Microsoft 365 Security Administration (MS-500T00-A)
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.
Audience Profile: The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.
Program:
- Module 1: User and Group Management
- Module 2: Identity Synchronization and Protection
- Module 3: Identity and Access Management
- Module 4: Security in Microsoft 365
- Module 5: Threat Protection
- Module 6: Threat Management
- Module 7: Microsoft Cloud Application Security
- Module 8: Mobility
- Module 9: Information Protection and Governance
- Module 10: Rights Management and Encryption
- Module 11: Data Loss Prevention
- Module 12: Compliance Management
- Module 13: Insider Risk Management
- Module 14: Discover and Respond
Learning methods: Practical exercise, independent work.
Assesment methods: Execution of independent work.
Assesment form: Independent practical tasks on relevant topics.
Price includes:
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.
Lektori CV
AZ-104T00 Microsoft Azure Administrator
Koolituse eesmärk: Koolitusel osalejad saavad vajalikud põhioskused Microsoft Azure kasutuselevõtuks ja haldamiseks.
4-nädala jooksul toimuv koolitus sisaldab iseseisvat tööd kui ka veebiseminare lektoriga.
Koolitusele on oodatud:
- Microsoft Azure alustavad administraatorid;
- ettevõtte IT-spetsialistid;
- kõik, kes soovivad ettevõttes alustada Azure juurutamist või lihtsalt täiendada oma teadmisi Azure põhiliste haldusoskuste osas. Mõningased kogemused Azure administreerimisega on soovitatavad kursuse edukaks läbimiseks.
Õppevahendid: Osalejal läheb vaja töötava mikrofoni ja kaameraga arvutit, soovitavalt lisaekraani ning stabiilset internetiühendust. Koolitusel on soovitav kasutada Windows operatsioonisüsteemi arvutit.
Neil, kellel puudub vajalik arvuti on võimalik seda rentida kokkuleppel BCS Koolitusega.
Valdavad inglise keelt tasemel, mis võimaldab iseseisvalt aru saada õppematerjalidest, iseseisvalt õppida ja vajadusel oma mõtteid sõnastada (soovitavalt tase B1).
Programm:
- Azure haldusvahendid
- Identiteetide haldus ja halduse juhtimine reeglitega
- Virtuaalvõrgud, võrgu turvagrupid, võrkude sidumine
- Nimeteenus, marsruutimine
- Koormusjaotur, rakenduslüüs, võrgu jälgimine
- Salvestuskontod, blob ja faili tüüpi salvestus
- Virtuaalmasinad ja kõrgkäideldavus
- Veebiserveri teenus ja konteinerid
- Varundus ja virtuaalmasinate varundamine
- Probleemilahenduse kiirendamine teavituste abil
Koolitus põhineb Microsofti ametliku koolituse „AZ-104 Microsoft Azure Administrator“ ingliskeelsetel materjalidel.
Õppemeetodid: Koolitus põhineb Microsoft AZ-104T00-A „Microsoft Azure Administrator“ ametlike materjalide ja laborite baasil.
Õppetöö toimub suhtluskanalis MS Teams
Korralised veebinarid toimuvad veebikeskkonnas MS Teams, reedeti, üks kord nädalas, korraga 2 akadeemilist tundi.
Kellaaeg: 9:15-10:45
Erand:
1. sissejuhatav veebinar kestab 1 akadeemiline tund 9:15 – 10:00
Koolituse kogumaht on 33 tundi (4 õppenädalat), seal hulgas:
24 tundi iseseisvat õpet koos praktiliste harjutustega (harjutused on mõeldud teemade kaupa õppetöö toetamiseks ja neid tehakse selleks spetsiaalselt ette valmistatud pilvekeskkonnas asuvates virtuaalmasinates).
9 tundi veebiseminari eksperdiga.
Hindamiskriteerium: Õpiväljundite saavutamist hinnatakse koolituse ajal läbi viidud tagasisidestatud praktiliste harjutuste põhjal.
Koolituse lõpetamine:
Koolituse lõpetaja saab tunnistuse kui koolituse õpiväljundid on saavutatud. See tähendab:
- sooritab kõik koolituse jooksul etteantud praktilised harjutused;
- sooritab ametliku proovieksami iseseisvalt vähemalt tulemusele 50%;
- osaleb vähemalt 75% kontakttundides
Osalejatele, kes õpiväljundeid saavutanud ei ole väljastatakse soovi korral tõend koolitusel osalemise kohta.
Hind sisaldab: Ligipääsu koolituskeskkonda iseseisvaks õppeks, suhtluskanalisse Ms Teams ja regulaarseid veebiseminare (koos salvestisega).
Ligipääsu Microsoft AZ-104 kursuse ametlikku õppelaborisse ja vabalt valitud ametliku eksami sooritamist (ei sisalda korduseksami tegemist)
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.
Microsoft Azure Security Technologies (AZ-500T00-AC)
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.
This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization’s data.
Programm:
- Module 1: Manage Identity and Access
- Module 2: Implement Platform Protection
- Module 3: Secure Data and Applications
- Module 4: Manage Security Operations
Learning methods: Practical exercise, independent work.
Assesment methods: Execution of independent work.
Assesment form: Independent practical tasks on relevant topics.
Price includes:
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.
Lektori CV
Microsoft Azure Fundamentals (AZ-900T00-A)
This course introduces Azure and the Microsoft services students can use to create cloud computing solutions. This course provides foundational level knowledge on Azure concepts; core Azure services; core solutions and management tools; general security and network security; governance, privacy, and compliance features; Azure cost management and service level agreements.
This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam.
Program:
- Module 1: Cloud Concepts
- Module 2: Azure architecture and services
- Module 3: Azure management and governance
Learning methods: Practical exercise, independent work.
Assesment methods: Execution of independent work.
Assesment form: Independent practical tasks on relevant topics.
Price includes:
- coffee breaks and lunch
- Free Microsoft certification exam within the period of 6 months after finishing the course
Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus
Lektori CV
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 8, which includes VMware ESXi™ 8 and VMware vCenter Server® 8. This course prepares you to administer a vSphere infrastructure for an organization of any size.
This course is the foundation for most of the other VMware technologies in the software-defined data center.
Program:
- Course Introduction
- vSphere and Virtualization Overview
- Installing and Configuring ESXi
- Deploying and Configuring vCenter
- Configuring vSphere Networking
- Configuring vSphere Storage
- Deploying Virtual Machines
- Managing Virtual Machines
- Deploying and Configuring vSphere Clusters
- Managing the vSphere Lifecycle
Target audience: System administrators, system engineers.
Learning methods: Practical exercise, independent work.
Assesment methods: Execution of independent work.
Assesment form: Independent practical tasks on relevant topics.
More information:
- Read more about the class from here
Õppekavarühm: 0613 Tarkvara ja rakenduste arendus ning analüüs.
Lecturer’s Linkedin
VMware vSphere: Troubleshooting [V8]
This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere® Client™, log files, and other tools to analyze and solve problems.
NB! Koolitus toimub inglise keeles!
This course requires completion of one the following courses:
- VMware vSphere: Install, Configure, Manage
- VMware vSphere: Operate, Scale and Secure
The course material presumes that you can perform the following tasks with no assistance or guidance before enrolling in this course:
- Install and configure ESXi
- Install vCenter Server
- Create vCenter Server objects, such as data centers and folders
- Create and modify a standard switch
- Create and modify a distributed switch
- Connect an ESXi host to NAS, iSCSI, or Fibre Channel storage
- Create a VMware vSphere VMFS datastore
- Modify a virtual machine’s hardware
- Migrate a virtual machine with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
- Configure and manage a VMware vSphere® Distributed Resource SchedulerTM cluster
- Configure and manage a VMware vSphere HA cluster
Basic knowledge of command line tools like ESXCLI, DCLI, and PowerCLI If you cannot complete these tasks, VMware recommends that you take the VMware vSphere: Install, Configure, Manage [V8] course instead.
Program:
-
- Introduction to Troubleshooting
- Troubleshooting Tools
- Troubleshooting Virtual Networking
- Troubleshooting Storage
- Troubleshooting vSphere Clusters
- Troubleshooting Virtual Machines
- Troubleshooting vCenter Server and ESXi
By the end of the course, you should be able to meet the following objectives:
- Describe troubleshooting principles and procedures
- Use the vSphere Client, the command line, and log files to configure, diagnose, and correct problems in vSphere
- Explain the key vSphere log files from troubleshooting perspective
- Describe the benefits and capabilities of VMware Skyline
- Identify the networking issues by examining the reported symptoms, and troubleshoot the reported problems
- Identify the storage issues by examining the reported symptoms, and troubleshoot the reported problems
- Troubleshoot vSphere cluster failure scenarios and analyze possible causes
- Diagnose common VMware vSphere® High Availability (vSphere HA) problems and provide solutions
- Trouble virtual machine problems, including migration problems, snapshot problems, and connectivity problems
- Identify VMware ESXi™ host and VMware vCenter Server® problems, analyze failure scenarios, and find resolutions
- Troubleshoot performance problems with vSphere components
More information:
- Read more about the course here.
Õppekavarühm: 0613 Tarkvara ja rakenduste arendus ning analüüs.
Lecturer’s Linkedin
Tasuta veebinar: Üldhariduskoolide distantsõppe ja digitaalse koostöö lahendus Office 365’s
Veebinari slaidid on leitavad siit.
Veebinar seletab lahti BCSi väljatöötatud üldhariduskoolide lahenduse Microsofti Office 365 platvormil kvaliteetsete videoloengute ja digitaalse õppetöö läbiviimiseks distantsilt. Lahendus on loodud koolide, lastevanemate ja omavalitsuse vajadustest ja tagasisidest lähtudes. Lahenduse eesmärgiks on pakkuda koolidele ühtset keskselt toetatud platvormi:
✅ Kindlat keskkonda, millega on seotud kõik kooli õpetajad ja õpilased.
✅ Võimalus teha kvaliteetseid videoloenguid ja teostada õppetööd distantsilt.
- Võimalus teha digitaalset koostööd dokumentidega, grupitööd ja suhtlust
✅ Kvaliteetset kooli E-posti teenust õpetajatele ja õpilastele (mille haldus ei oleks kooli kanda).
✅ Lisaks on võimalik kasutusele võtta spetsiaalselt koolile suunatud teenused:
- Õppeülesannete püstitamine ja tähtaegade automaatne jälgimine
- automaatselt kontrollitavate kontrolltööde ja testide loomine ning läbiviimine
- HAR ID liidestuse loomine
Lahenduse jaoks on koolidel vaja Microsoft Office 365 A1 litsentse, mis on koolidele tasuta.
Loe lahendusest lähemalt.
Veebinar toimub videokonverentsi keskkonnas Teams.
Veebinaril osalemiseks märgi ennast koolitusele huviliseks. Veebinaril osalemise lingi saadame huvilistele e-maili peale.
Eelteadmised: Ei ole vaja
Õppemeetodid: Loeng, iseseisev kaasa töötamine
Hindamismeetod: Õpitulemuste saavutamist veebinari käigus ei hinnata
Hindamiskriteerium: –
BCS Koolitus pakub soovijatele rentimiseks arvuteid ja monitore. Vaata pakkumist.
Web Application Security (WAS)
Web Application Security (WAS) is an eye-opening practical security course for anyone involved with development, testing and upkeeping of web applications on a daily basis.
Training duration: a total of 4 days of highly practical information heavily mixed with hands-on labs: two days of Server-Side attacks (directly attacking the server itself) and two days of Client-Side attacks (attacks that incorporate the victim’s browser).
Target audience: WebApp developers, testers, QA, maintainers, team leads, project leads, web server or hosting providers / administrators, information security specialists and managers.
Server-Side attacks module (2 days):
- Security, security related terminology
- Factors for calculating risk
- Information sources
- The HTTP protocol and communication, using intercepting proxies
- Web application architectures – REST vs “oldschool”
- Building a defense (user input, input validation, encoding, sanitization, defense layers)
- Authentication (passwords and hashes; rules, common misunderstandings and mythsrelated to passwords)
- Authorization (lacking access controls)
- Unintended information leakage (using search engines, metadata from files)
- Business logic issues
- SQL injection – detection, query and database structure identification, blind and partially blind attacks, incorrect defenses and bypasses
- Command injection
- Web server configuration issues
- Path traversal
- File inclusion attacks (LFI, LFI2RCE)
- File upload and processing (bypassing incorrect defenses, ZIP and XML features)
- Server-Side Request Forgery (SSRF)
- XML eXternal Entity (XXE)
Client-Side attacks module (2 days):
- Browser security policies and terminology
- Cross-Site Script (XSS) – what it is and what it is not
- Web Content Injection attacks (HTML injection, JavaScript injection)
- URL encoding, URL manipulation
- Referrer, Referrer-Policy
- Content Execution Attacks
- Web Content Execution from uploaded files (HTML, XMl, SVG)
- Serving files, Content-Disposition header
- Using 3rd party content
- HTTP response headers (Content-Security-Policy (CSP), X-Content-Type-Options, StrictTransport-Security)
- Browser storages
- Cookies, setup and parameter nuances
- Web Storage API
- Session, session hijacking and session fixation attacks
- Client-Side Request Forgery attacks
- Cross-Origin Resource Sharing (CORS), CORS-safelisted and pre-flight requests, related headers
- UI Redress Attacks (ClickJacking)
Training methods: Our course employs a dynamic blend of theoretical concepts and hands-on application. Through interactive lectures, engaging discussions, and immersive labs, participants actively experience web application security. Everyone, regardless of their background, will successfully complete the labs, either independently or with guidance from our expert instructors. By placing you in the attacker’s shoes within our dedicated lab environment, we transform theoretical knowledge into practical skills. Instructors leverage real-world case studies and storytelling from penetration tests to provide a vivid and relatable learning experience. This approach ensures that participants not only grasp the intricacies of security principles but also gain the practical know-how to navigate and secure real-world scenarios.
Ideology of this training: At the core of our course is the belief that understanding the offensive side is paramount to effective defense. The “Attack to Defend” motto encapsulates this ideology, emphasizing the importance of practical knowledge. We go beyond traditional approaches, challenging outdated terms and providing insights into cutting-edge techniques. The course is designed not just to teach security principles but to instill a proactive mindset, empowering you to anticipate and thwart potential threats.
Intended outcome: By the end of this course, participants will possess the expertise to architect inherently secure software, integrating robust defense mechanisms seamlessly into the development process.Security will be ingrained as a proactive element, enabling participants to identify vulnerabilities early and build resilient applications from the ground up. Whether you’re a security enthusiast, developer, or IT professional, this program equips you to confidently create digital landscapes where security is not an addition but an integral part of the development lifecycle.
More information read from here.
Andmepõhise ettevõtte ABC: Äri ja IT koostöö päriselu näidetel
Koolituse eesmärgiks on aidata päriselu näidete abiga mõista, kuidas ja milliste vahenditega saadakse andmetest rohkem väärtust. Käsitleme andmete elutsüklit (tekkimine, töötlemine, kasutamine, arhiveerimine) nii ärilisest kui tehnilisest vaatevinklist. Tutvustame tänapäevaste andmeplatvormide põhimõtteid ning näitame, millist lisaväärtust võib saada pilvetehnoloogiate kasutamisest — tuues näiteid Microsoft Azure, Amazon Web Services ja Google keskkondadest. Kirjeldame parimaid praktikaid, mida silmas pidada, et andmeplatvormide juurutamine ja kasutamine toimuks kiiresti, efektiivselt, kvaliteetselt ja turvaliselt.
Eelteadmised: Üldised teadmised IT projektidest. Visuaalsete BI töövahendite kasutamise oskus ja algteadmised programmeerimisest on kasulikud, aga mitte kohustuslikud.
Sihtgrupp: CTO-d, ärianalüütikud, tooteomanikud, IT projektijuhid, IT arhitektid ja kõik, kes kasutavad andmeid oma igapäevatöös äriotsuste tegemiseks.
Koolitus koosneb kolmest peamisest teemast, mis katavad ära andmete elutsükli kõik etapid ning annavad laiema pildi erinevatest andmepõhistest kasutuslugudest ja tehnoloogiatest nende ellurakendamiseks. Koolituse käigus on osalejatel võimalus praktikas järele proovida üritusel omandatud teoreetilisi teadmisi.
- Andmed
- Andmed vs Info. Erinevad andmeliigid ja nende modelleerimine
- Andmete väärindamine
- Andmehaldus (data governance, master data management)
- Tehnoloogiad ja kasutuslood
- Operatiivsüsteemid, andmelaod, andmeplatvormid
- Relatsioonilised andmebaasid, analüütilised andmebaasid, hajussüsteemid, reaalajalähedane andmetöötlus, pilvetehnoloogiad
- Aruandlus, ärianalüüs, masinõpe
- Töömeetodid
- Äri vs IT
- Agiilne arendus
- Uute lahenduste piloteerimine
Õppemeetod: Praktilised harjutused, iseseisev töö.
Hindamismeetod: Iseseisvate tööde sooritamine.
Hindamiskriteerium: Õpiväljundite saavutamist kontrollitakse läbi iseseisva praktilise töö.
Hind sisaldab:
- kohvipause koolituskeskuses ja ühist lõunat
Veeam Certified Engineer (VMCE) v9
Audience
This course is suitable for anyone responsible for managing or deploying Veeam Availability Suite.
Prerequisites
Students should be experienced professionals with a solid understanding of servers, storage, networks and virtualization
Certification
Completion of this course satisfies the prerequisite for taking the VMCE v9 exam.
Objectives
After completing this course attendees should be able to:
- Demonstrate a clear understanding of Veeam Availability Suite and how to work with the components relevant to
their environment
- Effectively manage data availability in onsite, offsite, cloud and hybrid environments
- Ensure both Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) are met
- Deploy and configure Veeam Availability suite for their environment, ensuring data is protected effectively and
performance of CPU, network and storage is maximized
- Provide visibility of the business data assets, produce effective reports and dashboards to monitor performance and risks
- Conduct basic troubleshooting and analysis
More information here