Chevron Left
Back to Cybersecurity Threat Vectors and Mitigation

Learner Reviews & Feedback for Cybersecurity Threat Vectors and Mitigation by Microsoft

4.7
stars
230 ratings

About the Course

This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Describe the active threat landscape • Describe common types of cyber attacks • Classify different types of encryption algorithms • Explain security and compliance concepts This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification....

Top reviews

MN

Aug 6, 2023

This course is considerably difficult than the first 2 courses. but still it is structured very good. waiting for the next one!!!

SP

Apr 26, 2024

Excellent course for conceptual understanding of mitigating threats in cybersecurity.

Filter by:

26 - 38 of 38 Reviews for Cybersecurity Threat Vectors and Mitigation

By Uy T H

Nov 8, 2024

Good

By H.C P

Aug 29, 2024

Best

By ASADUL I

May 1, 2024

nice

By SK. S

Oct 3, 2023

Best

By Data R

Apr 25, 2024

The course taught me alot, love the use of real world examples and scenarios and even cases.

By Alishandra C

Dec 6, 2023

A beautiful challenge! I like where it's going.

By Daniel P

Oct 23, 2023

Great course.

By Nathan

Feb 1, 2024

Great course

By Ahmad S

Jul 25, 2023

course is good but it is very buggy. Cant access quiz. hope they fix it in time

By S M

Jan 20, 2024

Great learning platform

By Renee J

Jul 4, 2024

A few practice exam questions directly contradict the text in the readings or video. ( example:. Text says Veracrypt/ truecrypt protects servers and files/ folders but in exam you have to select false indicating it does not protect folders/files ( I think an unneeded “not” is in the question text). Example 2: PGP first sentence in text says it is used for email but in module exam you must only select S/MIME. This is misleading. Example 3: Video says Diffie Helman use for symmetric cryptography but that is not fully true. Also used in PKC which is asymmetric as called out in the reading). The instructor speaks way too slowly - had to play at 1.5-2x speed. Need more visuals of how all encryption protocols work together and in what use cases.

By Tetiana M

Oct 14, 2024

The speaker from the video materials is not good for presenting the materials. He speaks in a monotonous manner which might be good for lullaby stories but definitely not for serious topics where you need to use your voice to stress more important details and focus the listeners attention of specific points.

By Ali A

Dec 3, 2023

Imagine giving your student a false flag of cheating because he is smart. I take my reputation seriously, and your system is incompetent. Conduct a schedule for me to take this in quiz in front of a proctor with cameras pointing in every angle. Though, I expect heavy compensation as a result of wasting my time. Email me, or message me to get in contact. Disgusting.