Efive Cybersecurity
Efive Cybersecurity
  • Home
  • Partnerships
    • Leveraging M365
    • Microsoft Partnership
    • EC-Council
  • Training Services
    • Training Curriculum
  • Consulting Services
    • Risk Assessment Services
    • Vendor Risk Assessment
    • SOC 2 Type 2 Gap Analysis
    • CMMC 2.0 Gap Analysis
    • SOC 2 + HITRUST Services
  • Talent Acquisition
    • Clients Search for Talent
    • Job Opportunities
  • Cybersecurity Awareness
  • More
    • Home
    • Partnerships
      • Leveraging M365
      • Microsoft Partnership
      • EC-Council
    • Training Services
      • Training Curriculum
    • Consulting Services
      • Risk Assessment Services
      • Vendor Risk Assessment
      • SOC 2 Type 2 Gap Analysis
      • CMMC 2.0 Gap Analysis
      • SOC 2 + HITRUST Services
    • Talent Acquisition
      • Clients Search for Talent
      • Job Opportunities
    • Cybersecurity Awareness

  • Home
  • Partnerships
    • Leveraging M365
    • Microsoft Partnership
    • EC-Council
  • Training Services
    • Training Curriculum
  • Consulting Services
    • Risk Assessment Services
    • Vendor Risk Assessment
    • SOC 2 Type 2 Gap Analysis
    • CMMC 2.0 Gap Analysis
    • SOC 2 + HITRUST Services
  • Talent Acquisition
    • Clients Search for Talent
    • Job Opportunities
  • Cybersecurity Awareness

Get Real-World M365 Cybersecurity Training

At Efive Cybersecurity, we provide top-notch real-world M365 Cybersecurity Training for businesses, professionals, groups and individual users ready to make a difference in their business environment or cybersecurity profession. To enroll in our training services, explore our platform training access pricing and discover how we can help you stay safe online and implement in-demand cybersecurity controls for threat mitigation.

Get 5% Discount for EC-Council's Certification - Email us now at info@efivecybersecurity.com

Real-World M365 Cybersecurity Training Curriculum

GRC Training Request - 2 Months Program (Weekends Only)

  • Assessment implementations - SOC 2 and CMMC 2.o
  • Data Loss Prevention (DLP) Policies
  • Information Protection Policies
  • Data Life Cycle Management
  • Real-World Annual Internal SOC 2 Audit Exercise


Enterprise Risk Assessment

  • Enterprise Risk Assessment 
  • Leveraging Enterprise Risk Response Strategies
  • Implementing Enterprise Risk Management Framework
  • Risk Register Documentation


Third-Party Vendor Risk Assessment

  • Performing an Onboarding Vendor Risk assessment
  • NDA Obligations
  • Building a Vendor Management Dashboard for vendor Tracking & Remediations 
  • Performing Annual Vendor Risk Assessment & Reporting


Incident Response Testing

  • Performing annual Incident Response Testing (Cybersecurity Tabletop Exercises)
  • Report Documentation for Evidence Gathering.
  • CISA Incident Response Resources


Asset Management & Configuration Audit

  • Asset (System Inventory) Management 
  • Systems and Application Audit Documentation
  • Performing Quarterly Audits 
  • Reporting Risks and Remediation Efforts
  • Vulnerability Management


Physical Access Review

  • Performing Quarterly Audits 
  • Physical Access Control Implementation Scenarios
  • Evidence Gathering & Documentation


Policy & Procedure Drafting & Review

  • Risk Management Policy & Procedure
  • Physical Access Policy & Procedure
  • Information Security Policy & Procedure
  • Security Awareness Policy & Procedure
  • Access Control Policy & Procedure
  • Identification & Authentication Policy & Procedure
  • Incident Response Policy & Procedure
  • Secure System Development Life Cycle Standard


Additinal Services - Get Certified as CyberAB's Registered Practitioner (RP) after training.  


Enroll Now for $1500

MS Entra ID Training - Self Paced Learning (Enroll Anytime)

Introduction to Entra ID (Azure Active Directory)

  • Identity Access Management
  • User Provisioning 
  • User Role Assignment
  • User Access Reviews
  • User Deprovisioning
  • Security and Dynamic Role creation
  • Enterprise Application Registrations
  • Identity Protection 
  • User risky policy config
  • Sign-in risky policy config
  • Multifactor Authentication registration Policy
  • Risky User Reports
  • Authentication Methods config
  • Password Protection config
  • Password reset config
  • Privileged Identity Management

Conditional Access Policies

  • Geo-fencing
  • MFA for all users
  • MFA for all admins
  • MFA for all guest
  • Require Phishing-resistant MFA for Admins
  • Blocking legacy authentication
  • No persistent browser session
  • Require Device Compliance
  • Require ReAuth and Disable Browser Persistence
  • Use Application Enforced Restrictions for unmanaged devices


Enroll Now for $499.99 Per Month

MS Defender Training - Partner Led

  • Incident & Alerts Investigations & Triaging 
  • Incident Management
  • Alert Service Settings
  • Alert Email Notification settings
  • Alert Tuning
  • Defender security configuration settings.
  • Threat Hunting 
  • Actions & User Submissions
  • Phishing Reporting & Triaging
  • Threat Intelligence
  • Threat Analytics 
  • Intel Explorer
  • Intel Profiles
  • Intel Projects
  • Intro to MS Sentinel (Log Aggregator)
  • Incident triaging & Log Analysis from Sentinel
  • Enabling Sentinel Analytics Rules  
  • Installing Data Connectors
  • Sentinel Workbooks
  • Email & Collaboration
  • Explorer Analysis for Malware / Phish
  • Quarantine Email Reviews
  • Utilizing the Exchange Message Trace
  • Security Awareness Training (Social Engineering Attacks, Phishing Training)
  • Attack Simulation Testing & Training
  • Threat Policies & Configurations
  • Preset Security Policies
  • Anti-Phishing Policies
  • Anti-Spam Policies
  • Anti-Malware Policies
  • Safe Attachments
  • Safe Links
  • Tenant Allow/Block Lists config
  • Cloud App Discovery Policies

Partner Led Training - Email interest for more details.

MS Endpoint (Intune) Training - Partner Led

  • Device Management 
  • Device Configuration Settings
  • Device Compliance Settings
  • Defender security configuration settings
  • Intune configuration settings
  • Windows device management
  • App Protection Policies Config
  • Android Mobile App Protection Policies Config
  • iOS Mobile App Protection Policies Config
  • Security baseline configurations
  • Administrative configuration settings
  • Attack Surface Reduction (ASR)
  • Anti-virus policy configuration
  • Endpoint Privilege Identity Management 
  • Disk Encryption Policies
  • Firewall Policies
  • Endpoint Detections & Response (EDR)
  • Tenant Administration

Partner Led Training - Email interest for more details.

Enrollment Subscriptions

MS Entra ID Training - Self Paced Learning (Enroll Anytime)

MS Entra ID Training - Self Paced Learning (Enroll Anytime)

MS Entra ID Training - Self Paced Learning (Enroll Anytime)

Get the Monthly Access to the M365 Platform to our self paced training & practicals. Billed Monthly.

Enroll Now for $499.99

Specialized Training Program Request

MS Entra ID Training - Self Paced Learning (Enroll Anytime)

MS Entra ID Training - Self Paced Learning (Enroll Anytime)

This training package is mostly requested by the student for enrollment (i.e. Intensive training on CMMC /NIST 800-171 r2, SOC 2 Type 2 + HITRUST, NIST RMF, ISO 27001, Performing Enterprise Risk Assessment, and Vendor Risk Assessment, etc.) Add a short description. Invoice billed upon training request.

Email for More Details

Resume, Job Applications & Interview Guide

MS Entra ID Training - Self Paced Learning (Enroll Anytime)

Resume, Job Applications & Interview Guide

Efive Cybersecurity provides guidance for Resume writing, Job Application search & Interview Preps with our in-house Experts. One-time service payment.

Enroll Now for $499.99

Our Partners

Frequently Asked Questions

Please reach us at info@efivecybersecurity.com if you cannot find an answer to your question.

Efive Cybersecurity provides expert cybersecurity consulting services for small & medium-sized businesses, groups, professionals and individuals. Contact us today to optimize your cybersecurity posture and cybersecurity training. 


Utilize our enrollment form to select one of our training services.


Yes! Please contact us at info@efivecybersecurity.com for any cybersecurity training services you may require. 


Copyright © 2024 Efive Cybersecurity - All Rights Reserved.

  • Microsoft Partnership
  • Training Curriculum
  • Risk Assessment Services
  • Vendor Risk Assessment
  • SOC 2 Type 2 Gap Analysis
  • Clients Search for Talent
  • Job Opportunities
  • Privacy Policy
  • Cybersecurity Awareness
  • Contact US

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept