Unser vollständiger Seminarkatalog
Was werden Sie in diesem Seminar erlernen?
Agenda
- Introduction to Zero Trust and best practice frameworks
- Introduction to best practices
- Introduction to Zero Trust
- Zero Trust initiatives
- Zero Trust technology pillars part
- Zero Trust technology pillars part 2
- Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Define a security strategy
- Introduction to the Cloud Adoption Framework
- Cloud Adoption Framework secure methodology
- Introduction to Azure Landing Zones
- Design security with Azure Landing Zones
- Introduction to the Well-Architected Framework
- The Well-Architected Framework security pillar
- Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
- Design solutions with best practices for capabilities and controls
- Design solutions with best practices for attack protection
- Design a resiliency strategy for common cyberthreats like ransomware
- Common cyberthreats and attack patterns
- Support business resiliency
- Ransomware protection
- Configurations for secure backup and restore
- Security updates
- Case study: Design solutions that align with security best practices and priorities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Design solutions for regulatory compliance
- Introduction to regulatory compliance
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Address privacy requirements with Microsoft Priva
- Address security and compliance requirements with Azure policy
- Evaluate infrastructure compliance with Defender for Cloud
- Design solutions for identity and access management
- Introduction to Identity and Access Management
- Design cloud, hybrid and multicloud access strategies (including Azure AD)
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Align conditional access and Zero Trust
- Specify requirements to secure Active Directory Domain Services (AD DS)
- Design a solution to manage secrets, keys, and certificates
- Design solutions for securing privileged access
- The enterprise access model
- Design identity governance solutions
- Design a solution to secure tenant administration
- Design a solution for cloud infrastructure entitlement management (CIEM)
- Design a solution for privileged access workstations and bastion services
- Design solutions for security operations
- Introduction to Security operations (SecOps)
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design security information and event management (SIEM) solutions
- Design solutions for detection and response
- Design a solution for security orchestration, automation, and response (SOAR)
- Design security workflows
- Design threat detection coverage
- Case study: Design security operations, identity and compliance capabilities
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Design solutions for securing Microsoft 365
- Introduction to security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate security posture for collaboration and productivity workloads
- Design a Microsoft 365 Defender solution
- Design configurations and operational practices for Microsoft 365
- Design solutions for securing applications
- Introduction to application security
- Design and implement standards to secure application development
- Evaluate security posture of existing application portfolios
- Design security lifecycle strategy for applications
- Secure access for workload identities
- Design a solution for API management and security
- Design a solution for secure access to applications
- Design solutions for securing an organization's data
- Introduction to data security
- Design a solution for data discovery and classification using Microsoft Purview
- Design a solution for data protection
- Design data security for Azure workloads
- Design security for Azure Storage
- Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
- Case study: Design security solutions for applications and data
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Specify requirements for securing SaaS, PaaS, and IaaS services
- Introduction to security for SaaS, PaaS, and IaaS
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
- Design solutions for security posture management in hybrid and multicloud environments
- Introduction to hybrid and multicloud posture management
- Evaluate security posture by using Microsoft Cloud Security Benchmark
- Design integrated posture management and workload protection
- Evaluate security posture by using Microsoft Defender for Cloud
- Posture evaluation with Microsoft Defender for Cloud secure score
- Design cloud workload protection with Microsoft Defender for Cloud
- Integrate hybrid and multicloud environments with Azure Arc
- Design a solution for external attack surface management
- Knowledge check - Design solutions for security posture management in hybrid and multicloud environments
- Design solutions for securing server and client endpoints
- Introduction to endpoint security
- Specify server security requirements
- Specify requirements for mobile devices and clients
- Specify internet of things (IoT) and embedded device security requirements
- Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
- Design solutions for network security
- Design solutions for network segmentation
- Design solutions for traffic filtering with network security groups
- Design solutions for network posture management
- Design solutions for network monitoring
- Knowledge check - Design solutions for network security
- Case study: Design security solutions for infrastructure
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
Zielgruppe
Voraussetzungen
Partner
Infos zur Zertifizierung
Termine
Online
2535,00 EUR zzgl. 19% MwSt.
Online
2535,00 EUR zzgl. 19% MwSt.

Das Besondere an den Kämmer Consulting Trainingscentern
In unseren modern ausgestatteten Schulungscentern in Braunschweig und Magdeburg erwarten Sie nicht nur neuestes Seminarequipment, sondern aktuelle Seminare und praxisorientierte zertifizierte Trainer.
Entspannt ankommen: Damit Ihr Seminartag ohne Stress beginnt, stehen Ihnen bei unseren Schulungscentern genügend Parkplätze zur Verfügung. Der Zugang zu den Seminarräumen ist barrierefrei.
Entspannt lernen: Während des gesamten Seminartages sorgen wir für Ihr leibliches Wohl! Mittags laden wir Sie in eines der umliegenden Restaurants zum Mittagstisch ein (Bei firmeninternen Seminaren können die Konditionen abweichen).
Kompetenz erleben: Bei uns trainieren/coachen nur Menschen, die schon jahrelang bewiesen haben, dass sie zu den Besten Ihres Fachbereichs gehören. Wir überprüfen permanent ihre Qualität und achten auf konstante Weiterbildung.
Entspannt umsetzen: Damit Sie den maximalen Nutzen aus dem Seminarerlebnis ziehen, sind bei uns selbstverständlich alle Seminarunterlagen inklusive. Bleiben dennoch Fragen offen, stehen wir Ihnen an einer exklusiv geschalteten kostenlosen Trainerhotline (0800 8190900) gerne zur Verfügung.
Für alle Fragen steht Ihnen unser Ansprechpartner gern zur Verfügung.

Massgeschneiderte Seminare
Neben unseren knapp 100 offenen Seminarthemen bieten wir Ihnen auch die Möglichkeit individuelle Seminarthemen zusammenzustellen. Vorteil für Sie als Entscheider: Durch individuelle Weiterbildung erwerben Mitarbeiter neue Kenntnisse und Fähigkeiten, die sie dazu befähigen, innovative Lösungen und Ideen zu entwickeln und umzusetzen. Und wie aktuelle Studien zeigen, steigen die Bindung der Mitarbeiter an das Unternehmen sowie die Motivation.
Ausgezeichnet hohe Qualität der Seminare und Trainings
Dieses Urteil fällten unsere Seminarteilnehmer und beurteilten die Qualität der durchgeführten Seminare mit einer Zufriedenheit von über 93 Prozent. Doch nicht nur unsere Kunden sind der Meinung, dass die Qualität unserer Seminare hoch ist. Auch die Hanseatische Zertifizierungsagentur hat unser Bildungsmanagement aktuell wieder auditiert, für gut befunden und uns den Qualitätsstempel DIN EN ISO 9001:2015 verpasst.
Ihr Ansprechpartner: Andreas Stammhammer

Seminarcenter Braunschweig
Gerne stehe ich Ihnen persönlich bei allen Fragen zur Verfügung!Telefon: 0531 70224942
E-Mail: a.stammhammer@kaemmer-consulting.de
Ihre Ansprechpartnerin: Daisy Langner

Leiterin Standort Magdeburg
Gerne stehe ich Ihnen persönlich bei allen Fragen zur Verfügung!Telefon: 0391 8190918
E-Mail: d.langner@kaemmer-consulting.de