0345 4506120

Microsoft 365 Hacking Workshop

Special Notices

Please note: Due to the dynamic nature of updates to Office 365 functionality by Microsoft, elements of the syllabus of this course can be subject to change without notice.

This course is one of our unique Office 365 Mastering courses. Others within the curriculum for Office 365 are:

  • Exchange Online and Exchange Hybrid
    • Mastering Exchange Online Administration – 3 days
    • Mastering Exchange Hybrid Deployments – Hands on – 3 days
  • Sharepoint Online and Sharepoint Hybrid
    • Mastering Sharepoint Online Design, Architecture and Best Practice Administration – 5 days
    • Mastering Sharepoint 2016 Hybrid Deployments – Hands on – 3 days
  • Office 365 Teams
    • Mastering Office 365 Teams Deployment and Administration – 3 days
  • Office 365 governance, compliance and security
    • Mastering GDPR, Governance, Security and Compliance in Office 365 - 5 days
  • Sharepoint and Office 365 Modern Development
    • Mastering Modern Sharepoint and Office 365 Development
  • Microsoft Flow and Microsoft PowerApps
    • Building Business Solutions with Microsoft PowerApps and Flow – 3 days

Overview

We power your Microsoft 365 security capabilities through our immersive 2-day course featuring hands on labs. Learn Offensive and defensive skills to secure Microsoft 365 environments, ensuring you are equipped and ready to handle security issues from a typical cyber kill chain. Your future. Our passion. Let’s go!

This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions: Business, E3, E5

The event contains 3 modules:

  • Infrastructure protection — Protecting Domain Infrastructure using Microsoft 365 components.
  • Don't pay a Ransom — Protect and recover your data from ransomware attacks.
  • Data leakage prevention — protecting corporate data from unintentional or intentional sharing

Target Audience

  • Security Professionals
  • Microsoft 365 IT Professionals
  • Anyone who has an interest in how to make their Microsoft-based organization more secure with Microsoft 365

Practical Labs- During the course students will create a trial free Microsoft 365 environment, which they will populate with data then implement the security features

Select specific date to see price, venue and full details.

Learning Objectives

Delegates will learn and deploy both offensive/defensive methods to secure Microsoft 365 deployments. This course covers Microsoft 365 security features pertaining to various Microsoft 365 subscriptions; Business, E3, E5.

The event contains 3 modules:

  • Infrastructure protection — Protecting Domain Infrastructure using Microsoft 365 components
  • Don't pay a Ransom — Protect and recover your data from ransomware attacks
  • Data leakage prevention — Protecting corporate data from unintentional or intentional sharing

Pre-Requisites

Working knowledge of Microsoft 365 technologies.

Course Content

Module 1 – Infrastructure Protection

  • Introduction to Microsoft 365
  • Demo: From Phishing to Domain Admins
  • Demo: Getting Root in Linux
  • Preventing Overpass-the-Hash attack
  • Configuring Windows Defender Credentials Guard
  • Performing and Preventing Pass-the-Ticket attack
  • Detecting Active Directory attacks with User Behavior Analytics
  • Comparing Microsoft ATA and Azure ATP
  • Configuring Azure ATP
  • Advanced Endpoint Protection from the Cloud
  • Configuring Windows Defender ATP

Lab 1.1. Exploring Azure ATP
Lab 1.2. Configuring Windows Defender ATP
(Optional) Lab 1.3. Cybersecurity challenge

Module 2 - Don't pay Ransom

  • Demo: Ransomware attack
  • Stop phishing using Office 365 ATP
  • Mastering whitelisting with AppLocker
  • Whitelisting on steroids
  • Attack Surface Reduction rules
  • Docs protection with Controlled Folder Access
  • Windows Defender Application Guard - Rock-solid Browser
  • OneDrive for Business. Complete Recovery
  • Tuning Windows Defender Antivirus

Lab 2.1. Configuring and testing Office 365 Advanced Threat Protection with sample ransomware
Lab 2.2. Configuring Windows Defender Controlled Folder Access

Module 3 - Data leakage prevention

  • Endpoint Attacks with Physical Access
  • Device Protection. Configuring Bitlocker
  • Attacks on Mobile Devices
  • Mobile devices protection using Microsoft Intune
  • Protect data in the Cloud with Conditional Access & Cloud App Security
  • User’s documents protection with Azure Information Protection

Lab 3.1 Configuring Azure AD Conditional Access
Lab 3.2 Exploring Cloud App Security

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Our Customers Include