Course Overview

The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs.Why Should You Attend?

The NIS 2 Directive Foundation training course provides an introduction to the NIS 2 Directive aiming to help organizations enhance their cybersecurity in the face of ever-emerging cyber threats. This legislation serves as a central role in strengthening cybersecurity within critical infrastructure sectors such as energy, transport, healthcare, and digital services. The PECB NIS 2 Directive Foundation training course covers the fundamental concepts related to the Directive’s requirements. It provides information that will help you understand the best practices for protecting critical infrastructure from cyber threats.

After attending the training course, you can take the exam, and if you successfully pass it, you can apply for a “PECB Certificate Holder in NIS 2 Directive Foundation” credential.

Course Objectives

This training course will help you:

  • Explain the fundamental concepts and definitions of NIS 2 Directive
  • Interpret the main requirements of the NIS 2 Directive for a cybersecurity program
  • Identify the approaches and techniques used for the implementation of NIS 2 requirements

Course Content

  • Day 1: Introduction to fundamental concepts and definitions of NIS 2 Directive
  • Day 2: NIS 2 Directive requirements for the implementation of a cybersecurity program

Course Overview

Chapter 1: Course Introduction

• Course organization

 • Setting the stage

Chapter 2: Digital Transformation

• DX as a practitioner

• DX in the context of cybersecurity

• Cybersecurity as a DX catalyst

Chapter 3: Threat Landscape

• Threat actors: Agile and Creative

• Attacks

• Challenges

• Organizational response to threat landscape

• Absolute prevention not possible

Chapter 4: The Controls

• Initiation and basic

• Foundation

• Organizational and recovery

Chapter 5: Adopt and Adapt

• The context of adopt and adapt

• Cybersecurity and culture

• Where we are

Chapter 6: Adaptive Way of Working

• Introduction to adaptive way to work

• How to get started

Chapter 7: Rapid Adoption and Rapid Adaptation FastTrack™

• Rapid adoption

• Rapid adaptation

Chapter 8: CIIS as a Practice

• Ongoing practice of cybersecurity

• NIST 7-step improvement

• Cybersecurity Maturity Model Certification (CMMC)

• Integrate cybersecurity

Course Objectives

At the conclusion of this class, students will know a practical approach to build and maintain a comprehensive cybersecurity and cyber-risk management program.

Course Content

H0DV8S (hpe.com)

Course Overview

Digital Transformation

• Explain what it means to “become digital”

• Discuss the difference between industrial and digital era

enterprises

• Explain how cybersecurity supports an organization’s digital

Transformation

Understanding Cyber Risks

• Explain the cyber risk equation

• Identify and explain each component of the cyber risk

equation

• Describe the basics of a risk assessment

NIST Cybersecurity Framework Fundamentals

• Explain the genesis of the NIST-CSF

• List and describe the components of the NIST-CSF

• Describe each of the NIST-CSF’s objectives

Core Functions, Categories and Subcategories • Understand and explain

– Core functions

– Framework categories

– Informative references

Implementation Tiers and Profiles

• Understand and explain Implementation Tier terms and

their use

• Understand and explain each Implementation Tier

• Understand and describe the three risk categories

• Understand and explain Profiles and their use

• Understand and describe the use of Profiles when

– Determining gaps

– Identifying and prioritizing focus areas

Cybersecurity Improvement

• Understand and explain how an organization can

approach the adoption and adaptation of the NIST-CSF

• Understand and describe how to implement cybersecurity

controls using an incremental improvement approach

• Understand and describe CIIS as a practice within an

Organization

Chapter 1: Course Introduction

• Course organization

• Setting the stage

Chapter 2: Digital Transformation

• DX as a practitioner

• DX in the context of cybersecurity

• Cybersecurity as a DX catalyst

Chapter 3: Threat Landscape

• Threat actors: Agile and Creative

• Attacks

• Challenges

• Organizational response to threat landscape

• Absolute prevention not possible

Chapter 4: The Controls

• Initiation and basic

• Foundation

• Organizational and recovery

Chapter 5: Adopt and Adapt

• The context of adopt and adapt

• Cybersecurity and culture

• Where we are

Chapter 6: Adaptive Way of Working

• Introduction to adaptive way to work

• How to get started

Chapter 7: Rapid Adoption and Rapid Adaptation FastTrack™

• Rapid adoption

• Rapid adaptation

Chapter 8: CIIS as a Practice

• Ongoing practice of cybersecurity

• NIST 7-step improvement

• Cybersecurity Maturity Model Certification (CMMC)

• Integrate cybersecurity

Course Objectives

Upon completion of this course, students will have:

• The skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF 

• The knowledge to prepare for the NSCP Boot Camp exam (Foundation + Practitioner)

Course Content

H0DV9S (hpe.com)

Course Overview

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Course Objectives

  • Describe basic concepts of security, compliance, and identity.
  • Describe the concepts and capabilities of Microsoft identity and access management solutions.
  • Describe the capabilities of Microsoft security solutions.
  • Describe the compliance management capabilities in Microsoft.

Course Content

Module 1: Microsoft Security, Compliance, and Identity Fundamentals: Describe the concepts of security, compliance, and identity

  • Describe security and compliance concepts
  • Describe identity concepts

Module 2: Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft Entra

  • Describe the function and identity types of Microsoft Entra ID
  • Describe the authentication capabilities of Microsoft Entra ID
  • Describe access management capabilities of Microsoft Entra ID
  • Describe the identity protection and governance capabilities of Microsoft Entra

Module 3: Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft security solutions

  • Describe core infrastructure security services in Azure
  • Describe the security management capabilities in Azure
  • Describe security capabilities of Microsoft Sentinel
  • Describe threat protection with Microsoft Defender XDR

Module 4: Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft compliance solutions

  • Describe Microsoft’s Service Trust portal and privacy capabilities
  • Describe the compliance management capabilities in Microsoft Purview
  • Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview
  • Describe the insider risk capabilities in Microsoft Purview
  • Describe the eDiscovery and Audit capabilities in Microsoft Purview

Course Overview

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Course Objectives

  • Describe the concepts and capabilities of Microsoft identity and access management solutions.
  • Describe the capabilities of Microsoft security solutions.
  • Describe the compliance management capabilities in Microsoft.

Course Content

Module 1: Describe basic concepts of security, compliance, and identity.

Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.

Lessons for module 1

  • Describe security concepts and methodologies.
  • Describe Microsoft security and compliance principles.
  • Module summary

After completing module 1, students will be able to:

  • Describe security concepts and methodologies.
  • Explore the Service Trust Portal.
  • Know where to go to find and review Azure compliance documentation.

Module 2: Describe the concepts and capabilities of Microsoft identity and access management solutions

Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.

Lessons for module 2

  • Describe identity concepts
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD
  • Describe the access management capabilities of Azure AD
  • Describe the identity protection and governance capabilities of Azure AD
  • Module summary

After completing module 2, students will be able to:

  • Describe basic identity concepts.
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD.
  • Describe the access management capabilities of Azure AD.
  • Describe the identity protection and governance capabilities of Azure AD.

Module 3: Describe the capabilities of Microsoft security solutions

Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you’ll explore endpoint protection with Intune.

Lessons for module 3

  • Describe the basic security capabilities in Azure
  • Describe the security management capabilities of Azure
  • Describe the security capabilities of Azure Sentinel
  • Describe the threat protection capabilities of Microsoft 365
  • Describe the security management capabilities of Microsoft 365
  • Describe endpoint security with Microsoft Intune
  • Module summary

After completing module 3, students will be able to:

  • Describe the basic security capabilities in Azure.
  • Describe the security management capabilities of Azure.
  • Describe the security capabilities of Azure Sentinel.
  • Describe the threat protection capabilities of Microsoft 365.
  • Describe the security management capabilities of Microsoft 365.
  • Describe endpoint security with Microsoft Intune.

Module 4: Describe the capabilities of Microsoft compliance solutions

Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.

Lessons for module 4

  • Describe the compliance management capabilities in Microsoft
  • Describe the information protection and governance capabilities of Microsoft 365
  • Describe the insider risk capabilities in Microsoft 365
  • Describe the eDiscovery capabilities of Microsoft 365
  • Describe the audit capabilities of Microsoft 365
  • Describe the resource governance capabilities in Azure
  • Module summary

After completing module 4, students will be able to:

  • Describe the compliance management capabilities in Microsoft.
  • Describe the information protection and governance capabilities of Microsoft 365.
  • Describe the insider risk capabilities in Microsoft 365.
  • Describe the eDiscovery capabilities of Microsoft 365.
  • Describe the audit capabilities of Microsoft 365
  • Describe the resource governance capabilities in Azure

Course Overview

You already completed the preparation course and activated your achievement badge for this course. Now you want to know if you are ready for the exam. Microsoft creates exams based on real world scenarios. These are not necessarily covered in the preparation course you did.

This 2-day exam preparation training will help you to complete your study for certification. During the first day you will run through a selection of hands-on labs guided by a trainer. The second day you will be prepared for the actual exam with practice tests.

Course Content

Trainer guided hands on labs

Trainer guided practice exam

Practice exam

Exam – you will not do the exam during the course

Course Overview

Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR and  Microsoft Defender for Cloud. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

Course Objectives

  • SC-200: Mitigate threats using Microsoft Defender XDR
  • SC-200: Mitigate threats using Microsoft Copilot for Security
  • SC-200: Mitigate threats using Microsoft Purview
  • SC-200: Mitigate threats using Microsoft Defender for Endpoint
  • SC-200: Mitigate threats using Microsoft Defender for Cloud
  • SC-200: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
  • SC-200: Configure your Microsoft Sentinel environment
  • SC-200: Connect logs to Microsoft Sentinel
  • SC-200: Create detections and perform investigations using Microsoft Sentinel
  • SC-200: Perform threat hunting in Microsoft Sentinel

Course Overview

You already completed the preparation course and activated your achievement badge for this course. Now you want to know if you are ready for the exam. Microsoft creates exams based on real world scenarios. These are not necessarily covered in the preparation course you did.

This 2-day exam preparation training will help you to complete your study for certification. During the first day you will run through a selection of hands-on labs guided by a trainer. The second day you will be prepared for the actual exam with practice tests.

Course Objectives

You will be best prepared for the actual exam.

Course Content

Trainer guided hands on labs

Trainer guided practice exam

Practice exam

Exam – you will not do the exam during the course

Course Overview

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics.

This course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

Course Objectives

After completing this course you should be able to:

  • Implement Information Protection in Microsoft 365
  • Implement Data Loss Prevention
  • Implement Data Lifecycle and Records Management
  • Monitor and investigate data and activities by using Microsoft Purview
  • Manage Insider and Privacy Risk in Microsoft 365

Course Content

Module 1: Implement Information Protection in Microsoft 365

  • Introduction to information protection and data lifecycle management in Microsoft Purview
  • Classify data for protection and governance
  • Create and manage sensitive information types
  • Understand Microsoft 365 encryption
  • Deploy Microsoft Purview Message Encryption
  • Create and configure sensitivity labels with Microsoft Purview
  • Apply sensitivity labels for data protection

Module 2: Implement Data Loss Prevention

  • Prevent data loss in Microsoft Purview
  • Implement endpoint data loss prevention (DLP) with Microsoft Purview
  • Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
  • Manage data loss prevention policies and reports in Microsoft 365

Module 3: Implement Data Lifecycle and Records Management

  • Manage the data lifecycle in Microsoft Purview
  • Manage data retention and deletion in Microsoft 365 workloads
  • Manage records in Microsoft Purview

Module 4: Monitor and investigate data and activities by using Microsoft Purview

  • Explore compliance in Microsoft 365
  • Search for content in the Microsoft Purview compliance portal
  • Manage Microsoft Purview eDiscovery (Standard)
  • Manage Microsoft Purview eDiscovery (Premium)
  • Search and investigate with Microsoft Purview Audit

Module 5: Manage Insider and Privacy Risk in Microsoft 365

  • Prepare Microsoft Purview Communication Compliance
  • Manage insider risk in Microsoft Purview
  • Implement Adaptive Protection in Insider Risk Management
  • Implement Microsoft Purview Information Barriers
  • Manage regulatory and privacy requirements with Microsoft Priva
  • Implement privileged access man

Course Overview

Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks – we practiced both options! IIS is a never-ending subject that requires a deep-dive if you consider using it for web farm administration or if you want to become familiar with IIS behavior in particular situations

About the course: During this intensive 4-day training students will be introduced to the process of configuring advanced IIS features, configuring security settings, performing advanced troubleshooting and monitoring. You will learn everything you need to maintain and provide availability to business Web Application platform.

Course Objectives

During this intensive 4-day training students will be introduced to the process of configuring advanced IIS features, configuring security settings, performing advanced troubleshooting and monitoring.

You will learn everything you need to maintain and provide availability to business Web Application platform.

Course Content

Module 1: Introducing, installing and configuring IIS 10 on Windows Server 2019

1. Introducing Internet Information Services 10 a. Administration tools b. Architecture overview c. Configuration System overview

2. Comparing previous versions of IIS

3. Installing the Web Server (IIS) role in Windows Server 2019 a. Discussing the deployment scenarios b. Using Server Manager c. Using Unattended Setup d. Using Command Line e. Troubleshooting installation

4. Post-installation administration tasks a. HTTP Features b. Security Settings c. Logging

Module 2: Administering Web Sites

1. Creating a Web Site, Application, Virtual Directory

2. Managing Security settings for Web Sites

3. Administering Web Site logging

4. Configuring Failed Request Tracing

5. Managing Virtual Directories and remote content

6. Configuring Authentication Types

7. Configuring Bindings

Module 3: Administering Applications and Application Pools

1. Managing Application Pools and Applications

2. Global Application Initializations

3. Managing Application Pool Identity

4. Managing Worker Processes and requests

5. CPU Throttling: Sand-boxing Sites and Applications

6. Idle Worker Process Page-Out

Module 4: Configuring Application Development Settings

1. ASP.NET Security Settings

2. ASP.NET Application Development Settings

3. Configuring ASP.NET

4. Working with .Net Core

Module 5: IIS 10 functionality extensions

1. Architecture Extensions a. CGI b. FastCGI c. ISAPI d. ASP

2. Managing Extensions a. Security b. Delegation

3. Functionality Extensions a. PHP b. WebDAV c. Media Services d. URL Rewrite

4. Performance Extensions a. Application WarmUp

5. Security Extensions a. URLScan / URLRewrite b. Dynamic IP Restrictions

6. Administrative extensions

Module 6: Managing IIS 10 Modules

1. Adding IIS 10 Modules

2. Administering IIS 10 Modules

Module 7: Securing the IIS 10 platform and web environment

1. Configuring security settings on Windows Server 2019

2. Centralized SSL Certificate Support

3. Secure Web Site settings

4. Configuring authentication and authorization

5. Restricting Web Site access

6. Secure Web Server implementation scenario

Module 8: IIS 10 Remote Management

1. Enabling and configuring remote administration

2. Enabling and configuring delegated administration

3. Enabling and configuring feature delegation

4. Managing application Host.config and Web.config access levels

5. Security considerations for remote management

Module 9: Configuring FTP Server on IIS 10

1. Managing FTP Authentication

2. Managing FTP Authorization

3. Configuring FTP Logging

4. Configuring FTP Logon Attempt Restrictions

5. Administering FTP Request Filtering

6. Configuring FTP User Isolation

Module 10: Managing IIS 10 from the command line

1. Tools overview

2. Advanced management with PowerShell

3. Tools for Running Administrative Tasks in IIS

4. Automating management with Appcmd

5. IIS 10 and scripting

6. 3 rd party management tools

Module 11: Tuning IIS 10 health and performance

1. Performance monitoring techniques

2. Monitoring IIS 10 under attack

3. Optimizing IIS 10 settings for better performance

4. Implementation scenarios analysis

5. Dynamic site activation

6. Idle Worker Process Page-out 7. HTTP/2

Module 12: Administering Web Server Availability with Web Farms

1. Shared Configuration

2. Advanced Network Load Balancing settings and configuration

3. Building the Web Farm

4. Managing the Web Farm

5. Automating tasks in multiple server IIS 10 environment

6. Policy based management

7. Server Name Indication (SNI) – SSL Scalability

8. Backing Up an IIS Web Site

9. Restoring an IIS Web site

10. Application Request routing

Module 13: IIS 10 Diagnostics

1. Auditing IIS 10 logs

2. Enhanced Logging

3. Logging to Event Tracing for Windows

4. Common error messages and examples

5. Auditing communication problems and examples

6. Troubleshooting authentication problems

7. Troubleshooting authorization problem