Microsoft Power Platform

Learn how to work together to meet challenges effectively with Microsoft Power Platform by analyzing data, building apps, automating processes, and creating virtual agents. The Microsoft Power Platform is more than the sum of its parts. Connect them together—and to Office 365, Dynamics 365, Azure, and hundreds of other apps—and build end-to-end business solutions. Get certified today.

 

Recommended Training

 

Power Platform Roles:

 

For further enquiry, please contact us at:

Iverson Associates Sdn Bhd (303330-M)
Tel: +603 7726 2678 // +6012 602 6277
E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Additional Info

  • Certification Course & Certificate
  • Exam Price Exclude
  • Principals Microsoft

Learn how to work together to meet challenges effectively with Microsoft Power Platform by analyzing data, building apps, automating processes, and creating virtual agents. The Microsoft Power Platform is more than the sum of its parts. Connect them together—and to Office 365, Dynamics 365, Azure, and hundreds of other apps—and build end-to-end business solutions.

In this session, you will learn what power platform is and we will get started on what building an app looks like and find out where you can get started with your own apps after the session and take your learning even further.

 

Agenda:

  • A quick overview of the platform
  • A new app in minutes
  • No code & low code
  • Automation made easy

 

Who should join:

Developers or users who aspire to improve productivity by automating business processes, analyzing data to produce business insights, and acting more effectively by creating simple app experiences.

 

Event Details:

28 April 2021  |  9am-12pm GMT+8

*Name:
Please insert your name
*Company:
Please insert your company name
*Designation:
Please insert your designation
*Email:
Please insert your email address
*Mobile:
Please insert your mobile no.
*How you find out about this event?
Please choose one
Please specify
Verification is required

The VILT link will be sent to your registered email 2 days before the event. 

For more information, kindly email : This email address is being protected from spambots. You need JavaScript enabled to view it. (Senior Marketing Executive of Iverson Associates). Thank you.

 

Microsoft is launching a new portfolio of security certifications. Security is critically important to our customers and we’ll focus on the newest innovations we’re making to simplify and modernize our customers security environments by embracing the reality that the past one year has likely reshaped the next 10 years of security and digital transformation. Get certified today.

 

Recommended Training

 

Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Are you looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services and demonstrate to others that you have that knowledge? Be one of the first to do just that by taking the new Microsoft Security Fundamentals exam.

 

Exam SC-200: Microsoft Security Operations Analyst

Do you collaborate with organizational stakeholders to secure information technology systems for the organization and reduce organizational risk by rapidly remediating active attacks in the environment? Do you advise on improvements to threat protection practices and refer violations of organizational policies to appropriate stakeholders? Do you investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products?  Welcome to the world of Security Operations Analyst.

 

Exam SC-300: Microsoft Identity and Access Administrator

Do you design, implement, and operate an organization’s identity and access management systems by using Azure AD?  Do you manage tasks such as providing secure authentication and authorization access to enterprise applications? Do you troubleshoot, monitor, and report the identity and access environment? If so, you are the right person to be taking the new Microsoft Identity and Access exam.

 

Exam SC-400: Microsoft Information Protection Administrator

Do you plan and implement controls that meet organizational compliance needs? Do you translate requirements and compliance controls into technical implementation and assist organizational control owners to become and stay compliant?  Do you work with stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization? Do you define applicable requirements, test IT processes and operations against those policies and controls, and create policies and rules for content classification, data loss prevention, governance, and protection? If so, it sounds like you’re an Information Protection Administrator, and we need your help.

 

FAQ

I’ve been certified on the existing security certifications MS-500 “Microsoft 365 Security Administrator” or AZ-500 “Azure Security Engineer.” How are the new Security, Compliance, and Identity certifications different?

The new Security, Compliance, and Identity certifications are more focused on more discreet job roles.  For example, whereas the Azure Security Engineer Associate (AZ-500) Microsoft 365 Security Administrator Associate (MS-500) certifications are composed of about 25% Identity and Access Management objectives, the new Identity and Access Administrator certification (exam SC-300) is entirely focused on identity and access management. 

Another example – the Microsoft 365 Security Administrator Associate certification (exam MS-500) was composed of 15-20% information protection objectives, whereas the Information Protection Administrator Associate certification (exam SC-400) is entirely focused on those objectives.

 

For further enquiry, please contact us at:

Iverson Associates Sdn Bhd (303330-M)
Tel: +603 7726 2678 // +6012 602 6277
E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Additional Info

  • Certification Course & Certificate
  • Exam Price Exclude
  • Principals Microsoft

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

Additional Info

  • Certification Course & Certificate
  • Course Code SC-400T00
  • Price RM2300
  • Exam Price Exclude
  • Exam Code SC-400
  • Duration 2 Days
  • CertificationInfo Microsoft Certified: Information Protection Administrator Associate
  • Principals Microsoft
  • Schedule

    5-6 Apr 2021

    31 May - 1 Jun 2021

    5-6 Jul 2021

    2-3 Aug 2021

    4-5 Oct 2021

    29-30 Nov 2021

  • Audience

    The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant. They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies. This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

  • Prerequisities

    Before attending this course, students should have:

    • Foundational knowledge of Microsoft security and compliance technologies.
    • Basic knowledge of information protection concepts.
    • Understanding of cloud computing concepts.
    • Understanding of Microsoft 365 products and services.
  • At Course Completion

    After completing this course, students will be able to:

    • Explain and use sensitivity labels.
    • Configure Data Loss Prevention policies.
    • Secure messages in Office 365.
    • Describe the information governance configuration process.
    • Define key terms associated with Microsoft’s information protection and governance solutions.
    • Explain the Content explorer and Activity explorer.
    • Describe how to use sensitive information types and trainable classifiers.
    • Review and analyze DLP reports.
    • Identify and mitigate DLP policy violations.
    • Describe the integration of DLP with Microsoft Cloud App Security (MCAS).
    • Deploy Endpoint DLP
    • Describe records management
    • Configure event driven retention
    • Import a file plan
    • Configure retention policies and labels
    • Create custom keyword dictionaries
    • Implement document fingerprinting
  • Module 1 Title Implement Information Protection in Microsoft 365
  • Module 1 Content

    Organizations require information protection solutions to protect their data against theft and accidental loss. Learn how to protect your sensitive information. Learn how Microsoft 365 information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels. Learn about the information available to help you understand your data landscape and know your data. Learn how to use sensitive information types to support your information protection strategy. Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate are not hindered.

    Lessons

    • Introduction to information protection and governance in Microsoft 365
    • Classify data for protection and governance
    • Create and manage sensitive information types
    • Describe Microsoft 365 encryption
    • Deploy message encryption in Office 365
    • Configure sensitivity labels
    • Apply and manage sensitivity labels

    Lab : Implement Information Protection

    • Assign permissions for compliance
    • Manage Office 365 message encryption
    • Manage Sensitive Information Types
    • Manage Trainable Classifiers
    • Manage Sensitivity Labels

    After completing this module, students will be able to:

    • Describe Microsoft’s approach to information protection and governance.
    • List the components of the Data Classification solution.
    • Describe how to use sensitive information types and trainable classifiers.
    • Implement document fingerprinting
    • Create custom keyword dictionaries
    • Deploy message encryption in Office 365
  • Module 2 Title Implement Data Loss Prevention in Microsoft 365
  • Module 2 Content

    In this module we discuss how to implement data loss prevention techniques to secure your Microsoft 365 data. Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization. Learn how to configure and implement data loss prevention policies and integrate them with Microsoft Cloud App Security. Learn how to respond to and mitigate data loss policy violations.

    Lessons

    • Prevent Data loss in Microsoft 365
    • Implement Endpoint data loss prevention
    • Configure DLP policies for Microsoft Cloud App Security and Power Platform
    • Manage DLP policies and reports in Microsoft 365

    Lab : Implement Data Loss Prevention

    • Manage DLP policies
    • Mange Endpoint DLP
    • Test DLP policies
    • Mange DLP reports

    After completing this module, students will be able to:

    • Describe the information protection configuration process.
    • Articulate deployment and adoption best practices.
    • Describe the integration of DLP with Microsoft Cloud App Security (MCAS).
    • Configure policies in Microsoft Cloud App Security.
    • Review and analyze DLP reports.
    • Identify and mitigate DLP policy violations.
    • Mitigate DLP violations in MCAS.
  • Module 3 Title Implement Information Governance in Microsoft 365
  • Module 3 Content

    In this module you will learn how to plan and implement information governance strategies for an organization. Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don't. Learn how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services. Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.

    Lessons

    • Govern information in Microsoft 365
    • Manage data retention in Microsoft 365 workloads
    • Manage records in Microsoft 365

    Lab : Implement Information Governance

    • Configure Retention Labels
    • Implement Retention Labels
    • Configure Service-based Retention
    • Use eDiscovery for Recovery
    • Configure Records Management

    After completing this module, students will be able to:

    • Describe the information governance configuration process.
    • Articulate deployment and adoption best practices.
    • Describe the retention features in Microsoft 365 workloads.
    • Configure retention settings in Microsoft Teams and SharePoint Online.
    • Implement retention for Exchange Mailbox items.
    • Recover content protected by retention settings.
    • Regain protected items from Exchange Mailboxes.
    • Describe the records management configuration process.
RM2,300.00(+RM138.00 Tax)
* Training Dates:

This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.

Additional Info

  • Certification Course & Certificate
  • Course Code SC-300T00
  • Price RM3000
  • Exam Price Exclude
  • Exam Code SC-300
  • Duration 4 Days
  • CertificationInfo Microsoft Certified: Identity and Access Administrator Associate
  • Principals Microsoft
  • Schedule

    26-28,30 Apr 2021

    21-25 Jun 2021

    23-26 Aug 2021

    25-28 Oct 2021

    13-16 Dec 2021

     

  • Audience

    This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization.

  • Prerequisities

    Successful learners will have prior knowledge and understanding of:

    • Security best practices and industry security requirements such as defense in depth, least privileged access, shared responsibility, and zero trust model.
    • Be familiar with identity concepts such as authentication, authorization, and active directory.
    • Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
    • Some experience with Windows and Linux operating systems and scripting languages is helpful but not required. Course labs may use PowerShell and the CLI.

    Prerequisite courses (or equivalent knowledge and hands-on experience):

    The online training will give you the experience you need to be successful in this course.

    • SC-900 part 1: Describe the concepts of security, compliance, and identity - Learn | Microsoft Docs
    • SC-900 part 2: Describe the capabilities of Microsoft Identity and access management solutions - Learn | Microsoft Docs
    • SC-900 part 3: Describe the capabilities of Microsoft security solutions - Learn | Microsoft Docs
    • SC-900 part 4: Describe the capabilities of Microsoft compliance solutions - Learn | Microsoft Docs
    • AZ-104: Manage identities and governance in Azure - Learn | Microsoft Docs
  • At Course Completion

    After completing this course, students will be able to:

    • Implement an identity management solution
    • Implement an authentication and access management solutions
    • Implement access management for apps
    • Plan and implement an identity governancy strategy
  • Module 1 Title Implement an identity management solution
  • Module 1 Content

    Learn to create and manage your initial Azure Active Directory (Azure AD) implementation and configure the users, groups, and external identities you will use to run your solution.

    Lessons

    • Implement Initial configuration of Azure AD
    • Create, configure, and manage identities
    • Implement and manage external identities
    • Implement and manage hybrid identity

    Lab : Manage user roles

    Lab : Setting tenant-wide properties

    Lab : Assign licenses to users

    Lab : Restore or remove deleted users

    Lab : Add groups in Azure AD

    Lab : Change group license assignments

    Lab : Change user license assignments

    Lab : Configure external collaboration

    Lab : Add guest users to the directory

    Lab : Explore dynamic groups

    After completing this module, students will be able to:

    • Deploy an initail Azure AD with custom settings
    • Manage both internal and external identities
    • Implement a hybrid identity solution
  • Module 2 Title Implement an authentication and access management solution
  • Module 2 Content

    Implement and administer your access management using Azure AD. Use MFA, conditional access, and identity protection to manager your identity solution.

    Lessons

    • Secure Azure AD user with MFA
    • Manage user authentication
    • Plan, implement, and administer conditional access
    • Manage Azure AD identity protection

    Lab : Enable Azure AD MFA

    Lab : Configure and deploy self-service password reset (SSPR)

    Lab : Work with security defaults

    Lab : Implement conditional access policies, roles, and assignments

    Lab : Configure authentication session controls

    Lab : Manage Azure AD smart lockout values

    Lab : Enable sign-in risk policy

    Lab : Configure Azure AD MFA authentication registration policy

    After completing this module, students will be able to:

    • Configure and manage user authentication including MFA
    • Control access to resources using conditional access
    • Use Azure AD Identity Protection to protect your organization
  • Module 3 Title Implement access management for Apps
  • Module 3 Content

    Explore how applications can and should be added to your identity and access solution with application registration in Azure AD.

    Lessons

    • Plan and design the integration of enterprise for SSO
    • Implement and monitor the integration of enterprise apps for SSO
    • Implement app registration

    Lab : Implement access management for apps

    Lab : Create a custom role to management app registration

    Lab : Register an application

    Lab : Add app roles to applications and recieve tokens

    After completing this module, students will be able to:

    • Register a new application to your Azure AD
    • Plan and implement SSO for enterprise application
    • Monitor and maintain enterprise applications
  • Module 4 Title Plan and implement an identity governancy strategy
  • Module 4 Content

    Design and implement identity governance for your identity solution using entitlement, access reviews, privileged access, and monitoring your Azure Active Directory (Azure AD).

    Lessons

    • Plan and implement entitlement management
    • Plan, implement, and manage access reviews
    • Plan and implement privileged access
    • Monitor and maintain Azure AD

    Lab : Creat and manage a resource catalog with Azure AD entitlement

    Lab : Add terms of use acceptance report

    Lab : Manage the lifecycle of external users with Azure AD identity governance

    Lab : Create access reviews for groups and apps

    Lab : Configure PIM for Azure AD roles

    Lab : Assign Azure AD role in PIM

    Lab : Assign Azure resource roles in PIM

    Lab : Connect data from Azure AD to Azure Sentinel

    After completing this module, students will be able to:

    • Mange and maintain Azure AD from creation to solution
    • Use access reviews to maintain your Azure AD
    • Grant access to users with entitlement management
RM3,000.00(+RM180.00 Tax)
* Training Dates:

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

Additional Info

  • Certification Course & Certificate
  • Course Code SC-200T00
  • Price RM3000
  • Exam Price Exclude
  • Exam Code SC-200
  • Duration 4 Days
  • CertificationInfo Microsoft Certified: Security Operations Analyst Associate
  • Principals Microsoft
  • Schedule

    26-28,30 Apr 2021

    21-25 Jun 2021

    23-27 Aug 2021

    25-28 Oct 2021

    13-16 Dec 2021

     

  • Audience

    The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.

  • Prerequisities

    Before attending this course, students must have knowledge of:

    • Basic understanding of Microsoft 365
    • Fundamental understanding of Microsoft security, compliance, and identity products
    • Intermediate understanding of Windows 10
    • Familiarity with Azure services, specifically Azure SQL Database and Azure Storage
    • Familiarity with Azure virtual machines and virtual networking
    • Basic understanding of scripting concepts.
  • At Course Completion

    After completing this course, students will be able to:

    • Explain how Microsoft Defender for Endpoint can remediate risks in your environment
    • Create a Microsoft Defender for Endpoint environment
    • Configure Attack Surface Reduction rules on Windows 10 devices
    • Perform actions on a device using Microsoft Defender for Endpoint
    • Investigate domains and IP addresses in Microsoft Defender for Endpoint
    • Investigate user accounts in Microsoft Defender for Endpoint
    • Configure alert settings in Microsoft Defender for Endpoint
    • Explain how the threat landscape is evolving
    • Conduct advanced hunting in Microsoft 365 Defender
    • Manage incidents in Microsoft 365 Defender
    • Explain how Microsoft Defender for Identity can remediate risks in your environment.
    • Investigate DLP alerts in Microsoft Cloud App Security
    • Explain the types of actions you can take on an insider risk management case.
    • Configure auto-provisioning in Azure Defender
    • Remediate alerts in Azure Defender
    • Construct KQL statements
    • Filter searches based on event time, severity, domain, and other relevant data using KQL
    • Extract data from unstructured string fields using KQL
    • Manage an Azure Sentinel workspace
    • Use KQL to access the watchlist in Azure Sentinel
    • Manage threat indicators in Azure Sentinel
    • Explain the Common Event Format and Syslog connector differences in Azure Sentinel
    • Connect Azure Windows Virtual Machines to Azure Sentinel
    • Configure Log Analytics agent to collect Sysmon events
    • Create new analytics rules and queries using the analytics rule wizard
    • Create a playbook to automate an incident response
    • Use queries to hunt for threats
    • Observe threats over time with livestream
  • Module 1 Title Mitigate threats using Microsoft Defender for Endpoint
  • Module 1 Content

    Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. Learn how Microsoft Defender for Endpoint can help your organization stay secure. Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security. Learn how to investigate incidents and alerts using Microsoft Defender for Endpoints. Perform advanced hunting and consult with threat experts. You will also learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings.. Lastly, you will learn about your environment's weaknesses by using Threat and Vulnerability Management in Microsoft Defender for Endpoint.

    Lessons

    • Protect against threats with Microsoft Defender for Endpoint
    • Deploy the Microsoft Defender for Endpoint environment
    • Implement Windows 10 security enhancements with Microsoft Defender for Endpoint
    • Manage alerts and incidents in Microsoft Defender for Endpoint
    • Perform device investigations in Microsoft Defender for Endpoint
    • Perform actions on a device using Microsoft Defender for Endpoint
    • Perform evidence and entities investigations using Microsoft Defender for Endpoint
    • Configure and manage automation using Microsoft Defender for Endpoint
    • Configure for alerts and detections in Microsoft Defender for Endpoint
    • Utilize Threat and Vulnerability Management in Microsoft Defender for Endpoint

    Lab : Mitigate threats using Microsoft Defender for Endpoint

    • Deploy Microsoft Defender for Endpoint
    • Mitigate Attacks using Defender for Endpoint

    After completing this module, students will be able to:

    • Define the capabilities of Microsoft Defender for Endpoint
    • Configure Microsoft Defender for Endpoint environment settings
    • Configure Attack Surface Reduction rules on Windows 10 devices
    • Investigate alerts in Microsoft Defender for Endpoint
    • Describe device forensics information collected by Microsoft Defender for Endpoint
    • Conduct forensics data collection using Microsoft Defender for Endpoint
    • Investigate user accounts in Microsoft Defender for Endpoint
    • Manage automation settings in Microsoft Defender for Endpoint
    • Manage indicators in Microsoft Defender for Endpoint
    • Describe Threat and Vulnerability Management in Microsoft Defender for Endpoint
  • Module 2 Title Mitigate threats using Microsoft 365 Defender
  • Module 2 Content

    Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender. Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data. Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise.

    Lessons

    • Introduction to threat protection with Microsoft 365
    • Mitigate incidents using Microsoft 365 Defender
    • Protect your identities with Azure AD Identity Protection
    • Remediate risks with Microsoft Defender for Office 365
    • Safeguard your environment with Microsoft Defender for Identity
    • Secure your cloud apps and services with Microsoft Cloud App Security
    • Respond to data loss prevention alerts using Microsoft 365
    • Manage insider risk in Microsoft 365

    Lab : Mitigate threats using Microsoft 365 Defender

    • Mitigate Attacks with Microsoft 365 Defender

    After completing this module, students will be able to:

    • Explain how the threat landscape is evolving.
    • Manage incidents in Microsoft 365 Defender
    • Conduct advanced hunting in Microsoft 365 Defender
    • Describe the investigation and remediation features of Azure Active Directory Identity Protection.
    • Define the capabilities of Microsoft Defender for Endpoint.
    • Explain how Microsoft Defender for Endpoint can remediate risks in your environment.
    • Define the Cloud App Security framework
    • Explain how Cloud Discovery helps you see what's going on in your organization
  • Module 3 Title Mitigate threats using Azure Defender
  • Module 3 Content

    Use Azure Defender integrated with Azure Security Center, for Azure, hybrid cloud, and on-premises workload protection and security. Learn the purpose of Azure Defender, Azure Defender's relationship to Azure Security Center, and how to enable Azure Defender. You will also learn about the protections and detections provided by Azure Defender for each cloud workload. Learn how you can add Azure Defender capabilities to your hybrid environment.

    Lessons

    • Plan for cloud workload protections using Azure Defender
    • Explain cloud workload protections in Azure Defender
    • Connect Azure assets to Azure Defender
    • Connect non-Azure resources to Azure Defender
    • Remediate security alerts using Azure Defender

    Lab : Mitigate threats using Azure Defender

    • Deploy Azure Defender
    • Mitigate Attacks with Azure Defender

    After completing this module, students will be able to:

    • Describe Azure Defender features
    • Explain Azure Security Center features
    • Explain which workloads are protected by Azure Defender
    • Explain how Azure Defender protections function
    • Configure auto-provisioning in Azure Defender
    • Describe manual provisioning in Azure Defender
    • Connect non-Azure machines to Azure Defender
    • Describe alerts in Azure Defender
    • Remediate alerts in Azure Defender
    • Automate responses in Azure Defender
  • Module 4 Title Create queries for Azure Sentinel using Kusto Query Language (KQL)
  • Module 4 Content

    Write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Azure Sentinel. This module will focus on the most used operators. The example KQL statements will showcase security related table queries. KQL is the query language used to perform analysis on data to create analytics, workbooks, and perform hunting in Azure Sentinel. Learn how basic KQL statement structure provides the foundation to build more complex statements. Learn how to summarize and visualize data with a KQL statement provides the foundation to build detections in Azure Sentinel. Learn how to use the Kusto Query Language (KQL) to manipulate string data ingested from log sources.

    Lessons

    • Construct KQL statements for Azure Sentinel
    • Analyze query results using KQL
    • Build multi-table statements using KQL
    • Work with data in Azure Sentinel using Kusto Query Language

    Lab : Create queries for Azure Sentinel using Kusto Query Language (KQL)

    • Construct Basic KQL Statements
    • Analyze query results using KQL
    • Build multi-table statements using KQL
    • Work with string data using KQL statements

    After completing this module, students will be able to:

    • Construct KQL statements
    • Search log files for security events using KQL
    • Filter searches based on event time, severity, domain, and other relevant data using KQL
    • Summarize data using KQL statements
    • Render visualizations using KQL statements
    • Extract data from unstructured string fields using KQL
    • Extract data from structured string data using KQL
    • Create Functions using KQL
  • Module 5 Title Configure your Azure Sentinel environment
  • Module 5 Content

    Get started with Azure Sentinel by properly configuring the Azure Sentinel workspace. Traditional security information and event management (SIEM) systems typically take a long time to set up and configure. They're also not necessarily designed with cloud workloads in mind. Azure Sentinel enables you to start getting valuable security insights from your cloud and on-premises data quickly. This module helps you get started. Learn about the architecture of Azure Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements. As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Azure Sentinel.

    Lessons

    • Introduction to Azure Sentinel
    • Create and manage Azure Sentinel workspaces
    • Query logs in Azure Sentinel
    • Use watchlists in Azure Sentinel
    • Utilize threat intelligence in Azure Sentinel

    Lab : Configure your Azure Sentinel environment

    • Create an Azure Sentinel Workspace
    • Create a Watchlist
    • Create a Threat Indicator

    After completing this module, students will be able to:

    • Identify the various components and functionality of Azure Sentinel.
    • Identify use cases where Azure Sentinel would be a good solution.
    • Describe Azure Sentinel workspace architecture
    • Install Azure Sentinel workspace
    • Manage an Azure Sentinel workspace
    • Create a watchlist in Azure Sentinel
    • Use KQL to access the watchlist in Azure Sentinel
    • Manage threat indicators in Azure Sentinel
    • Use KQL to access threat indicators in Azure Sentinel
  • Module 6 Title Connect logs to Azure Sentinel
  • Module 6 Content

    Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Azure Sentinel. The primary approach to connect log data is using the Azure Sentinel provided data connectors. This module provides an overview of the available data connectors. You will get to learn about the configuration options and data provided by Azure Sentinel connectors for Microsoft 365 Defender.

    Lessons

    • Connect data to Azure Sentinel using data connectors
    • Connect Microsoft services to Azure Sentinel
    • Connect Microsoft 365 Defender to Azure Sentinel
    • Connect Windows hosts to Azure Sentinel
    • Connect Common Event Format logs to Azure Sentinel
    • Connect syslog data sources to Azure Sentinel
    • Connect threat indicators to Azure Sentinel

    Lab : Connect logs to Azure Sentinel

    • Connect Microsoft services to Azure Sentinel
    • Connect Windows hosts to Azure Sentinel
    • Connect Linux hosts to Azure Sentinel
    • Connect Threat intelligence to Azure Sentinel

    After completing this module, students will be able to:

    • Explain the use of data connectors in Azure Sentinel
    • Explain the Common Event Format and Syslog connector differences in Azure Sentinel
    • Connect Microsoft service connectors
    • Explain how connectors auto-create incidents in Azure Sentinel
    • Activate the Microsoft 365 Defender connector in Azure Sentinel
    • Connect Azure Windows Virtual Machines to Azure Sentinel
    • Connect non-Azure Windows hosts to Azure Sentinel
    • Configure Log Analytics agent to collect Sysmon events
    • Explain the Common Event Format connector deployment options in Azure Sentinel
    • Configure the TAXII connector in Azure Sentinel
    • View threat indicators in Azure Sentinel
  • Module 7 Title Create detections and perform investigations using Azure Sentinel
  • Module 7 Content

    Detect previously uncovered threats and rapidly remediate threats with built-in orchestration and automation in Azure Sentinel. You will learn how to create Azure Sentinel playbooks to respond to security threats. You'll investigate Azure Sentinel incident management, learn about Azure Sentinel events and entities, and discover ways to resolve incidents. You will also learn how to query, visualize, and monitor data in Azure Sentinel.

    Lessons

    • Threat detection with Azure Sentinel analytics
    • Threat response with Azure Sentinel playbooks
    • Security incident management in Azure Sentinel
    • Use entity behavior analytics in Azure Sentinel
    • Query, visualize, and monitor data in Azure Sentinel

    Lab : Create detections and perform investigations using Azure Sentinel

    • Create Analytical Rules
    • Model Attacks to Define Rule Logic
    • Mitigate Attacks using Azure Sentinel
    • Create Workbooks in Azure Sentinel

    After completing this module, students will be able to:

    • Explain the importance of Azure Sentinel Analytics.
    • Create rules from templates.
    • Manage rules with modifications.
    • Explain Azure Sentinel SOAR capabilities.
    • Create a playbook to automate an incident response.
    • Investigate and manage incident resolution.
    • Explain User and Entity Behavior Analytics in Azure Sentinel
    • Explore entities in Azure Sentinel
    • Visualize security data using Azure Sentinel Workbooks.
  • Module 8 Title Perform threat hunting in Azure Sentinel
  • Module 8 Content

    In this module, you'll learn to proactively identify threat behaviors by using Azure Sentinel queries. You'll also learn to use bookmarks and livestream to hunt threats. You will also learn how to use notebooks in Azure Sentinel for advanced hunting.

    Lessons

    • Threat hunting with Azure Sentinel
    • Hunt for threats using notebooks in Azure Sentinel

    Lab : Threat hunting in Azure Sentinel

    • Threat Hunting in Azure Sentinel
    • Threat Hunting using Notebooks

    After completing this module, students will be able to:

    • Describe threat hunting concepts for use with Azure Sentinel
    • Define a threat hunting hypothesis for use in Azure Sentinel
    • Use queries to hunt for threats.
    • Observe threats over time with livestream.
    • Explore API libraries for advanced threat hunting in Azure Sentinel
    • Create and use notebooks in Azure Sentinel
RM3,000.00(+RM180.00 Tax)
* Training Dates:

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Additional Info

  • Certification Course only
  • Course Code SC-900T00
  • Price RM1400
  • Exam Price Exclude
  • Exam Code SC-900
  • Duration 1 Day
  • CertificationInfo Microsoft Security Compliance and Identity Fundamentals
  • Principals Microsoft
  • Schedule

    2 Apr 2021

    4 Jun 2021

    2 Jul 2021

    3 Sep 2021

    1 Oct 2021

    3 Dec 2021

  • Audience

    The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

  • Prerequisities

    Before attending this course, students must have:

    • General understanding of networking and cloud computing concepts.
    • General IT knowledge or any general experience working in an IT environment.
    • General understanding of Microsoft Azure and Microsoft 365.
  • At Course Completion

    After completing this course, students will be able to:

    • Describe basic concepts of security, compliance, and identity.
    • Describe the concepts and capabilities of Microsoft identity and access management solutions.
    • Describe the capabilities of Microsoft security solutions.
    • Describe the compliance management capabilities in Microsoft.
  • Module 1 Title Describe basic concepts of security, compliance, and identity.
  • Module 1 Content

    Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.

    Lessons

    • Describe security concepts and methodologies.
    • Describe Microsoft security and compliance principles.

    After completing this module, students will be able to:

    • Describe security concepts and methodologies.
    • Explore the Service Trust Portal.
    • Know where to go to find and review Azure compliance documentation.
  • Module 2 Title Describe the concepts and capabilities of Microsoft identity and access management solutions
  • Module 2 Content

    Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.

    Lessons

    • Describe identity concepts
    • Describe the basic services and identity types of Azure AD
    • Describe the authentication capabilities of Azure AD
    • Describe the access management capabilities of Azure AD
    • Describe the identity protection and governance capabilities of Azure AD

    After completing this module, students will be able to:

    • Describe basic identity concepts.
    • Describe the basic services and identity types of Azure AD
    • Describe the authentication capabilities of Azure AD.
    • Describe the access management capabilities of Azure AD.
    • Describe the identity protection and governance capabilities of Azure AD.
  • Module 3 Title Describe the capabilities of Microsoft security solutions
  • Module 3 Content

    Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you'll explore endpoint protection with Intune.

    Lessons

    • Describe the basic security capabilities in Azure
    • Describe the security management capabilities of Azure
    • Describe the security capabilities of Azure Sentinel
    • Describe the threat protection capabilities of Microsoft 365
    • Describe the security management capabilities of Microsoft 365
    • Describe endpoint security with Microsoft Intune
    • Module summary

    After completing this module, students will be able to:

    • Describe the basic security capabilities in Azure.
    • Describe the security management capabilities of Azure.
    • Describe the security capabilities of Azure Sentinel.
    • Describe the threat protection capabilities of Microsoft 365.
    • Describe the security management capabilities of Microsoft 365.
    • Describe endpoint security with Microsoft Intune.
  • Module 4 Title Describe the capabilities of Microsoft compliance solutions
  • Module 4 Content

    Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.

    Lessons

    • Describe the compliance management capabilities in Microsoft
    • Describe the information protection and governance capabilities of Microsoft 365
    • Describe the insider risk capabilities in Microsoft 365
    • Describe the eDiscovery capabilities of Microsoft 365
    • Describe the audit capabilities of Microsoft 365
    • Describe the resource governance capabilities in Azure

    After completing this module, students will be able to:

    • Describe the compliance management capabilities in Microsoft.
    • Describe the information protection and governance capabilities of Microsoft 365.
    • Describe the insider risk capabilities in Microsoft 365.
    • Describe the eDiscovery capabilities of Microsoft 365.
    • Describe the audit capabilities of Microsoft 365.
    • Describe the resource governance capabilities in Azure.
RM1,400.00(+RM84.00 Tax)
* Training Dates:

This course will provide you with a broad introduction to the finance and operations capabilities of Dynamics 365. You will become familiar with the concept of enterprise resource management (ERP), as well as each of the finance and operations apps, including Dynamics 365 Supply Chain Management, Dynamics 365 Finance, Dynamics 365 Commerce , Dynamics 365 Human Resources, and the ERP capabilities of Dynamics 365 Project Operations. This course will include lecture as well as hands-on-labs.

Additional Info

  • Certification Course only
  • Course Code MB-920T00
  • Price RM2300
  • Exam Price Exclude
  • Exam Code MB-920
  • Duration 2 Days
  • CertificationInfo Microsoft Certified: Dynamics 365 Fundamentals Finance and Operations Apps (ERP)
  • Principals Microsoft
  • Schedule

    12-13 Apr 2021

    12-13 Jul 2021

    11-12 Oct 2021

  • Audience

    People in different roles and at various stages in their careers can benefit from this fundamentals course. This includes IT professionals, business stakeholders and others who want to be exposed to the finance and operations capabilities of Dynamics 365, students, recent graduates, and people changing careers who want to leverage Dynamics 365 to move to the next level.

  • At Course Completion

    After completing this course, you will be able to:

    • Describe the capabilities and functionality of Dynamics 365 Supply Chain Management
    • Describe the capabilities and functionality of Dynamics 365 Finance
    • Describe the capabilities and functionality of Dynamics 365 Commerce
    • Describe the capabilities and functionality of Dynamics 365 Human Resources
    • Describe the capabilities and functionality of Dynamics 365 Project Operations (ERP)
  • Module 1 Title Learn the Fundamentals of Dynamics 365 Supply Chain Management
  • Module 1 Content

    This module covers the basic concepts of enterprise resource management and what the finance and operations apps have in common before diving into Dynamics 365 Supply Chain Management. We begin with the standard marketing business processes and how Marketing addresses those. Then we examine the product capabilities. Finally, we cover additional marketing apps such as LinkedIn Campaign Manager, Dynamics 365 Customer Voice and Dynamics 365 Customer Insights.

    Lessons

    • Get introduced to the finance and operations apps
    • Identify general capabilities of Dynamics 365 Supply Chain Management
    • Explore warehouse and inventory capabilities in Dynamics 365 Supply Chain Management
    • Explore manufacturing strategies in Dynamics 365 Supply Chain Management
    • Explore asset management capabilities in Dynamics 365 Supply Chain Management
    • Capstone lab

    Lab: Navigate the finance and operations apps

    Lab: Explore workspaces and filtering

    Lab: Create a Product

    Lab: Create a Purchase Order

    Lab: Create a Warehouse

    Lab: Create a Production Order

    Lab: Create a planned Work Order

    Lab: Dynamics 365 Supply Chain Management Capstone lab

    • Explore Product Management
    • Explore Warehouse Management
    • Explore Production Management
    • Explore Inventory Management
    • Explore Procurement and Sourcing

    After completing this module, students will be able to:

    • Describe the common features of the finance and operations apps
    • Describe the general capabilities of Dynamics 365 Supply Chain Management
    • Describe the warehouse and inventory management, manufacturing and asset management capabilities
  • Module 2 Title Learn the Fundamentals of Dynamics 365 Finance
  • Module 2 Content

    In this module we take a look at Dynamics 365 Finance. We will cover core capabilities of the product before focusing on general ledger, accounts payable and accounts receivable. Next, we explore expense management and budgeting in Dynamics 365 Finance.

    Lessons

    • Explore Dynamics 365 Finance core capabilities
    • Explore general ledger
    • Explore accounts payable and accounts receivable
    • Explore expense management, fixed asset management, and budgeting
    • Capstone lab

    Lab: Create a financial dimension

    Lab: Create a vendor payment journal

    Lab: Capstone lab

    • Explore the General Ledger
    • Explore Accounts Payable
    • Explore Accounts Receivable

    After completing this module, students will be able to:

    • Discuss Dynamics 365 Finance core capabilities
    • Discuss general ledger, accounts payable and accounts receivable
    • Discuss expense management, fixed asset management, and budgeting
  • Module 3 Title Learn the Fundamentals of Dynamics 365 Commerce
  • Module 3 Content

    In this module we take a look at Dynamics 365 Commerce. We will cover core capabilities of the product before turning our attention to Dynamics 365 Fraud Protection and its capabilities.

    Lessons

    • Explore Dynamics 365 Commerce capabilities
    • Explore Dynamics 365 Fraud Protection
    • Capstone lab

    Lab: Create a discount product

    Lab: Create a product assortment

    Lab: Capstone lab

    • Explore Commerce Headquarters

    After completing this module, students will be able to:

    • Discuss Dynamics 365 Commerce
    • Discuss Dynamics 365 Fraud Protection
  • Module 4 Title Learn the Fundamentals of Dynamics 365 Human Resources
  • Module 4 Content

    In this module we take a look at Dynamics 365 Human Resources. We will cover core capabilities of the product before turning our attention to the personnel management capabilities of the product.

    Lessons

    • Explore Dynamics 365 Human Resources core capabilities
    • Explore the personnel management capabilities
    • Capstone lab

    Lab: Capstone lab

    • Explore Human Resources

    After completing this module, students will be able to:

    • Discuss the core capabilities of Dynamics 365 Human Resources
    • Discuss personnel management capabilities
  • Module 5 Title Learn the Fundamentals of Dynamics 365 Project Operations (ERP)
  • Module 5 Content

    In this module we take a look at the enterprise resource capabilities of Dynamics 365 Project Operations. We will cover the project lifecycle as well as the project planning and execution apabilities of the product.

    Lessons

    • Identify project lifecycle management capabilities in Dynamics 365 Project Operations
    • Explore the project planning and execution capabilities of Dynamics 365 Project Operations

    After completing this module, students will be able to:

    • Discuss the project lifecycle management capabilities in Dynamics 365 Project Operations
    • Explore the project planning and execution capabilities of Dynamics 365 Project Operations
RM2,300.00(+RM138.00 Tax)
* Training Dates:

This course will provide you with a broad introduction to the customer engagement capabilities of Dynamics 365. You will become familiar with the concept of customer engagement, as well as each of the customer engagement apps, including Dynamics 365 Marketing, Dynamics 365 Sales, Dynamics 365 Customer Service, Dynamics 365 Field Service, and the customer relationship management (CRM) capabilities of Dynamics 365 Project Operations. This course will include lecture as well as hands-on labs.

Additional Info

  • Certification Course only
  • Course Code MB-910T00
  • Price RM2300
  • Exam Price Exclude
  • Exam Code MB-910
  • Duration 2 Days
  • CertificationInfo Microsoft Certified: Dynamics 365 Fundamentals Customer Engagement Apps (CRM)
  • Principals Microsoft
  • Schedule

    12-13 Apr 2021

    12-13 Jul 2021

    11-12 Oct 2021

  • Audience

    People in different roles and at various stages in their careers can benefit from this fundamentals course. This includes IT professionals, business stakeholders and others who want to be exposed to the customer engagement capabilities of Dynamics 365, students, recent graduates, and people changing careers who want to leverage Dynamics 365 to move to the next level.

  • Prerequisities

    Learners should have a fundamental understanding of customer engagement principles and business operations. An understanding of cloud computing is helpful, but isn't necessary.

  • At Course Completion

    After completing this course, you will be able to:

    • Describe the capabilities and functionality of Dynamics 365 Marketing
    • Describe the capabilities and functionality of Dynamics 365 Sales
    • Describe the capabilities and functionality of Dynamics 365 Customer Service
    • Describe the capabilities and functionality of Dynamics 365 Field Service
    • Describe the capabilities and functionality of Dynamics 365 Project Operations (CRM)
  • Module 1 Title Learn the Fundamentals of Dynamics 365 Marketing
  • Module 1 Content

    This module covers the basic concepts of customer engagement and what the customer engagement apps have in common before diving into Dynamics 365 Marketing. We begin with the standard marketing business processes and how Marketing addresses those. Then we examine the product capabilities. Finally, we cover additional marketing apps such as LinkedIn Campaign Manager, Dynamics 365 Customer Voice and Dynamics 365 Customer Insights.

    Lessons

    • Get introduced to the Dynamics 365 customer engagement apps
    • Examine Dynamics 365 Marketing
    • Describe Dynamics 365 Marketing capabilities
    • Review Additional Marketing Apps

    Lab : Working with customer engagement apps

    Lab : Manage Customers and Activities

    Lab : Search and filter data

    Lab : Dynamics 365 Marketing Capstone Lab

    • Create a marketing email
    • Create a Segment in Dynamics 365 Marketing
    • Create a Customer Journey

    After completing this module, students will be able to:

    • Describe the customer engagement apps and what they have in common
    • Describe the standard marketing processes and how Dynamics 365 Marketing addresses them
    • Describe Dynamics 365 Marketing features and capabilities
    • Describe additional marketing apps
  • Module 2 Title Learn the Fundamentals of Dynamics 365 Sales
  • Module 2 Content

    This module provides an introduction to Dynamics 365 Sales. We begin with the standard sales business processes and how Sales addresses those. Then we examine the product capabilities. Finally, we cover additional sales apps such as Sales Insights and Sales Navigator.

    Lessons

    • Explore Dynamics 365 Sales
    • Manage the sales lifecycle with Dynamics 365 Sales
    • Review additional sales apps

    Lab : Dynamics 365 Sales Capstone Lab

    • Create and qualify a Lead
    • Manage a sales Opportunity

    After completing this module, students will be able to:

    • Describe the standard sales processes and how Dynamics 365 Sales addresses them
    • Describe Dynamics 365 Sales capabilities
    • Describe additional sales apps such as Sales Insights and Sales Navigator
  • Module 3 Title Learn the Fundamentals of Dynamics 365 Customer Service
  • Module 3 Content

    This module provides an introduction to Dynamics 365 Customer Service. We begin with the standard customer service business processes and how Customer Service addresses those. Then we examine the product capabilities. Finally, we cover additional customer service apps such as Omnichannel for Customer Service, Dynamics 365 Customer Service Insights, Customer Service Scheduling and Connected Customer Service.

    Lessons

    • Examine Dynamics 365 Customer Service
    • Describe Dynamics Customer Service capabilities
    • Review additional customer service apps

    Lab : Dynamics 365 Capstone Lab

    • Create and publish a Knowledge Article
    • Manage a support Case through its life cycle

    After completing this module, students will be able to:

    • Describe the standard customer service processes and how Dynamics 365 Customer Serviceaddresses them
    • Describe Dynamics Customer Service capabilities
    • Describe additional sales apps such as Sales Insights and Sales Navigator
  • Module 4 Title Learn the Fundamentals of Dynamics 365 Field Service
  • Module 4 Content

    This module provides an introduction to Dynamics 365 Field Service. We begin with the standard field service business processes and how Field Service addresses those. Then we examine the product capabilities, including work order generation, scheduling, inventory management and asset management.

    Lessons

    • Examine Dynamics Field Service
    • Generate Work Orders in Dynamics 365 Field Service
    • Describe the scheduling capabilities of Dynamics 365 Field Service
    • Examine the inventory management capabilities of Dynamics 365 Field Service
    • Review the asset management capabilities of Dynamics 365 Field Service

    Lab : Dynamics 365 Capstone Lab

    • Create a Case and escalate to a Work Order
    • Schedule items with Dynamics 365 Field Service

    After completing this module, students will be able to:

    • Describe the standard field service business processes and how Dynamics 365 Field Service addresses
    • Describe how to generate Work Orders
    • Describe the scheduling capabilities of Dynamics 365 Field Service
    • Describe the inventory management capabilities of Dynamics 365 Field Service
    • Describe the asset management capabilities of Dynamics 365 Field Service
  • Module 5 Title Learn the Fundamentals of Dynamics 365 Project Operations (CRM)
  • Module 5 Content

    This module provides an introduction to the customer engagement aspects of Dynamics 365 Project Operations. We begin with the standard project-based business processes and how Project Operations addresses those. Then we examine the product capabilities, including sales, project management, and resource utilization.

    Lessons

    • Examine Dynamics 365 Project Operations
    • Describe the sales capabilities of Dynamics 365 Project Operations
    • Plan projects with Dynamics 365 Project Operations
    • Review the resource utilization capabilities of Dynamics 365 Project Operations

    Lab : Dynamics 365 Project Operations Capstone Lab

    • Create a project-based Lead
    • Manage a project-based Opportunity
    • Create a Project Quote and Project Estimate

    After completing this module, students will be able to:

    • Describe project-based customer engagement processes addressed by Dynamics 365 Project Operations
    • Describe the sales capabilities of Dynamics 365 Project Operations
    • Describe the project management capabilities of Dynamics 365 Project Operations
    • Describe the resource utilization capabilities of Dynamics 365 Project Operations
RM2,300.00(+RM138.00 Tax)
* Training Dates:

This course teaches Azure administrators and Azure Stack Hub operators how to plan, deploy, package, update, and maintain the Azure Stack Hub infrastructure. Lessons include deploying Azure Stack Hub, managing the Azure Stack Hub Marketplace, offering App Services and Event Hub resource providers, managing Azure Stack Hub registration, and maintaining system health.

Additional Info

  • Certification Course & Certificate
  • Course Code AZ-600T00
  • Price RM3000
  • Exam Price Exclude
  • Exam Code AZ-600
  • Duration 4 Days
  • CertificationInfo Windows Virtual Desktop Specialty
  • Principals Microsoft
  • Schedule

    21-24 Jun 2021

    23-26 Aug 2021

    25-28 Oct 2021

    13-16 Dec 2021

     

  • Audience

    Students for AZ-600: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub are interested in becoming Azure Stack Hub operators who provide cloud services to end users or customers from within their own datacenter using Azure Stack Hub. Azure Stack Hub operators responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Stack Hub infrastructure. They also offer hybrid cloud resources and requested services and manage infrastructure as a service (IaaS) and platform as a service (PaaS).

  • Prerequisities

    Successful Azure Stack Hub students have prior experience with operating systems, virtualization, cloud infrastructure, storage structures, and networking:

    • Understanding of on-premises virtualization technologies, including VMs and virtual networking
    • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies
    • Understanding of Active Directory concepts, including domains, forests, and domain controllers

    If you are new to Azure and cloud computing, consider one of the following resources:

    • Instructor-led course: AZ-900: Azure Fundamentals
    • Prerequisites for Azure administrators
  • At Course Completion

    After completing this course, students will be able to:

    • Prepare for Azure Stack Hub deployment
    • Manage infrastructure certificates for Azure Stack Hub
    • Manage Azure Stack Hub registration
    • Configure an Azure Stack Hub home directory
    • Provision a service principal for Azure Stack Hub
    • Recommend a business continuity disaster recovery (BCDR) strategy
    • Manage Azure Stack Hub by using privileged endpoints
    • Manage Azure Stack Hub Marketplace
    • Offer App Services and Event Hub resource providers
    • Manage usage and billing
  • Module 1 Title Overview of Azure Stack Hub
  • Module 1 Content

    In this module, you will learn how Azure Stack Hub is an extension of Azure that provides a way to run apps in an on-premises environment and deliver Azure services in your datacenter.

    Lessons

    • Azure Stack Hub
    • Datacenter integration
    • Azure Stack Hub PowerShell
    • Module review questions

    After completing this module, students will be able to:

    • Describe edge and disconnected solutions
    • Describe Azure Stack Hub integrated systems architecture
    • Explain Azure Stack Hub deployment options
    • Define differences between Azure Stack Hub, Azure Stack HCI, and global Azure
  • Module 2 Title Provide Services
  • Module 2 Content

    In this module, you will learn how to populate Azure Stack Hub Marketplace in a disconnected environment, deploy an App Services resource provider, deploy Event Hubs resource provides, create and manage quotas, plans, offers, and subscriptions, and manage usage and billing.

    Lessons

    • Manage Azure Stack Hub Marketplace
    • Offer an App Services resource provider
    • Offer an Event Hubs resource provider
    • Offer services
    • Manage usage and billing
    • Module review questions

    Lab : Manage offers and plans in Azure Stack Hub

    Lab : Validate Azure Resource Manager (ARM) Templates with Azure Stack Hub

    Lab : Optional Lab : Implement SQL Server Resource Provider in Azure Stack Hub

    After completing this module, students will be able to:

    • Create a custom Azure Stack Hub Marketplace item
    • Deploy and update an App Services resource provider
    • Plan an Event Hubs resource provider deployment
    • Create and manage user subscriptions
    • Manage usage and billing in multi-tenant and CSP scenarios
  • Module 3 Title Implement Data Center Integration
  • Module 3 Content

    In this module, you will learn how prepare an Stack Hub deployment, recommend and validate certificates, and register in a connected and disconnected environment.

    Lessons

    • Prepare for Azure Stack Hub deployment
    • Manage Azure Stack Hub registration
    • Module review questions

    After completing this module, students will be able to:

    • View and retrieve usage data by using the Usage API
    • Recommend a name resolution strategy
    • Validate identity provider integration
    • Validate certificates
    • Recommend a registration mode
  • Module 4 Title Manage Identity and Access for Azure Stack Hub
  • Module 4 Content

    In this module, you will learn how to configure the Azure Stack Hub home directory, register the guest tenant directory with Azure Stack Hub, and identify an appropriate method for access (service principal, users, groups).

    Lessons

    • Manage multi-tenancy
    • Manage access
    • Module review questions

    Lab : Delegate Offer Management in Azure Stack Hub

    Lab : Manage Service Principals in Azure Stack Hub

    After completing this module, students will be able to:

    • Register the guest tenant directory with Azure Stack Hub
    • Update the guest tenant directory
    • Configure access in Azure Stack Hub
    • Create a custom role
  • Module 5 Title Manage the Azure Stack Hub Infrastructure
  • Module 5 Content

    In this module, you will learn how monitor system health by using the REST API, monitor system health by using Syslog Server, collect diagnostic logs on demand by using Powershell, configure a storage target for infrastructure backup, and download and import update packages manually.

    Lessons

    • Manage system health
    • Azure Monitor on Azure Stack Hub
    • Plan and configure business continuity and disaster recovery
    • Manage capacity
    • Update infrastructure
    • Manage Azure Stack Hub by using privileged endpoints
    • Module review questions

    Lab : Connect to Azure Stack Hub via PowerShell

    Lab : Access the Privileged Endpoint in Azure Stack Hub

    Lab : Manage Log Collection in Azure Stack Hub

    Lab : Configure and manage Azure Stack Hub Storage Accounts

    Lab : Manage Public IP Addresses in Azure Stack Hub

    Lab : Configure Azure Stack Hub Infrastructure Backup

    After completing this module, students will be able to:

    • Include resource providers such as Event Hubs
    • Manage field replacement or repair
    • Configure storage targets for infrastructure backups
    • Update Azure Stack Hub
    • Unlock a support session
    • Connect to a privileged endpoin
    • Perform system diagnostics by using Test-AzureStack
RM3,000.00(+RM180.00 Tax)
* Training Dates:

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline