I just completed the course: eID (Electronic Identification) and Electronic Certification

I’m happy to report I just completed the course eID and Electronic Certification, from the National Institute of Administration of Portugal (Instituto Nacional de Administração), in partnership with the National Security Cabinet of Portugal (Gabinete Nacional de Segurança).

Course outline

Module 1 – The digital world
Module 2 – Security and Reliability
Module 3 – Electronic Identification (eID)
Module 4 – Trust Services
Module 5 – National cases
Module 6 – Before and after eIDAS

Certificate

I just completed the course: CSIRT in a Box: Initial Training for Incident Response Teams!

I’m happy to report I just completed the course CSIRT in a Box: Initial Training for Incident Response Teams

CSIRT = Computer Security Incident Response Team

Course outline

Module 1 – My CSIRT
Module 2 – Incident Response
Module 3 – Coordination and Collaboration
Module 4 – Tools
Module 5 – Training
Module 6 – Audit and Forensic Analysis

Certificate

I completed my initial training at Microsoft!

I’m happy to report I have completed the intensive internal training at Microsoft, related to Microsoft Defender for Endpoint (MDE), of about 70 hours!

This means that soon I will start taking real cases from customers!

Wish me luck!

Certificate of the 1 hour assessment I just passed.

The full course outline is below:

MDE – Foundational Training – General Certificate link

  • Foundational Training – Getting started
  • Internal Tools and Customer Communication
  • Initial Scoping

MDE Lab Creation Certificate link

  • Create Your Azure Labs
  • Local Virtual Machines
  • Creating local VM’s – Hyper-V

Basic Portal overviews / General cross platform features Certificate link

  • M365 Converged Portal
  • MDE – Threat and Vulnerability Management (TVM)
  • MDE Alerting
  • MDE – Tagging and Grouping
  • Defender Antivirus – Network Protection
  • MDE – Microsoft Threat Experts
  • MDE – Response Actions
  • MDE – Indicators
  • Microsoft Defender Endpoint licensing requirements & offering plans
  • Defender for Cloud Integration, Onboarding and Offboarding
  • Action Center
  • Device inventory and Timeline
  • Basic Connectivity Information
  • Defender AV (Compatibility with 3rd party AV)
  • Malware Submissions WDSI
  • Microsoft Defender for Office Integration
  • Live Response
  • Intune Integration
  • Advanced Hunting
  • Region Reset
  • Azure Permissions + MDE RBAC
  • Suppression Rules
  • Tenant Attach
  • Device Discovery
  • Contain Device
  • EDR Network Device Discovery
  • Device Health and Compliance Report
  • False Positives
  • MDE – Troubleshooting Mode

Windows – MDE Foundational Certificate link

  • Microsoft Defender Antivirus
  • Microsoft Defender Antivirus
  • Antimalware Extension (IAAS)
  • MDE – Run Client Analyzer
  • MDE – Machine Isolation
  • MDE – Offboarding Machines
  • MDE – Client Analyzer II
  • MDE – Onboarding Machines
  • MDE – Indicators
  • Defender Antivirus – Exploit Protection
  • SCCM / SCEM Enrolment, Onboarding and Offboarding
  • Defender AV Updates
  • Defender AV – Log Collection
  • MDE – API Offboarding
  • Modern Unified Solution for 2012R2 / 2016
  • System Center Endpoint Protection logs
  • Troubleshooting SmartScreen
  • MDE – Web Content Filtering (WCF)
  • MSRT – Microsoft Safety Removal Tool
  • Defender Antivirus – Attack Surface Reduction (ASR)
  • Potentially Unwanted Applications (PUA)
  • MDE Security Configuration Management
  • Safety Scanner
  • Foundational – Controlled Folder Access (CFA)
  • MDE Troubleshooting Device Control for Windows
  • Troubleshooting Device Control for Windows
  • Automated Investigation and Response (AIR)
  • Host Firewall Reporting
  • Device Groups and Tags
  • EDR in Block Mode
  • Azure ARC (windows)
  • On / Offboarding with Group Policy

MDE Log Collection Methods Certificate link

  • MDE Client Analyzer Logs
  • Defender Log Collection
  • ASR Log Collection
  • Linux and macOS Log Collection
  • Android and iOS Log Collection

Linux – MDE Foundational Certificate link

  • MDE – Linux onboarding
  • MDE – Client Analyzer for Linux Servers / macOS
  • Configuring AV Exclusions on Linux
  • TVM on Linux
  • Running AV Scans on Linux
  • Cloud Protection – Linux
  • Managing Updates
  • Configuring AuditD Exclusions on Linux
  • Licensing – Linux
  • Configuring Network Protection on Linux
  • Deploying Defender for Linux

Mac – MDE Foundational Certificate link

  • Internal Mac Test Machines
  • MDE – macOS Onboarding

Android / iOS – MDE Foundational Certificate link

  • MDE for Android – Hands on lab
  • MDE for iOS – Hands on lab
  • Android / iOS Network Protection
  • Android / iOS Network Protection

Endpoint Protection Foundational assessment Certificate link

  • The final exam

I am now a Certified Ethical Hacker!

I am very happy to announce I just became a Certified Ethical Hacker (CEH), after passing the 4-Hour exam!

The exam covered the following topics from the course:

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT and OT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Certificate

Verification