows defense
  • Free tools to protect your Windows environment
  • Information on vulnerability and patch management
  • Top mitigation methods to protect your enterprise

This course has no prerequisites, but it has a Level 200 status. It is meant for IT professionals with at least six months of experience. It is worth 66 points, and runs approximately five hours. It has six modules and six assessment exams. The course is rated 4 out of 5 stars.

Erdal is an IT Security Guru with business development and management skills, who focuses on Penetration Testing, IT Auditing, and sharing his real life skills as a Lecturer/ Trainer. He is currently working as Chief Information Security Officer at EMT, a specialist IT security products distributor.

Erdal has the following qualifications: Master of Information Systems Security (M.I.S), Bachelor of Information Technology (B.I.T.), MVP, Microsoft Certified Trainer, Microsoft Certified Leaning Consultant, ISO27001 Consultant, Certified Ethical Hacker (CEH), Certified Ethical Instructor, and Licenced Penetration Tester. He is a lecturer at Charles Sturt University and is also completing his Doctor of Philosophy (Ph.D.) in IT Security.

May is a Technical Evangelist and Enterprise Device Infrastructuralist at Microsoft. He is an author, speaker, blogger, video and keynote presenter. He is very passionate about Windows, Microsoft Client, and Cloud technologies.

These days, more than ever before, it is essential to be able to prevent attacks and defend your system. It is true for individuals, as well as large companies and enterprises. Data is everywhere, and it is up to IT security personnel to keep it safe and secure. Microsoft provides a wide range of tools for those who wish to remain secure, and these training courses will help users harness the power of these tools, and maintain a healthy, risk-free enterprise.

While no one can guarantee security 100% of the time, by using these techniques and resources the probability of attack and theft is great reduced. Who is to stop hackers and identity stealers from absconding with confidential information? You are. These courses serve as a “heads up” to those who wish to stay on top and be prepared.

Courses on handling security in a cloud-centered workspace, on advanced Microsoft Azure features, and on security in Office 365 – these are all here, at the enterprise security section of MVA. Top industry experts are here to guide you through the best practices and techniques, designed to keep your company’s information safe.

Image may contain: 1 person

Do you know how cybercriminals work? Get helpful insight, in this cybersecurity course. As an IT Pro, you know that the computer threat landscape is continually changing and that increasingly sophisticated attacks are targeting your organization’s infrastructure and confidential information. Walk with experts through social media platforms to discover how they really work. Get tips and practical advice on social networking security. Plus, explore methods of developing a secure baseline and how to harden your Windows Enterprise architectures and applications from pass-the-hash and other advanced attacks, and look at system patching. Finally, learn how to help improve your organization’s security with Microsoft operating systems and tools.

1 | Security Landscape of Today and Tomorrow

 

Learn about how the computer threat landscape is continually changing and how increasingly sophisticated attacks are targeting your organization’s infrastructure and confidential information.
 

 

2 | Social Media Security

 

In this eye-opening journey, venture into the very heart of social media platforms to discover how they really work. Get tips and practical advice on social networking security.
 

 

3 | Advanced Windows Defense

 

Explore methods of developing a secure baseline and how to harden your Windows Enterprise architectures and applications from pass-the-hash and other advanced attacks.
 

 

4 | Free Tools to Protect Your Windows Environment

 

Learn how Windows Clients are ready to mitigate some of these attacks and how you can utilize your security skills.
 

 

5 | Vulnerability and Patch Management

 

Do you patch your systems? How often? Do you know why you should take action against patching your systems? Find out, in this helpful module.
 

 

6 | Top Mitigation Methods to Protect Your Enterprise

 

Learn how to improve IT security with Microsoft operating systems and tools.
 
Learn
  • Take a look at the security landscape of today and tomorrow.
  • Get tips and practical advice on social media security.
  • Explore advanced Windows defense.
  • Get the details on free tools to protect your Windows environment.
  • Find helpful information on vulnerability and patch management.
  • Learn about top mitigation methods to protect your enterprise.

MVA-2015

Prerequisites: None
Level: 200
URL to start learning: https://www.microsoftvirtualacademy.com/en-us/training-courses/security-in-the-enterprise-11859?l=kHFO1SlXB_1604300474
 
MVASecurity

Note:

The article was originally published by Erdal Ozkaya @ Erdal Ozkaya Personal Blog on September 27th, 2015. It is reproduced on this blog with an author’s permission.

 

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

CISO Magazine Webinar Erdal Ozkaya

CISO Magazine : AI Ultimate Weapon in the War Against Cyber Criminals Free Webinar

CISO Magazine I am extremely proud to announce that I will be speaking at the FREE WEBINAR hosted by CISO Magazine.... read more
MSIgnite Feedback

Halt Hackers Does those tricks works on Windows 10

Halt Hackers : Does those tricks works on Windows 10 More than 2000 attendees were in the session and the feedback... read more

Board Member in Australian Institute of ICT -2019

Serving as Board Member in Australian Institute of ICT I have been invited to be part of the CyberSecurity Advisory board... read more
Hacker Halted Feedback Erdal

Hacker Halted Feedback – 15

Hacker Halted Feedback EC Council's Hacker Halted feedback to Wayne Bruce and I, from their official twitter account Erdal (more…) read more
EDR

Endpoint Detection Response –

Endpoint Detection Response Endpoint Detection Response is a powerful event analysis tool that provides real-time monitoring and detection of malicious events... read more
Tycoon Success Erdal

Cybersecurity Threat Landscape – Current state as of 2022

Cybersecurity Threat Landscape I have some great news to share again, Tycoon Success Magazine has awarded me as Business Leaders to... read more
trusted operating system

E-Mail Crimes and Violations – 1

E-Mail Crimes and Violations This post is written to give you a brief intro about E-Mail Crimes and Violations and how the leakage could... read more
Manage Engine review

A review of Cybersecurity The Beginner’s Guide : Informative Review (March 22 )

A review of Cybersecurity The Beginner's Guide Special thanks to Manage Engine for revieing my book and publishing it in their... read more
Network Security Administrator Erdal

Network Security Administrator (ENSA) Certification Free Short Course -2014

Network Security Administrator This short course is designed to partially prepare you for certification as an EC-Council Network Security Administrator (ENSA). The ENSA... read more
GEC Security Symposium and CISO Awards Erdal

Cybersecurity Professional of the Year Award

Cybersecurity Professional of the Year One more proud moment in my career, today I was awarded as the Cyber Sentinel,... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.