Chevron Left
Back to Cybersecurity Threat Vectors and Mitigation

Learner Reviews & Feedback for Cybersecurity Threat Vectors and Mitigation by Microsoft

4.7
stars
198 ratings

About the Course

This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Describe the active threat landscape • Describe common types of cyber attacks • Classify different types of encryption algorithms • Explain security and compliance concepts This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification....

Top reviews

SP

Invalid date

Excellent course for conceptual understanding of mitigating threats in cybersecurity.

MM

Invalid date

Good introductory program to threats and mitigation in cyber security

Filter by:

26 - 30 of 30 Reviews for Cybersecurity Threat Vectors and Mitigation

By Nathan

Feb 1, 2024

Great course

By Ahmad S

Jul 25, 2023

course is good but it is very buggy. Cant access quiz. hope they fix it in time

By S M

Jan 20, 2024

Great learning platform

By Renee J

Jul 4, 2024

A few practice exam questions directly contradict the text in the readings or video. ( example:. Text says Veracrypt/ truecrypt protects servers and files/ folders but in exam you have to select false indicating it does not protect folders/files ( I think an unneeded “not” is in the question text). Example 2: PGP first sentence in text says it is used for email but in module exam you must only select S/MIME. This is misleading. Example 3: Video says Diffie Helman use for symmetric cryptography but that is not fully true. Also used in PKC which is asymmetric as called out in the reading). The instructor speaks way too slowly - had to play at 1.5-2x speed. Need more visuals of how all encryption protocols work together and in what use cases.

By Ali A

Dec 3, 2023

Imagine giving your student a false flag of cheating because he is smart. I take my reputation seriously, and your system is incompetent. Conduct a schedule for me to take this in quiz in front of a proctor with cameras pointing in every angle. Though, I expect heavy compensation as a result of wasting my time. Email me, or message me to get in contact. Disgusting.