Introduction to Python Programming for Security Analysts & Professionals

Geared for experienced security professionals new to Python, Python Programming for Security Analysts & Professionals is practical, hands-on Python training course that leads the student from the basics of writing and running Python scripts to more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python…

DevSecOps with GitHub and Microsoft Cloud Adoption Framework

This class is geared toward helping those that work in the development, security, and operational aspects of a cloud computing environment to understand what tools are at their disposal to create an efficient DevSecOps environment using GitHub and Microsoft Cloud Adoption Framework (CAF). This course introduces best practices, tools, and features of GitHub and Microsoft…

AZ-700: Designing and Implementing Microsoft Azure Networking Solutions

This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network…

MS-101: Microsoft 365 Mobility and Security

This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions…

MS-100: Microsoft 365 Identity and Services

This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management. In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase…

SC-300: Microsoft Identity and Access Administrator

The SC-300 Certification: Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for…

SC-200: Microsoft Security Operations Analyst

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyber threats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and…

SC-400: Microsoft Information Protection Administrator

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics. The course was designed for the Information…

Microsoft Azure AD B2C

This course teaches Developers how to work with the Azure AD B2C service, how to integrate it into their applications, and how to customize its appearance and behavior. Developers will learn how to create and configure an Azure AD B2C tenant and how to produce complex, real-world B2C applications through the use of custom policies.

AZ-500: Microsoft Azure Security Technologies

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

Docker Security

Building containerized applications has revolutionized the process of developing and running microservices.  Instead of worrying about underlying system dependencies, container images include all of the necessary components to run an application on any platform, they are much smaller which makes them more portable, and enables simplified autoscaling. Docker is designed to make it easier to…