- Platform
- edX
- Provider
- Microsoft
- Effort
- 2-4 hours/week
- Length
- 4 weeks
- Language
- English
- Credentials
- Paid Certificate Available
- Part of
- Course Link
Overview
This course is part of the Microsoft Professional Program in Cybersecurity.
According to the Wall Street Journal, “All IT Jobs Are Cybersecurity Jobs Now.”
In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros--the red team--attacks some part or parts of a company’s security infrastructure, and an opposing group--the blue team--defends against the attack. Both teams work to strengthen a company’s defenses.
You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.
What you'll learn
After completing this course, students will be able to:
Taught by
Orin Thomas
This course is part of the Microsoft Professional Program in Cybersecurity.
According to the Wall Street Journal, “All IT Jobs Are Cybersecurity Jobs Now.”
In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros--the red team--attacks some part or parts of a company’s security infrastructure, and an opposing group--the blue team--defends against the attack. Both teams work to strengthen a company’s defenses.
You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.
What you'll learn
After completing this course, students will be able to:
- Describe the current enterprise security landscape
- Define the Assume Compromise approach
- Practice Red team versus Blue team exercises
- Develop organizational security preparation, processes, and responses
Syllabus
Module 1 Understanding the cybersecurity landscape
Module 1 Understanding the cybersecurity landscape
- The current cybersecurity landscape
- The evolution of attacks
- Understanding “Assume Compromise”
- Examples of compromises
- Red Team versus Blue Team
- Red Team kill chain
- Beachhead
- Lateral movement
- Privileged escalation
- Execution of attacker’s mission
- The Blue Team kill chain
- Restricting privilege escalation
- On-premises network security
- Restrict lateral movement
- Attack detection
- Organizational preparations
- Processes
- CIA Triad
- Developing a strategic roadmap
- Microsoft Security Response Center Exploitability Index
Taught by
Orin Thomas