Computer, Network and Cloud Security Administration

Date Format Fees  
28 May - 31 May, 2024 Classroom ₦300,000 Register
12 Nov - 15 Nov, 2024 Classroom ₦300,000 Register
28 May - 31 May, 2024 Classroom ₦300,000 Register

Event Details

This workshop introduces Security Administrators to tools and skills relevant to proactively secure private, public and hybrid cloud environments, implement and manage security and compliance solutions, respond to threats, and enforce data governance.

CONTENT

 

Attacks, breach detection, and Sysinternals tools

  • Understanding attacks
  • Detecting security breaches
  • Examining activity with the Sysinternals tools

Protecting credentials and privileged access

  • Understanding user rights
  • Computer and service accounts
  • Protecting credentials
  • Privileged Access Workstations and jump servers
  • Local administrator password (LAP) solution

Privileged access management and administrative forests

  • Limiting administrator rights with Just Enough Administration (JEA)
  • Enhanced Security Administrative Environment (ESAE) forests
  • Overview of Microsoft Identity Manager
  • Overview of Just In Time (JIT) administration and Privileged Access Management (PAM)

Securing network traffic

  • Configuring advanced DNS settings
  • Examining network traffic with Message Analyzer
  • Securing and analyzing SMB traffic
  • Understanding network-related security threats
  • Understanding Windows Firewall with Advanced Security
  • Configuring IPsec
  • Datacenter Firewall

Mitigating malware and threats

  • Configuring and managing Antivirus apps (e.g. Windows Defender)
  • Restricting software using AppLocker
  • Configuring and using the Device Guard feature

Analyzing activity with advanced auditing and log analytics

  • Overview of auditing
  • Advanced auditing
  • Windows PowerShell auditing and logging

Securing Application Development, Virtualization & Server-workload Infrastructure

  • Guarded fabric
  • Shielded and encryption-supported virtual machines
  • Using SCT
  • Understanding containers

 Optimizing and protecting data

  • Planning and implementing encryption
  • Planning and implementing BitLocker
  • Protecting data by using Azure Information Protection
  • File Server Resource Manager
  • Implementing classification and file management tasks
  • Dynamic Access Control

 

FOR WHOM:

CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

  • Venue

    Alpha Partners Professional Training Conference Centre. 200, Muritala Mohammed Way (3rd Floor), Yaba Lagos.

Share this course