How do you protect your cloud? Into the Breach

Provided by

Enquire about this course

Overview

Join QA and Circadence for 'Into the Breach' a hands-on cyber defense experience to test drive Microsoft cloud security tools

Shifts to the cloud alter security challenges. It is more important than ever to detect and defend with tools designed to support flexible, dynamic cloud environments.

Now you can!

Virtual event - seats are limited

Through the Project Ares immersive cyber range, you will step into the role of a Cyber Defense Analyst and use M365 cloud security tools to investigate indicators of an advanced threat that is conducting an attack on your network across multiple phases of the kill chain.

Video Introduction

Learning Outcomes

As a participant, you will:
  • Gain hands-on experience with M365 security tools including;
    • Azure Sentinel
    • Microsoft Defender for Identity
    • Microsoft Defender for Office 365
    • Microsoft Cloud App Security
    • Microsoft Defender for Endpoint
  • Experience cyber training with real world accuracy on the Project Ares platform
  • Create new thinking to improve the cyber readiness in your organization
Course Outline

Shifts to the cloud alter security challenges. It is more important than ever to use with tools designed to support flexible, dynamic cloud environments.

This technical, hands-on experience puts you in the driver's seat to test drive Microsoft;s latest security technology including Azure Sentinel, Azure Advanced Threat Protection, Office 365 Advanced Threat Protection, Microsoft Cloud App Security, and Microsoft Defender Advanced Threat Protection.

Real World Accuracy:
Step into the role of a Cyber Defense Analyst and use M365 cloud security tools to investigate indicators of an advanced threat that is conducting an attack on your network across multiple phases of the kill chain.

Intrusion Analysis:
Investigate reports of suspicious emails and anomalous activity to mitigate a spear phishing attack.

Brute Force Analysis:
Track the adversary as they attempt to establish persistence within your network.

Escalation Analysis:
Identify suspicious behaviour and indicators of privilege escalation.

Execution Analysis:
Find unusual behaviours and suspicious files to prevent additional loss of critical data to a ransomware attack.

Enquire

Start date Location / delivery
No fixed date United Kingdom Book now
01132207150 01132207150

Related article

QA's practice director of Cyber Security, Richard Beck, rounds up the latest cyber security news.