Enterprise Security Fundamentals

Orin Thomas, Microsoft

This course provides insight into security practices to improve the security posture of an organization.

According to the Wall Street Journal, "All IT Jobs Are Cybersecurity Jobs Now."

In this course, we examine the concept of Red team - Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros--the red team--attacks some part or parts of a company's security infrastructure, and an opposing group--the blue team--defends against the attack. Both teams work to strengthen a company's defenses.

You'll learn how both the red and blue teams help the business attain a higher level of security, something the securityindustry is now calling the Purple team.

Note: These courses will retire in June. Please enroll only if you are able to finish your coursework in time.

What will you learn

After completing this course, students will be able to:

  • Describe the current enterprise security landscape
  • Define the Assume Compromise approach
  • Practice Red team versus Blue team exercises
  • Develop organizational security preparation, processes, and responses

Dates:
  • 1 April 2020
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

Show?id=n3eliycplgk&bids=695438
NVIDIA
More on this topic:
15-561s05 Information Technology Essentials
This class offers a broad coverage of technology concepts and trends underlying...
15-566s03 Information Technology as an Integrating Force in Manufacturing
In virtually every industry and every firm, information technology is driving...
16535_7324_5 On-Line Business Marketing Revealed by Andy Phillips
Discover The Secrets Of How To Use The Power Of The Internet And The Incredible...
Extensionflag Essential Windows 8, WinRT Modern UI App Development
Windows 8 is a reimagining of the Windows platform; it extends Windows...
175232_b60b Java Master Course: Lite Version
Author: Hitesh Choudhary Learn to program in the Java programming language...
More from 'Computer Science':
72c27b2f-3419-430f-a28f-10dbc7120457-a14087e5df76.small DNA Sequences: Alignments and Analysis
Learn how to align and analyze DNA sequences using web and software based tools...
Cbc86bfc-8b76-4cb9-88d8-faa8a8abd820-50fa32daa1bc.small Software Testing Fundamentals
Learn how to locate software bugs and defects using the latest testing techniques...
7ca98c09-a207-40c7-8a84-b9c48ecdf920-f25c990d1f5f.small Cloud Computing Management
Learn methods for managing cloud computing projects and build an understanding...
91f52ef3-fa3f-4934-9d19-8d5a32635cd4-d99e27f09d19.small Data Science: R Basics
Build a foundation in R and learn how to wrangle, analyze, and visualize data...
B4072f23-f746-43a1-9819-8e3d8b066f38-76465b3bdbcc.small Data Science: Visualization
Learn basic data visualization principles and how to apply them using ggplot2...
More from 'edX':
4e32f396-cd37-43a3-a856-3704a1061849-f64a6df7ccc4.small Leadership and Influence
Develop the skills to motivate and inspire others so you can confidently lead...
E435bd5b-8843-40c8-b260-ce34433d9a0e-a3897f869072.small Global Business Strategy
Learn how to capitalize on opportunities, and manage the challenges of the global...
B093db1a-4553-4ec3-a44b-96c71d1da0a5-b6dc2ba5887a.small Mining for Development: The Taxation Linkage
Understand taxation for development and sustainability in mining. Tax revenues...
C2f40fe6-7bcf-45f5-b1bc-e906563c1f3d-30f087164b1d.small Digital Transformation in Business
Learn about the explosion of technologies that are transforming business and...
7b2ecb24-2874-402b-ad86-473e246cae0c-aa0d4ca8dc73.small RiceX Linear Algebra Part 1
This course is an introduction to linear algebra. You will discover the basic...

© 2013-2019