When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Microsoft
There are 5 modules in this course
This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats.
You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
After completing this course, you’ll be able to:
• Describe the active threat landscape
• Describe common types of cyber attacks
• Classify different types of encryption algorithms
• Explain security and compliance concepts
This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
Dive into the world of cyber threats and attacks and get to know the active threat landscape.
What's included
10 videos15 readings4 assignments
Show info about module content
10 videos•Total 46 minutes
Introduction to the course: Cybersecurity threat vectors and mitigation•4 minutes
Introduction to cyber attacks•4 minutes
Trojans and viruses•6 minutes
Introduction to threat vectors•5 minutes
Malware and ransomware•5 minutes
Phishing and social engineering•5 minutes
Threats•2 minutes
Personal mitigation strategies•5 minutes
Security software•5 minutes
Module summary: Threats and attacks•5 minutes
15 readings•Total 170 minutes
Course syllabus•10 minutes
Additional resources: Threats and attacks•15 minutes
Knowledge check: Public/private and key hashing•15 minutes
Knowledge check: Digital signing and certificates•15 minutes
Knowledge check: Authentication and authorization•15 minutes
Module quiz: Cryptography•30 minutes
Network and device-based threats
Module 3•4 hours to complete
Module details
Examine the various types of threats that can occur during data transmission, the importance of security controls in protecting against these threats, and the importance of keeping applications and devices updated to mitigate these risks.
What's included
9 videos11 readings5 assignments
Show info about module content
9 videos•Total 46 minutes
Data transmission threats•5 minutes
Virtual private network•6 minutes
Advanced persistent threats (APT)•5 minutes
Firewall optimization•5 minutes
Network segmentation•5 minutes
Intrusion detection and prevention system•5 minutes
Introduction to application updates•5 minutes
Bring your own device risks•5 minutes
Module summary: Network and device-based threats•5 minutes
11 readings•Total 115 minutes
Data transmission intercept tools•10 minutes
APTs in action•10 minutes
IoT threats•10 minutes
Additional resources: Data transmission•5 minutes
Firewall configuration•10 minutes
Endpoint security•10 minutes
Exercise: Walling off•30 minutes
Exemplar: Walling off•10 minutes
Additional resources: Security controls•5 minutes
Keeping applications and operating systems up to date•10 minutes
Module quiz: Network and device-based threats•30 minutes
Security, compliance and identity
Module 4•3 hours to complete
Module details
Explore the different laws, regulations, and industry standards that organizations must adhere to in order to ensure the security of their systems and data.
What's included
9 videos11 readings4 assignments
Show info about module content
9 videos•Total 43 minutes
Overview of security compliance•5 minutes
Risk management and compliance•5 minutes
Browser cookies and GDPR•4 minutes
Identity management•5 minutes
Single sign-on (SSO)•5 minutes
Active Directory and Group Policy•5 minutes
Defense in depth•4 minutes
Zero Trust Model•5 minutes
Module summary: Security, compliance and identity•6 minutes
11 readings•Total 95 minutes
Industry standards and compliance frameworks•10 minutes
General Data Protection Regulation (GDPR)•10 minutes
Additional resources: Security and compliance concepts•5 minutes
Identity management in action•10 minutes
Group Policies•10 minutes
Managing identities and access with Azure Active Directory•10 minutes
Additional resources: ID and Active Directory•5 minutes
Defense in depth in action•10 minutes
Cloud security and defense in depth•10 minutes
Security operations and monitoring•10 minutes
Additional resources: Defense models•5 minutes
4 assignments•Total 61 minutes
Knowledge check: Security and compliance concepts•1 minute
Knowledge check: ID and Active Directory•15 minutes
Knowledge check: Defense models•15 minutes
Module quiz: Security, compliance and identity•30 minutes
Cybersecurity threat vectors and mitigation
Module 5•2 hours to complete
Module details
Put your skills into practice by creating your own compliance strategy for the end-of-course project and reinforce your understanding of the key concepts you’ve learned.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
What background knowledge is necessary?
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
What is the main benefit of a Professional Certificate?
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
How long does it take to complete the Professional Certificate?
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
What will I be able to do upon completing the Professional Certificate?
When you complete the Professional Certificate, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
What does a cybersecurity analyst do?
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
What jobs can I get with cybersecurity skills?
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
Will I be able to complete this course online?
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
Do I need to take the courses in specific order?
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.