Free Training From Microsoft


Read it. Learn how to use Windows Update for
Business to keep the Windows 10 devices in your organization always up to
date with the latest security defenses and Windows features by directly
connecting these systems to the Windows Update service. You’ll also learn
how to use Group Policy or mobile device management (MDM) solutions, such
as Microsoft Intune, to configure Windows Update for Business settings
and control how and when Windows 10 devices are updated.

Watch it.
Want to know when to use cloud services, such as Windows Update for
Business? Check out this deep dive session: Enhance Windows 10 security and management with
Configuration Manager, Intune, and new cloud services
.

Read it. Walk through the decisions you will
make for Windows 10 clients in your enterprise virtual provide network
(VPN) solution and how to configure your deployment. This guide
references the VPNv2 Configuration Service Provider (CSP) and provides
mobile device management (MDM) configuration instructions using Microsoft
Intune and the VPN Profile template for Windows 10.

Watch it.
Have a more complicated network structure? Learn how to secure highly connected hybrid networks using
Azure Networking
.

Read it. Windows Information Protection helps to
protect enterprise apps and data against accidental data leak on
enterprise-owned devices and personal devices that employees bring to
work without requiring changes to your environment or other apps. Find
mandatory settings for WIP and information about enlightened Microsoft
apps, including how to add them to your allowed apps list in Microsoft
Intune, as well as information on recommended testing scenarios and
common limitations.

Watch it. Not sure if WIP is right for your organization? Watch Keep work and personal data separate and secure
using Windows Information Protection in Windows apps
to find out.

Read it. Explore strategies for deploying and
managing Windows 10, including deploying Windows 10 in a mixed
environment. This guide covers management options plus the four stages of
the device lifecycle: deployment and provisioning, identity and
authentication, configuration, and updating and servicing.

Watch it.
Want to know more about the new experience, management capabilities, and
options for managing Windows included in Windows 10, version 1607. Check
out Discover what’s new in device management or, for real world customer
experiences,
Take the road to modern enterprise device
management
.

Read it. Learn how you can use Group Policy
settings or a MDM solution to configure when devices will restart after a
Windows 10 update is installed. Schedule update installation and set
policies for restart, configure active hours for when restarts will not
occur, or do both.

Watch it.
Have other questions about Windows 10 deployment, security, or managing
updates? It’s likely your peers do too. Find answers to common questions
from the experts with Ask us almost anything about Windows 10 and Ask the experts – Windows 10 deployment,
servicing, and provisioning
. 

Introduction
to Azure Security Center
 
What’s the latest in Azure
Security?  Join the experts for this course and find out how it can help
you prevent, detect, and respond to security incidents more quickly. Azure
Security Center offers increased visibility and control over the security of
your Azure resources. See where your organization’s vulnerabilities might be,
and learn how Azure Security Center uses advanced analytics to identify attacks
that might otherwise go undetected.
Watch
now
! 
Introduction
to ASP.NET Core 1.0 
 If you’re an experienced Web Developer
interested in the basics of ASP.NET Core 1.0,
check
out this course
. Join experts Scott Hanselman and Maria
Naggaga for a look at the skills employers are looking for. Explore this
framework for building modern cloud-based web apps, and get lots of cloud-based
goodness. Build your first ASP.NET project, and gear up for the next course in
this three-course series. Get .NET ready! 

Original
Publication Date: 10/27/2016

Wireshark Training

Here is a link to free Wireshark training  to get you started sniffing packets This is a great blog to get you started you will learn Wireshark from the scratch. 

They will show you the
menus, filters and many other options. Most of the people know about Wirehsark,
but they don’t want to try it, because they simply don’t know how to write filters. One  focus will be on creating filter, not writing filters. Yes it is true,
that you can make filters without learning those filter parameters. On simple
words, you can use Wireshark without touching the keyboard. Those who have kali
linux, they have it in Kalilinux. I’ll be using wireshark 32 bit version. I’ll
concentrate on HTTP traffic throughout the tutorial. So let’s start with little
bit of theory.

You can also run Wireshark on almost any operating system. 

To download Wireshark go here:
 https://www.wireshark.org/download.html

To take the training go here: 

http://pentesterblogs.blogspot.in/2016/10/jumpstart-your-wireshark-skills.html

NIST Released the following New Draft Special Publications

This is your change to help create and review some new standards..


1. Draft SP 800-181, NICE Cybersecurity Workforce Framework (NCWF):
National Initiative for Cybersecurity Education
:

Information and links to Draft Special Publication 800-181 can be found on the
NIST CSRC Draft publications page. There is also a comment template available
to use to submit comments.  
<
http://csrc.nist.gov/publications/PubsDrafts.html#800-181>
Deadline
to submit comments: January 6, 2017


2. Draft SP 1800-6, Domain Name Systems-Based Electronic Mail Security: 
Provided below are 2 set of URLs which point to the same document – this draft
document is from the NIST National Cybersecurity Center of Excellence (NCCoE)
program, and this draft has been posted on the NCCoE’s website. Also, below, we
provided links to this draft SP from the CSRC Draft Publications page. Information
and links to Draft Special Publication 1800-6 has also been provided on the
NIST CSRC Draft publications page.  There is also a comment template
available to use to submit comments.


<
http://csrc.nist.gov/publications/PubsDrafts.html#1800-6>
-OR- Here is the link to the National Cybersecurity Center of
Excellence (NCCoE) website that has details of this draft as well:
<
https://nccoe.nist.gov/projects/building_blocks/secured_email>
Deadline
to submit comments to Draft SP 1800-6 is: December 19, 2016


3. NIST Released Draft Special Publications (SP) 800-121 Revision 2, Guide to
Bluetooth Security
is available for public
comment.  See below for further details.

Information
and link to Draft SP 800-121 Revision 2 can be found on the NIST CSRC Draft
Publications page:
<
http://csrc.nist.gov/publications/PubsDrafts.html#800-121r2>
Deadline
to submit comments to draft SP 800-121 Revision 2 is:


December 5, 2016

Free Training on Docker from Microsoft



I wanted to inform
about a
free, hands-on virtual lab from
the US Developer organization for your usage. This lab provides an introduction
on how to install, deploy and manage a Docker container on Hyper-V. In just 30
minutes, you’ll learn to build a modular, portable container on a real Windows
VM. There is no installation required


 
 Who should take this virtual lab?
·       Developers
who want an introduction to Docker on Hyper-V
·       Technical
professionals responsible for managing infrastructure
·       Individuals
who need to understand the hottest technology trends, but don’t have weeks to
spend learning them
·       
Go here to take training https://aka.ms/dockervlab

North East Annual Cybersecurity Summit (NEACS) Oct 7, 2016

http://www.neacs.org/

The North East Annual Cybersecurity Summit (NEACS) is the premier cybersecurity resource for business executives and technology professionals. For the 4th consecutive year, NEACS (formerly the Annual CT Business Security Summit) will connect attendees with leading subject matter experts in security, privacy, and risk management. NEACS provides attendees with insights on current cybersecurity risks and threats, as well as business and technology strategies to protect against and respond to cyber-attacks, data breaches, and fraud.

This annual conference brings together the best and the brightest for three days of dialogue, networking, and cutting-edge insight. This dynamic event is carefully crafted to deepen our collective understanding of the challenges and opportunities facing boardrooms, Business Leaders, Security Leaders and technologists today and in our future. There will be high impact sessions on a broad range of topics.
The summit information is as follows.

October 7, 2016 
8:00 AM – 5:00 PM
Trumbull Marriott Merritt Parkway
180 Hawley Lane, Trumbull CT

You can register at
http://www.cvent.com/events/north-east-annual-cybersecurity-summit-neacs-2016-/event-summary-3f7d710fae1449278748a2a2f5282225.aspx
to learn more go to http://www.neacs.org/

Free ebook from Microsoft on Microsoft Azure

Microsoft Azure is Microsoft’s cloud computing platform, providing a
wide variety of services you can use without purchasing and provisioning
your own hardware. Azure enables the rapid development of solutions and
provides the resources to accomplish tasks that may not be feasible in
an on-premises environment. Azure’s compute, storage, network, and
application services allow you to focus on building great solutions
without the need to worry about how the physical infrastructure is
assembled.

This book covers the fundamentals of Azure you need to start
developing solutions right away. It concentrates on the features of the
Azure platform that you are most likely to need to know rather than on
every feature and service available on the platform. This book also
provides several walkthroughs you can follow to learn how to create VMs
and virtual networks, websites and storage accounts, and so on. In many
cases, real-world tips are included to help you get the most out of your
Azure experience.

In addition to its coverage of core Azure services, the book
discusses common tools useful in creating and managing Azure-based
solutions. The book wraps up by providing details on a few common
business scenarios where Azure can provide compelling and valuable
solutions, as well as a chapter providing overviews of some of the
commonly used services not covered in the book.

Who should read this book

This book focuses on providing essential information about the key
services of Azure for developers and IT professionals who are new to
cloud computing. Detailed, step-by-step demonstrations are included to
help the reader understand how to get started with each of the key
services. This material is useful not only for those who have no prior
experience with Azure, but also for those who need a refresher and those
who may be familiar with one area but not others. Each chapter is
standalone; there is no requirement that you perform the hands-on
demonstrations from previous chapters to understand any particular
chapter.

Assumptions

We expect that you have at least a minimal understanding of
virtualized environments and virtual machines. There are no specific
skills required overall for this book, but having some knowledge of the
topic of each chapter will help you gain a deeper understanding. For
example, the chapter on virtual networks will make more sense if you
have some understanding of networking, and the chapter on databases will
be more useful if you understand what a database is and why you might
use one. Web development skills will provide a good background for
understanding Azure Web Apps, and some understanding of identity will be
helpful when studying the chapter on Active Directory.

This book might not be for you if…

This book might not be for you if you are looking for an in-depth
developer or architecture-focused discussion on a wide range of Azure
features, or if you are looking for details on other public or private
cloud platforms.

Organization of this book

This book explores six foundational features of the Microsoft Azure
platform, along with insights on getting started with Azure, management
tools, and common business scenarios. This book also includes a chapter
with overviews of some of the more commonly used services, such as
HDInsight (Azure’s Hadoop service) and Service Bus, but there are many
services in the Azure platform that are not in the scope of this book,
such as Azure Batch, Data Lake Analytics, and Azure DNS, just to mention
a few. To learn about all of the services available in the Azure
platform, start your journey at http://azure.microsoft.com. Also, there is a web application that shows the many services of Azure and allows you to drill down to learn move. See http://aka.ms/azposterapp.

The topics explored in this book include:

  • Getting started with Azure: Understand what cloud
    computing is, learn about Azure Resource Manager and Role-Based Access
    Control, visit the management portals, learn about billing, find out how
    you can contribute to the Azure documentation and code samples.
  • Azure App Service and Web Apps: Learn about the
    Azure App Service, consisting of Web Apps, Logic Apps, Mobile Apps, API
    Apps, and Function Apps. We will focus on Web Apps and how they work
    with the App Service and App Service plans, covering the topic from
    deployment to monitoring and scaling.
  • Virtual Machines: Explore the basic features of Azure Virtual Machines, including how to create, configure, and manage them.
  • Storage: Read about the basics of Azure Storage,
    including blobs, tables, queues, and file shares, as well as some of the
    options available such as Premium Storage and Cool Storage.
  • Virtual Networks: Learn the basics of virtual
    networks, including how to create one, and why a virtual network might
    be necessary. This also covers site-to-site and point-to-site
    networking, as well as ExpressRoute.
  • Databases: Explore two relational database options available in Azure: Azure SQL Database and SQL Server in Azure Virtual Machines.
  • Azure Active Directory: Explore basic features of Azure AD, including creating a directory, users and groups, and using the application gallery.
  • Management Tools: Explore three common tools for
    working with Azure: Visual Studio 2015 and the Azure SDK, Azure
    PowerShell cmdlets, and the Cross-Platform Command-Line Interface.
  • Additional Azure services: Get an overview about
    Azure services not covered in the book that may be fundamental to you
    now or in the future, such as Azure Service Fabric and Azure Container
    Service.
  • Business Scenarios: Explore five common scenarios
    for utilizing Azure features: development and test, hybrid, application
    and infrastructure modernization, and Azure Mobile Apps, and Machine
    Learning.

Get the book at this location

https://aka.ms/FundAzure2e/StndPDF

3rd Annual New York Metro Joint Cyber Security Conference (NYMJCSC)

New York Metro Joint Cyber Security
Conference
(NYMJCSC)
on October
5th 2016
in New York City, and is welcoming security
professionals, managers and students to attend! The NYMJCSC 2016’s program aims
to provide Insights into Cyber Security News/Trends, along with sharing
practical applications in Audit, Legal, Application Security and Risk
Management. This conference also is aligned with the National Cyber Security
Awareness Month (NCSAM) activities and seeks to reach a broad audience.  
           

LAST DAY TO REGISTER
10/4/16

EVENT DATE
10/5/16

EVENT LOCATION
Midtown, NYC

FULL DETAILS AND REGISTRATION
www.nymjcsc.org

I will be speaking.

Ransomware and what you can do about it

A group of friends who are Microsoft MVP create a group of tools to protect from ransomware, this is done vie a combination of documents, policies, recovery keys, and instruction sets for other tools native to Windows Server and Desktop OS’s. We also include suggestions of how you can modernize your network configuration best practices a build a great solution for your clients. What really nice about this solution is the cost. The Solution is donation based!!

 

The link for more information is here

Remember training user on opening email and links are part of the process in reducing risk of Ransomware, and good security practices.

Microsoft PowerShell can and now does run on LINUX !

Microsoft announced today
that PowerShell
is open sourced and available on Linux. PowerShell is a task-based command-line
shell and scripting language built on the .NET Framework to help IT
professionals control and automate the administration of the Windows, and now
Linux, operating systems and the applications that run on them Linux as well as
Windows. This new thinking empowered the .NET team to port .NET Core to Linux
and that in turn, enabled PowerShell to port to Linux as well. PowerShell on
Linux is now designed to enable customers to use the same tools, and the same
people, to manage everything from anywhere. It is initially available on
Ubuntu, Centos, as well as Red Hat, and also runs on Mac OS X. More platforms
will be added in the future. You can download Alpha builds and check out the
source code from GitHub.

Now, users across Windows
and Linux, current and new PowerShell users, even application developers can
experience a rich interactive scripting language as well as a heterogeneous
automation and configuration management that works well with your existing tools.
Your PowerShell skills are now even more marketable, and your Windows and Linux
teams, who may have had to work separately, can now work together more easily.

Boy are the bad guys getting sneeky with scareware

Lock at this BOGUS screen

What cool about this is how they added the location and the IP address into the scareware screen…

This is NOT real, but how many people would fall for this.  If you are  a home user running windows 10 here a go trick to know click on the windows key and type support one of the FREE options is help from Microsoft ….. If you at work you should contact your Help desk.

Remember Microsoft does not call customers and tell you that have problems with your computer.
If you get that call hang up !