7 Essential Time Management Skills
February 7, 2025
Article
This course is part of Microsoft Cybersecurity Analyst Professional Certificate
Instructor: Microsoft
8,373 already enrolled
Included with
(60 reviews)
Recommended experience
Beginner level
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
(60 reviews)
Recommended experience
Beginner level
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
How to manage and reduce the risk of threats to an organization or system.
How to mitigate common cyber threats using various tools and strategies.
How to develop strategies to protect data and applications from unauthorized access.
Add to your LinkedIn profile
20 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
In this course, you’ll learn about threat mitigation by following the three stages of threat modeling. The steps are: decomposing the application, determining and ranking threats, and determining countermeasures and mitigation. You’ll learn about access control, secure development, cryptography, as well as asset management. You’ll also be introduced to the types of attacks that IoT (Internet of Things) devices and services face.
At the end of this course, you’ll also complete a focused security mitigation strategy plan for a given business. This capstone project integrates the knowledge you’ll have gained from the previous courses into a standalone portfolio piece, demonstrating your new cybersecurity skills. The course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Explain threat modeling • Discuss security conscious design • Plan threat mitigation strategies This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
This week introduces common threat modeling and mitigation steps, and the processes and procedures used to manage and reduce the risk of threats to an organization or system. It also covers the steps of threat modeling, each of which requires different tools and approaches. Additionally, various threat modeling frameworks will be introduced.
14 videos24 readings6 assignments1 discussion prompt
This week covers threat vectors, ransomware, defense in depth security, cloud security, network security, data security, and monitoring security in Azure. It also includes understanding the MITRE ATT&CK Matrix and IoT security. The module aims to provide you with an understanding of common cyberthreats, and how to mitigate them using various tools and strategies. By the end of the module, you will have a comprehensive understanding of the different components of cybersecurity and the measures you can take to protect your infrastructure from cyberthreats.
14 videos8 readings4 assignments
This week provides an overview of various cybersecurity concepts and practices. It covers the basics of threat vectors, entry points, and prevention methods in cybersecurity. It also explains defense in depth security, Azure security, network security, data security, and monitoring security. You will gain a deeper understanding of these concepts, learn how to identify and mitigate security threats, and develop strategies to protect data and applications from unauthorized access. By the end of this module, you will have a comprehensive understanding of cybersecurity and be able to create an effective defense in depth security strategy for an organization.
13 videos9 readings4 assignments
In this week, you will be assessed on the key skills covered throughout this course and the other courses in the Cybersecruity Analyst Program. This module contains the Final Capstone project of the program which encapsulates the learning into a practical whole. The Final Capstone project consists of several stages and graded self-reviews. This module also includes the final graded quiz.
3 videos10 readings6 assignments1 discussion prompt
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more. In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
Course
Course
Infosec
Course
University of Maryland, College Park
Course
60 reviews
83.33%
8.33%
1.66%
0%
6.66%
Showing 3 of 60
Reviewed on Jan 3, 2025
Excellent course, I enjoyed a lot particularly good material and the videos and reading are well complete.
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
This program is for you:
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.