Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use.


Use these Learning Paths to find a range of Microsoft training references and resources on security threats and appropriate countermeasures. Learning resources are organized by level (from basic to expert) and provide information on the planning, prevention, detection, and response phases of security implementation.

Threat and Vulnerability Mitigation Learning Resources:

http://technet.microsoft.com/en-gb/security/cc895218.aspx

Learn about security technologies that offer defense-in-depth protection against attacks and provide customers with central visibility and control of the security environment. These applications include defenses such as firewalls; antivirus, anti-spyware, and anti-spam software; network access protection; and others.

Security Fundamentals:

Combine Microsoft technology with tools and guidance to help build a secure foundation for your IT infrastructure. Learn about technologies intrinsic to the operating system that help make computers more resilient to attacks and provide the foundation upon which you can build your other technology investments.

http://technet.microsoft.com/en-gb/security/cc895262.aspx

Managing Updates and Safeguarding Your Systems:

The exploitation of security vulnerabilities in operating systems and application software can lead to loss of revenue and intellectual property. Having properly configured systems, using the latest software, and installing the recommended software updates can help you mitigate this threat. Use the resources in this learning path to help you manage updates and simplify the task of protecting your systems.

http://technet.microsoft.com/en-gb/security/cc513135.aspx

-----------------------------------------------------------------------------------------------------------------------------

The IT Infrastructure Threat Modelling Guide is now available.

Organizations today face an increasing number of threats to their computing environments. You need a proactive approach to assist you in your efforts to protect your organization's assets and sensitive information. This guide provides an easy-to-understand method that enables you to develop threat models for your IT environment and prioritize your investments in IT infrastructure security.

This Solution Accelerator includes a Microsoft Word document that helps IT professionals develop and implement threat models for their IT environments, and a Microsoft PowerPoint® presentation that is designed for use in a learning or lecture environment to present the concept of IT infrastructure threat modelling. These materials are designed to help IT professionals accomplish the following:

  • Provide use case scenarios for each component to be threat modelled.
  • Identify threats that could affect their organizations’ IT infrastructures.
  • Discover and mitigate design and implementation issues that could put IT infrastructures at risk.
  • Prioritize budget and planning efforts to address the most significant threats.
  • Conduct security efforts for both new and existing IT infrastructure components in a more proactive and cost-effective manner.

Henk and Roger
Digg This