Skilling to implement Essential Eight in Australia
Training is critical to helping your organisation implement and maintain the Essential Eight controls.
Each of the Essential Eight mitigation strategies requires configuring various platforms or software systems utilised within an organisation.
Due to the wide range of systems utilised across organisations, there is no dedicated training course for Essential Eight. However, much of the recommended mitigation strategies align with the Microsoft ecosystem. We have mapped some recommended training courses to assist your organisation in implementing and maintaining the Essential Eight.
Explore these Lumify Work training options:
Pillar 1 - Implementing Application Control
We recommend the following courses, which will give students the knowledge to help them reach maturity level 2 (if not 3) within an organisation.
Pillar 2 - Patch Applications
We recommend the following courses that cover Windows Defender, Azure Sentinel and Purview. These will provide students with knowledge and a robust toolkit to help them reach the desired maturity level within an organisation.
Pillar 3 - Configure Office Macro Settings
We recommend the following courses covering Microsoft Security, Compliance and Identity. These offer students the knowledge and tools to help them reach their organisation's desired security maturity level.
Pillar 4 - User Application Hardening
We recommend the following courses or the security training path covering Microsoft Security, Compliance and Identity. These offer students the know-how and tools to help reach the desired maturity level within an organisation's Microsoft ecosystem.
Microsoft MD-102T00 - Microsoft 365 Endpoint Administrator
Or follow the Microsoft Security training path below:
Pillar 5 - Restrict Administrative Privileges
We recommend the following security training path covering Microsoft Security, Compliance and Identity. This training path gives students the skills and knowledge to help them reach the desired maturity level within an organisation.
Pro-tip: Windows Defender Credential Guard and Windows Defender Remote Credential Guard are your go-to here.
Pillar 6 - Patch Operating Systems
We recommend the following courses covering Windows Defender, Azure Sentinel and Purview.
Pillar 7 - Multi-Factor Authentication (MFA)
and
Pillar 8 - Regular Backups
We recommend the following courses covering Windows Defender, Azure Sentinel, EntraID and Purview.
Cyber Security Best Practices, Auditing and Risk Assessments
Before anything else, get the fundamentals right.
To prepare for implementing Essential Eight strategies, you must audit your organisation to understand where you are currently aligned and what you need to do to reach the desired maturity level.
The leader in your organisation who will own the Essential Eight project needs to have a fundamental understanding of crucial cyber security concepts. This basic understanding will aid in the implementation and maintenance processes.
Below are some recommended fundamental courses to assist individuals not officially trained in these domains.
Lumify also offers a wide range of cyber security training courses appropriate for all experience levels. If you want more advanced training in Cyber Security, don't hesitate to contact us.
Explore training options on Cyber Security Fundamentals:
Certified in Cybersecurity - The ISC2 Certified in Cybersecurity (CC) is a one-day workshop that provides training on foundational cyber security best practices, including security principles, business continuity, incident response and disaster recovery, access control concepts, network security, and security operations. It would be ideal for anyone managing your Essential Eight program.
IT Audit Fundamentals - The ISACA IT Audit Fundamentals Certificate fills an educational gap. Its learnings include how to prepare an audit, the IT environment and components, and emerging technologies. It also helps your enterprise address the increasing need for audit professionals throughout an organisation.
IT Risk Fundamentals - The ISACA IT Risk Fundamentals Certificate course provides valuable foundational knowledge on terminology, concepts, and processes. This knowledge can empower professionals within your organisation to better communicate with Risk or IT Risk professionals. The course teaches the basics for those interested in working as risk or IT Risk professionals.