When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Microsoft
There are 4 modules in this course
In this course, you’ll learn about threat mitigation by following the three stages of threat modeling. The steps are: decomposing the application, determining and ranking threats, and determining countermeasures and mitigation. You’ll learn about access control, secure development, cryptography, as well as asset management. You’ll also be introduced to the types of attacks that IoT (Internet of Things) devices and services face.
At the end of this course, you’ll also complete a focused security mitigation strategy plan for a given business. This capstone project integrates the knowledge you’ll have gained from the previous courses into a standalone portfolio piece, demonstrating your new cybersecurity skills. The course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
After completing this course, you’ll be able to:
• Explain threat modeling
• Discuss security conscious design
• Plan threat mitigation strategies
This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
This module introduces the core principles and processes of threat modeling used to identify and mitigate security risks. You will learn how to decompose applications, analyze and rank threats, and define appropriate countermeasures. The module also explores frameworks such as STRIDE, PASTA, CVSS, and VAST, along with practical applications using Azure tools. By the end, you will be able to develop structured threat models to secure systems and infrastructure effectively.
What's included
14 videos19 readings4 assignments
Show info about module content
14 videos•Total 100 minutes
Introduction to the course•4 minutes
Threat modeling process•7 minutes
Decompose the application•7 minutes
Determine and rank threats•7 minutes
STRIDE threat list•7 minutes
Benefits of threat modeling•7 minutes
Ensure application security – SANS approach•7 minutes
Process for Attack Simulation and Threat Analysis (PASTA)•8 minutes
Common Vulnerability Scoring System (CVSS)•8 minutes
Visual, Agile, and Simple Threat (VAST)•8 minutes
Microsoft threat modeling tool•8 minutes
Threat Modeling for Azure Virtual Networks•9 minutes
Four Question framework for effective threat modeling•6 minutes
Module summary: Threat modeling•8 minutes
19 readings•Total 230 minutes
Course syllabus•10 minutes
Additional resources•5 minutes
Determine countermeasures and mitigation•10 minutes
Threat modeling•10 minutes
Exercise: Create a threat model for a simple web application•30 minutes
Exemplar: Create a threat model for a simple web application•10 minutes
Additional resources: Introduction to threat modeling•5 minutes
This module focuses on identifying modern cyber threats and applying effective mitigation strategies. You will explore threat vectors, ransomware, and vulnerabilities in infrastructure using frameworks like the MITRE ATT&CK Matrix. The module also covers IoT security risks and defense mechanisms, along with practical approaches to prevention, detection, and response. By the end, you will understand how to assess risks and implement mitigation strategies across different environments.
Knowledge check: IoT (Internet of Things) and common attacks•15 minutes
Module quiz: Advanced threats and mitigation•30 minutes
Security conscious modeling
Module 3•4 hours to complete
Module details
This module explores how to design secure systems using defense-in-depth strategies and secure architecture principles. You will learn to identify threat vectors, entry points, and appropriate mitigation approaches across network, data, and cloud environments. The module also covers Azure security practices, identity protection, and monitoring techniques. By the end, you will be able to design layered security strategies that protect systems from evolving threats.
What's included
13 videos9 readings4 assignments
Show info about module content
13 videos•Total 90 minutes
Threat landscape and vectors•7 minutes
Access brokers•7 minutes
Mitigation approaches•8 minutes
Defense in depth (DID)•7 minutes
Defending your cloud infrastructure•7 minutes
Azure Security: Building a network with DID•7 minutes
This module consolidates your learning through a comprehensive capstone project that applies threat modeling and mitigation strategies in a real-world scenario. You will design and implement a defense-in-depth security strategy, including identity, access, and policy configurations. The module also includes a final assessment to evaluate your understanding and readiness to apply cybersecurity concepts in professional contexts.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
What background knowledge is necessary?
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
What is the main benefit of a Professional Certificate?
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
How long does it take to complete the Professional Certificate?
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
What will I be able to do upon completing the Professional Certificate?
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
What does a cybersecurity analyst do?
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
What jobs can I get with cybersecurity skills?
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
Will I be able to complete this course online?
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
Do I need to take the courses in specific order?
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.