When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
In this course, you’ll learn about the types of cloud security policies that protect against DDoS Attacks, Firewall Breaches, and Unauthorized Access. Explore tools like MS Defender for cloud, security information and event management (SICM) and security orchestration, automation, and response (SOAR).
You’ll gain an understanding of security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance. You’ll also learn how to protect your organization’s assets from various types of threats, including malware, phishing, and identity-based attacks.
This module provides a comprehensive overview of Azure networking and security. It covers essential topics such as Azure's built-in security measures, recommended practices for securing Azure resources, and protection against Distributed Denial of Service (DDoS) attacks, firewall breaches, and unauthorized access. You will gain a deep understanding of how to secure Azure resources against malicious threats and gain insight into just-in-time access and encryption.
Knowledge check: Just-in-time access and encryption•15 minutes
Self-review: Secure ports with JIT•10 minutes
1 discussion prompt•Total 10 minutes
What do you hope to learn?•10 minutes
Security management in Azure
Module 2•5 hours to complete
Module details
This module provides an overview of cloud security and security management in Azure. It covers key concepts such as Azure security standards, use of the Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities of Microsoft Sentinel. On completion of this module, you will have a thorough understanding of the security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance.
What's included
15 videos12 readings6 assignments
Show info about module content
15 videos•Total 71 minutes
Overview of cloud security•5 minutes
Advanced cloud security•4 minutes
Azure security•6 minutes
Azure security best practices•4 minutes
Microsoft Defender interface•5 minutes
Azure Bastion•6 minutes
Bastion and virtual machines•4 minutes
Introduction to Azure policies•6 minutes
Custom policy definition•4 minutes
Azure Blueprints•3 minutes
SIEM•4 minutes
Microsoft Sentinel•4 minutes
Microsoft Sentinel data connectors•6 minutes
Introducing SOAR•5 minutes
Module summary: Security management in Azure•7 minutes
12 readings•Total 120 minutes
Azure security in depth•10 minutes
Additional resources: Introduction to cloud security•5 minutes
Exercise: Shield virtual machines using Bastion•30 minutes
Exemplar: Shield virtual machines using Bastion•10 minutes
Knowledge check: Azure Standards and policies•15 minutes
Knowledge check: Introduction to SIEM and SOAR•15 minutes
Microsoft 365 Defender threat protection
Module 3•5 hours to complete
Module details
This module covers the different threat protection services available in Microsoft 365, including Azure Defender, Azure Advanced Threat Protection, and Azure Information Protection. The module is designed to help you understand how to protect an organization's assets from various types of threats, including malware, phishing, and identity-based attacks. The module covers key concepts such as defender services, endpoint and cloud app protection, and identity defence. It also provides best practices for implementing these threat protection services in an organization.
What's included
17 videos11 readings5 assignments
Show info about module content
17 videos•Total 94 minutes
Introduction to Defender•7 minutes
Microsoft 365 Defender portal•4 minutes
Microsoft 365 Defender incidents and alerts•6 minutes
Managing users•5 minutes
Introduction to endpoint security•7 minutes
Endpoint modernization•6 minutes
Deployment methods for WaaS and Microsoft 365 Apps•6 minutes
Defender portal for endpoint capabilities and services•5 minutes
Threat technologies•6 minutes
Endpoint encryption•5 minutes
Introduction to identity defense•7 minutes
Microsoft Purview•6 minutes
Azure Active Directory Identity Protection•6 minutes
Microsoft Defender for Identity•4 minutes
Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Preparation•5 minutes
Identity theft•3 minutes
Module Summary: Microsoft 365 Defender threat protection•6 minutes
11 readings•Total 115 minutes
Working with Microsoft 365 Defender portal•10 minutes
Microsoft Defender use-case: Office 365•10 minutes
Exercise: Implement Microsoft Sentinel with Microsoft Defender data connectors•30 minutes
Exemplar: Implement Microsoft Sentinel with Microsoft Defender data connectors•10 minutes
Additional resources: Defender services•5 minutes
Defender services in depth•10 minutes
Next gen antivirus and endpoint response•10 minutes
Additional resources: Endpoints and cloud apps security•5 minutes
Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Deployment•10 minutes
Identity Protection in Microsoft 365•10 minutes
Additional resources: Identity defense•5 minutes
5 assignments•Total 105 minutes
Module quiz: Microsoft 365 Defender threat protection•50 minutes
Self-Review: Implement Microsoft Sentinel with Microsoft Defender data connectors•10 minutes
Knowledge check: Defender services•15 minutes
Knowledge check: Endpoints and cloud apps security•15 minutes
Knowledge check: Identity defense•15 minutes
Graded assessment and course wrap up
Module 4•5 hours to complete
Module details
In this module, you will be assessed on the key skills covered in the course. You will gain a real-life example of demonstrating protection strategies by completing a scenario-based project. You'll also complete a graded course quiz that will test your knowledge of all the topics you covered in this course. Lastly, you will get the opportunity to reflect on your learning and explore the next steps in your cybersecurity journey.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
What background knowledge is necessary?
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
What is the main benefit of a Professional Certificate?
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
How long does it take to complete the Professional Certificate?
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
What will I be able to do upon completing the Professional Certificate?
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
What does a cybersecurity analyst do?
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
What jobs can I get with cybersecurity skills?
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
Will I be able to complete this course online?
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
Do I need to take the courses in specific order?
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.