Wenn Sie sich für diesen Kurs anmelden, werden Sie auch für diese Spezialisierung angemeldet.
Lernen Sie neue Konzepte von Branchenexperten
Gewinnen Sie ein Grundverständnis bestimmter Themen oder Tools
Erwerben Sie berufsrelevante Kompetenzen durch praktische Projekte
Erwerben Sie ein Berufszertifikat zur Vorlage
In diesem Kurs gibt es 4 Module
This course engages you in the world of cybersecurity attack and defense, dealing with both sides and working with the tools associated with security testing within a cloud environment.
You’ll gain knowledge on the penetration testing strategies employed by the industry to assess the integrity of their network. You’ll also interpret the results of security scans and deal with mitigation strategies such as vulnerability management.
After completing this course, you’ll be able to:
• Explain the concept of system testing
• Create a penetration test plan
• Execute penetration testing on a cloud platform
Discover the essential concepts and practices for effective penetration testing, including its stages like reconnaissance, enumeration, and exploitation.
Das ist alles enthalten
15 Videos16 Lektüren5 Aufgaben1 Diskussionsthema
Infos zu Modulinhalt anzeigen
15 Videos•Insgesamt 81 Minuten
Introduction to the course•4 Minuten
Security testing and ethical hacking•6 Minuten
Blue team: Responsibilities•6 Minuten
Red team: Responsibilities•6 Minuten
Penetration testing overview•6 Minuten
Stage 1 - Reconnaissance•4 Minuten
Stage 2 - Enumeration•6 Minuten
Stage 3 - Exploitation•4 Minuten
Stage 4 - Escalation•5 Minuten
Stage 5 - Reporting and remediation•4 Minuten
ATT&CK (Adversarial Tactics, Techniques and Common Knowledge) Framework•7 Minuten
Black box testing•6 Minuten
White box testing•5 Minuten
Grey box testing•6 Minuten
Module summary: Penetration testing•7 Minuten
16 Lektüren•Insgesamt 160 Minuten
Course syllabus•10 Minuten
How to be successful in this course•10 Minuten
Microsoft Azure Active Directory name change•10 Minuten
Knowledge check: Types of penetration tests•15 Minuten
Module quiz: Penetration testing•30 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
What do you hope to learn?•10 Minuten
Preventative tools
Modul 2•7 Stunden abzuschließen
Moduldetails
Delve into crucial security tools and techniques for averting and identifying network threats. The material includes understanding intrusion detection and prevention systems (IDPS), firewall setup, virtual private networks (VPNs), and managing vulnerabilities.
Das ist alles enthalten
18 Videos19 Lektüren6 Aufgaben
Infos zu Modulinhalt anzeigen
18 Videos•Insgesamt 109 Minuten
Introduction to Intrusion Detection and Prevention Systems (IDPS)•6 Minuten
Unpacking internet packets•6 Minuten
Azure Firewall Premium Intrusion Detection and Prevention System (IDPS)•6 Minuten
Azure IDPS in action•4 Minuten
IDPS use cases•6 Minuten
Introduction to firewall design in Azure•6 Minuten
Azure Firewall rule design and configuration•5 Minuten
Network security group and Azure firewall integration•5 Minuten
VPN gateway•5 Minuten
How Azure VPN can help your business•7 Minuten
Configure VPNs on Azure•7 Minuten
Azure Point-to-Site VPN•6 Minuten
IP addressing and subnets•7 Minuten
Introduction to vulnerability management•5 Minuten
Discover how to conduct penetration tests on the Azure platform and external servers. You'll learn about the concepts and best practices of penetration testing, setting up and configuring test environments, running and analyzing tests, and reporting and documenting results.
Das ist alles enthalten
15 Videos11 Lektüren4 Aufgaben
Infos zu Modulinhalt anzeigen
15 Videos•Insgesamt 93 Minuten
Introduction to Command Line•8 Minuten
Command Line in action•5 Minuten
Introduction to Windows PowerShell•5 Minuten
Windows PowerShell Script in action•8 Minuten
Introduction to penetration testing on Azure•6 Minuten
How does Azure penetration testing work?•8 Minuten
Azure penetration test overview •6 Minuten
Getting Azure ready•6 Minuten
Penetration testing framework•6 Minuten
Azure security settings•7 Minuten
Running the penetration test and analyzing the result•6 Minuten
Penetration testing and Azure Security Center•5 Minuten
Introduction to Windows PowerShell Script•10 Minuten
Command Line tools•10 Minuten
Best practices for Command Line penetration testing•10 Minuten
Additional resources: The Command Line•5 Minuten
Azure penetration testing guidelines•10 Minuten
Defender for Cloud's integrated Qualys vulnerability scanner•10 Minuten
Additional resources: Setting up Azure for testing•5 Minuten
Interpreting scan and test results•10 Minuten
Penetration testing best practices•10 Minuten
Additional resources: Running the test•5 Minuten
4 Aufgaben•Insgesamt 75 Minuten
Knowledge check: The Command Line•15 Minuten
Knowledge check: Setting up Azure for testing•15 Minuten
Knowledge check: Running the test•15 Minuten
Module quiz: Azure penetration testing•30 Minuten
Final project and assessment: Cybersecurity Tools and Technologies
Modul 4•4 Stunden abzuschließen
Moduldetails
Put your skills into practice by completing end-of-course project and reinforce your understanding of the key concepts you’ve learned. This week provides a summary of the course, reflects on the primary learning objectives and provides the opportunity for you to consolidate your learning in a hands-on activity.
Das ist alles enthalten
2 Videos5 Lektüren2 Aufgaben1 Diskussionsthema
Infos zu Modulinhalt anzeigen
2 Videos•Insgesamt 10 Minuten
Course recap: Cybersecurity tools and technologies•6 Minuten
Congratulations•4 Minuten
5 Lektüren•Insgesamt 70 Minuten
About the final project and assessment: Cybersecurity tools and technologies•10 Minuten
Exercise: Plan of attack•30 Minuten
Exemplar: Plan of attack•10 Minuten
Clean up resources•10 Minuten
Next steps•10 Minuten
2 Aufgaben•Insgesamt 120 Minuten
Self review: Plan of attack•30 Minuten
Course quiz: Cybersecurity tools and technologies•90 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
Reflect on learning•10 Minuten
Erwerben Sie ein Karrierezertifikat.
Fügen Sie dieses Zeugnis Ihrem LinkedIn-Profil, Lebenslauf oder CV hinzu. Teilen Sie sie in Social Media und in Ihrer Leistungsbeurteilung.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
What background knowledge is necessary?
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
What is the main benefit of a Professional Certificate?
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
How long does it take to complete the Professional Certificate?
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
What will I be able to do upon completing the Professional Certificate?
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
What does a cybersecurity analyst do?
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
What jobs can I get with cybersecurity skills?
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
Will I be able to complete this course online?
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
Do I need to take the courses in specific order?
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.