7 Essential Time Management Skills
February 7, 2025
Article
This course is part of Microsoft Cybersecurity Analyst Professional Certificate
Instructor: Microsoft
12,982 already enrolled
Included with
(148 reviews)
Recommended experience
Beginner level
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
(148 reviews)
Recommended experience
Beginner level
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
How to work with the tools associated with security testing within a cloud environment.
How to execute penetration testing on a cloud platform.
How to create a penetration test plan.
Add to your LinkedIn profile
17 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
This course engages you in the world of cybersecurity attack and defense, dealing with both sides and working with the tools associated with security testing within a cloud environment.
You’ll gain knowledge on the penetration testing strategies employed by the industry to assess the integrity of their network. You’ll also interpret the results of security scans and deal with mitigation strategies such as vulnerability management. This course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Explain the concept of system testing • Create a penetration test plan • Execute penetration testing on a cloud platform This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
Discover the essential concepts and practices for effective penetration testing, including its stages like reconnaissance, enumeration, and exploitation.
15 videos16 readings5 assignments1 discussion prompt
Delve into crucial security tools and techniques for averting and identifying network threats. The material includes understanding intrusion detection and prevention systems (IDPS), firewall setup, virtual private networks (VPNs), and managing vulnerabilities.
18 videos19 readings6 assignments
Discover how to conduct penetration tests on the Azure platform and external servers. You'll learn about the concepts and best practices of penetration testing, setting up and configuring test environments, running and analyzing tests, and reporting and documenting results.
15 videos11 readings4 assignments
Put your skills into practice by completing end-of-course project and reinforce your understanding of the key concepts you’ve learned. This week provides a summary of the course, reflects on the primary learning objectives and provides the opportunity for you to consolidate your learning in a hands-on activity.
2 videos5 readings2 assignments1 discussion prompt
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more. In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
Course
Course
Course
Kennesaw State University
Specialization
148 reviews
81.87%
13.42%
3.35%
0%
1.34%
Showing 3 of 148
Reviewed on Nov 25, 2024
A comprehensive introduction to the fundamental concepts, techniques, and methodologies of penetration testing, with a focus on best practices and strategies for securing Azure Cloud Infrastructure
Reviewed on Oct 26, 2023
I am getting a lot of info here. I hope I'm able to use it in the daily workflow when I become a cybersecurity analyst!
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
This program is for you:
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.