Defending M365 & Azure with Kevin Klingbile

Overview
- Course Length: 16 hours
- Support from expert instructors
- Includes a certificate of completion
- 12 months access to Cyber Range
This class is designed to be an introduction to M365 and Azure security strategies.
In today’s digital landscape, organizations commonly rely on Azure and Microsoft 365 for critical operations. However, with the increased adoption of these platforms comes a heightened need for robust defense strategies to protect against evolving threats and safeguard sensitive data.
This course will equip IT professionals with the knowledge and skills needed to defend Azure and Microsoft 365 environments effectively. We will cover cloud security measures and common misconfigurations. In addition, Red Teamers will learn to identify common attack surfaces within their client’s environments.
Student Requirements:
- Credit Card to sign up for M365 and Azure services
- While it is possible to follow the lecture during class without a subscription, a subscription is required to work with the labs and get hands-on experience in M365 and Azure.
- Validate Microsoft M365 and Azure services are available in your country
Syllabus
- Cloud Basics
- Recon (Unauthenticated & Authenticated)
M365
- Entra ID/IaM (Users, Groups, Applications, PIM, Identity Protection, Conditional Access, MFA, SSPR, Etc.)
- InTune
- Exchange
- Microsoft Graph API
- Office Forms
- SharePoint
- Teams
Azure
- Subscriptions
- Key Vault
- Azure Firewall
- Application Gateway
- Azure Management and Orchestration
- Azure DevOps
- Governance & Compliance
- Azure Cloud Shell
- Compute
- Networking
- Storage Accounts
- Applications
- Azure DevOps
Blue Team Summit (Aug 28th – Aug 29th, 2025)
- August 28th – 9:00 AM to 6:00 PM EDT
- August 29th – 9:00 AM to 6:00 PM EDT
Wild West Hackin’ Fest – Deadwood (Oct 7th – Oct 8th, 2025) – Deadwood, SD
- October 7th – 8:30 AM to 5:00 PM MDT
- October 8th – 8:30 AM to 5:00 PM MDT
Prerequisites:
This class is an introduction to M365 and Azure security strategies. However, an understanding of security and cloud concepts is beneficial. A basic working knowledge of PowerShell is helpful but not necessary.
Computer Specs:
- Full Administrator
- Stable Internet Access
- The class requires a Windows 10/11 host (Virtual or Physical) with Administrator access to PowerShell for executing queries against M365 and Azure
- Windows System Requirements:
- x86 architecture CPU clocked at 2 GHz or higher
- A computer with at least 8 GB of RAM. 16 GB is recommended
This class is being taught at both WWHF Deadwood 2025 and WWHF Mile High 2026.
For more information about our conferences, visit
Wild West Hackin’ Fest!
Live Training
- Collaborative interaction with Instructor and fellow students through the Antisyphon Discord class channel
- Access to course slides for future reference
- Tips, tools, and techniques that can be applied immediately upon returning to work
- Strengthen your skills by solving challenges within the Antisyphon Cyber Range
- Become part of a community driven to educate and share knowledge
On Demand Training
-
Train at your own pace with no set course schedule
-
Access to all course resources, including slides and VMs
-
Subject Matter Expert support through Discord
- Tips, tools, and techniques that can be applied immediately upon returning to work
- Strengthen your skills by solving challenges within the Antisyphon Cyber Range
- Become part of a community driven to educate and share knowledge