Atmosera Security Training: 4-Day


As systems become more complex and Cloud enters the picture, the attack surface for data & services becomes greater. This 4-day workshop will enable admins with the starting points of where to begin.

More and more emphasis is put on security these days. As systems become more complex and Cloud enters the picture, the attack surface for data and services becomes greater. But where do we begin? Where is the starting point in our knowledge of how to tackle issues or proactively protect our environments? In this 4-day course, we will cover the starting points of where to begin. This will be an overview of technologies, techniques, best practices, and frameworks that are available to help an individual feel comfortable with concepts related to Security in an on-premises, cloud, and hybrid environment.

Key Learning Areas:  Why be Concerned about Security?  Corporate and Enterprise Environment Configurations  Threat Awareness  Security Threats  Threat Mitigation  Proactive Security

Who Should Attend: Cloud Admins, Security Admins, Networking Admins

Prerequisites: Intermediate knowledge of computers and networks. Foundational knowledge of cloud-based infrastructures, such as Microsoft Azure.

Course Outline: Why Be Concerned about Security? It can be easy to say, “Let’s get focused on security”, but there are several domains that must be considered. In this module we’ll cover the top areas of security concern:

 Users  Systems  Networks  Data

Corporate and Enterprise Environment Configurations From traditional environments to new cloud-only environments to those getting the best of both worlds in a hybrid configuration, each one has its own set of benefits and challenges. And all of them require working with operating systems. In this module, we’ll consider:

 Operating Systems o Windows o Linux o macOS  On Premises o Users o Network Infrastructure Components – Software o Network Infrastructure Components – Hardware o Data Stores o Physical and Virtual Machines  Cloud o Identity o Virtual Networking o Storage Accounts o Database systems o Virtual Machines o Container infrastructures  Hybrid o Identity and Access control o Hybrid networks o Hybrid data storage o Hybrid machine environments

Threat Awareness Now that we are aware of the need for security and the different types of environments that most of our organizations support, what do we have to help us understand the risks and exploits? That will be the central theme in this module when we cover:  Mitre ATT&CK  OWASP Top Ten  Zero-Trust model  Azure Security Baselines  Other Security frameworks

Security Threats Since we have an idea of the categories of threats and baselines that can help us see where to begin, what is actually out there to cause us our environments harm? While we cannot cover every scenario, we will cover commonly seen threats. Let’s discover these in this module by taking a close look at:

 Operating Systems o Windows o Linux o macOS  On Premises o Network and software threats o Database threats o Hardware based (physical) machine threats o Software based (virtual) machine threats  Cloud o Virtual Network threats o Database and server threats o Virtual machine threats o Application threats o Container threats  Hybrid o Inter-site security configuration threats o Container exploits  People o Social Engineering o Phishing/Smishing/Vishing o Other people control techniques

Threat Mitigation Ok, the threats are there, we see what we are up against. What do we have to help us thwart or respond to attacks or threats? We will review a number of tools here, in each environment, as well as the importance of education in a security plan for an organization:

 On Premises o Active Directory Group Policy Objects o Security Templates and Policies o Server and Service Best Practices o ITSM/SEIM/SOAR o System Center  Operations Manager  Configuration Manager / Endpoint Manager  Data Protection Manager  Service Manager and Orchestrator  In Cloud o Identity  Identity and Access Control (IAM)  Role Based Access Control (RBAC)  Privileged Identity Management (PIM)  Conditional Access o Networking  Network Security Groups / Application Security Groups  NAT  Azure Firewall o Azure Policy o Azure Monitor  Log Analytics o Intune / Endpoint Manager o Microsoft Defender for Cloud o Microsoft Sentinel  Hybrid o Azure Backup o Azure BluePrints o Azure Monitor  Cultural Awareness o Training o Simulations   Atmosera is a multiple Microsoft Advanced Specialization partner, a top Microsoft Trainer, and an Azure Expert MSP, the highest recognitions possible from Microsoft. We were awarded the IAMCP Worldwide Microsoft Channel Partner of the year in 2018 and 2022, and in 2019 we won the Microsoft US Partner Award for Intelligent Cloud. You can’t be in better hands than with Atmosera.