Defensive Security Of Microsoft 365 - Hands On Training in South Africa

  • Learn via: Classroom
  • Duration: 2 Days
  • Price: From €3,022+VAT
We can host this training at your preferred location. Contact us!

We power your Microsoft 365 security capabilities through our immersive 2-day course featuring hands on labs. Learn Offensive and defensive skills to secure Microsoft 365 environments, ensuring you are equipped and ready to handle security issues from a typical cyber kill chain. Your future. Our passion. Let’s go!

This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions: Business, E3, E5

The event contains 3 modules:

  • Infrastructure protection — Protecting Domain Infrastructure using Microsoft 365 components.
  • Don't pay a Ransom — Protect and recover your data from ransomware attacks.
  • Data leakage prevention — protecting corporate data from unintentional or intentional sharing

Target Audience

  • Security Professionals
  • Microsoft 365 IT Professionals
  • Anyone who has an interest in how to make their Microsoft-based organization more secure with Microsoft 365

Practical Labs- During the course students will create a trial free Microsoft 365 environment, which they will populate with data then implement the security features

Working knowledge of Microsoft 365 technologies.

Instructors will demonstrate features throughout the event. Optional Lab exercises are available for students to complete within a free commercial Microsoft 365 tenancy provided free of charge for each student by QA. This tenancy lasts for 30 days but can be extended free of charge for another 30 days.

Delegates will learn and deploy both offensive/defensive methods to secure Microsoft 365 deployments. This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions; Business, E3, E5.

The event contains 3 modules:

  • Infrastructure protection — Protecting Domain Infrastructure using Microsoft 365 components.
  • Don't pay a Ransom — Protect and recover your data from ransomware attacks.
  • Data leakage prevention — Protecting corporate data from unintentional or intentional sharing

Module 1 – Infrastructure Protection

  • Introduction to Microsoft 365
  • Demo: From Phishing to Domain Admins
  • Demo: Getting Root in Linux
  • Preventing Overpass-the-Hash attack
  • Configuring Windows Defender Credentials Guard
  • Performing and Preventing Pass-the-Ticket attack
  • Detecting Active Directory attacks with User Behaviour Analytics
  • Configuring Microsoft Defender for Identities
  • Advanced Endpoint Protection from the Cloud
  • Configuring Windows Defender for Endpoints

Lab 1.1. Exploring Defender for Identity
Lab 1.2. Configuring Windows Defender for Endpoints
(Optional) Lab 1.3. Cybersecurity challenge

Module 2 - Don't pay Ransom

  • Demo: Ransomware attack
  • Stop phishing using Defender for Office 365
  • Mastering whitelisting with AppLocker
  • Whitelisting on steroids
  • Attack Surface Reduction rules
  • Docs protection with Controlled Folder Access
  • Windows Defender Application Guard - Rock-solid Browser
  • OneDrive for Business. Complete Recovery
  • Tuning Windows Defender Antivirus

Lab 2.1. Configuring and testing Defender for Office 365 with sample ransomware
Lab 2.2. Configuring Windows Defender Controlled Folder Access

Module 3 - Data leakage prevention

  • Endpoint Attacks with Physical Access
  • Device Protection. Configuring Bitlocker
  • Attacks on Mobile Devices
  • Mobile devices protection using Microsoft Endpoint Manager
  • Protect data in the Cloud with Conditional Access & Defender for Cloud Apps
  • User’s documents protection with Sensitivity Labels

Lab 3.1 Configuring Azure AD Conditional Access
Lab 3.2 Exploring Defender for Cloud Apps



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
10 August 2024
Cape Town, Durban, Johannesburg
2 Days
Classroom / Virtual Classroom
12 August 2024
Cape Town, Durban, Johannesburg
2 Days
Classroom / Virtual Classroom
15 August 2024
Cape Town, Durban, Johannesburg
2 Days
Classroom / Virtual Classroom
26 August 2024
Cape Town, Durban, Johannesburg
2 Days
Classroom / Virtual Classroom
27 August 2024
Cape Town, Durban, Johannesburg
2 Days
Classroom / Virtual Classroom
26 August 2024
Cape Town, Durban, Johannesburg
2 Days
Classroom / Virtual Classroom
09 September 2024
Cape Town, Durban, Johannesburg
€3,022 +VAT Book Now
Classroom / Virtual Classroom
01 October 2024
Cape Town, Durban, Johannesburg
2 Days
Defensive Security Of Microsoft 365 - Hands On Training Course in South Africa

Formerly known as Union of South Africa, now officially known as Republic of South Africa is the Southernmost country in Africa. South Africa's population is over 60 million people, which makes the country the world's 23rd-most populous nation. South Africa has three capital cities: executive Pretoria, judicial Bloemfontein and legislative Cape Town, while the largest city is Johannesburg. The official languages of South Africa are Afrikaans, English, Ndebele, Pedi, Sotho, Swati, Tsonga, Tswana, Venda, Xhosa and Zulu.

South Africa can be rainy from November to February, so the best time to visit South Africa is from May to September. Despite the rainy season South Africa is a year-round destination, with varying regional climates. Blyde River Canyon, Durban, Drakensberg, Kruger National Park and of course, Cape Town are the tourist attractions of the country.

Expand your IT knowledge with our comprehensive range of courses, including programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our skilled instructors will facilitate hands-on training and share practical insights, all conveniently conducted at your preferred location within South Africa.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.