When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Microsoft
There are 4 modules in this course
In this course, you’ll learn about the types of cloud security policies that protect against DDoS Attacks, Firewall Breaches, and Unauthorized Access. Explore tools like MS Defender for cloud, security information and event management (SICM) and security orchestration, automation, and response (SOAR).
You’ll gain an understanding of security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance. You’ll also learn how to protect your organization’s assets from various types of threats, including malware, phishing, and identity-based attacks. This course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
After completing this course, you’ll be able to:
• Explain cloud-based security concepts
• Discuss security information and event management (SIEM)
• Define 365 Defender capabilities
This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
This module introduces the core security features of Azure and how they protect cloud environments from common threats. You will explore built-in security measures, best practices for securing resources, and protection mechanisms against DDoS attacks, firewall breaches, and unauthorized access. The module also covers just-in-time access and encryption techniques, helping you understand how to safeguard cloud infrastructure effectively in real-world scenarios.
What's included
17 videos16 readings5 assignments
Show info about module content
17 videos•Total 80 minutes
Introduction to the course•4 minutes
Azure DDoS Protection overview•6 minutes
Azure DDoS Protection configuration•5 minutes
Azure DDoS Protection features and best practices•6 minutes
This module focuses on managing and monitoring security within Azure environments. You will learn key cloud security concepts, Azure security standards, and best practices for protecting resources. The module also introduces SIEM and SOAR capabilities using Microsoft Sentinel, enabling you to detect, analyze, and respond to threats. Additionally, you will explore identity, access management, and policy-driven security implementation.
What's included
15 videos12 readings6 assignments
Show info about module content
15 videos•Total 71 minutes
Overview of cloud security•5 minutes
Advanced cloud security•4 minutes
Azure security•6 minutes
Azure security best practices•4 minutes
Microsoft Defender interface•5 minutes
Azure Bastion•6 minutes
Bastion and virtual machines•4 minutes
Introduction to Azure policies•6 minutes
Custom policy definition•4 minutes
Azure Blueprints•3 minutes
SIEM•4 minutes
Microsoft Sentinel•4 minutes
Microsoft Sentinel data connectors•6 minutes
Introducing SOAR•5 minutes
Module summary: Security management in Azure•7 minutes
12 readings•Total 120 minutes
Azure security in depth•10 minutes
Additional resources: Introduction to cloud security•5 minutes
Exercise: Shield virtual machines using Bastion•30 minutes
Exemplar: Shield virtual machines using Bastion•10 minutes
Knowledge check: Azure Standards and policies•15 minutes
Knowledge check: Introduction to SIEM and SOAR•15 minutes
Module quiz: Security management in Azure•50 minutes
Microsoft 365 Defender threat protection
Module 3•5 hours to complete
Module details
This module explores advanced threat protection using Microsoft 365 Defender services. You will learn how to protect organizational assets from threats such as malware, phishing, and identity-based attacks. The module covers defender services, endpoint and cloud app security, and identity protection. You will also understand best practices for deploying and managing these services to strengthen overall security posture.
What's included
17 videos11 readings5 assignments
Show info about module content
17 videos•Total 94 minutes
Introduction to Defender•7 minutes
Microsoft 365 Defender portal•4 minutes
Microsoft 365 Defender incidents and alerts•6 minutes
Managing users•5 minutes
Introduction to endpoint security•7 minutes
Endpoint modernization•6 minutes
Deployment methods for WaaS and Microsoft 365 Apps•6 minutes
Defender portal for endpoint capabilities and services•5 minutes
Threat technologies•6 minutes
Endpoint encryption•5 minutes
Introduction to identity defense•7 minutes
Microsoft Purview•6 minutes
Azure Active Directory Identity Protection•6 minutes
Microsoft Defender for Identity•4 minutes
Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Preparation•5 minutes
Identity theft•3 minutes
Module Summary: Microsoft 365 Defender threat protection•6 minutes
11 readings•Total 115 minutes
Working with Microsoft 365 Defender portal•10 minutes
Microsoft Defender use-case: Office 365•10 minutes
Exercise: Implement Microsoft Sentinel with Microsoft Defender data connectors•30 minutes
Exemplar: Implement Microsoft Sentinel with Microsoft Defender data connectors•10 minutes
Additional resources: Defender services•5 minutes
Defender services in depth•10 minutes
Next gen antivirus and endpoint response•10 minutes
Additional resources: Endpoints and cloud apps security•5 minutes
Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Deployment•10 minutes
Identity Protection in Microsoft 365•10 minutes
Additional resources: Identity defense•5 minutes
5 assignments•Total 105 minutes
Self-Review: Implement Microsoft Sentinel with Microsoft Defender data connectors•10 minutes
Knowledge check: Defender services•15 minutes
Knowledge check: Endpoints and cloud apps security•15 minutes
Knowledge check: Identity defense•15 minutes
Module quiz: Microsoft 365 Defender threat protection•50 minutes
Graded assessment and course wrap up
Module 4•5 hours to complete
Module details
This module consolidates your learning by applying security concepts in a scenario-based project. You will demonstrate your understanding of Azure security, threat detection, and protection strategies through practical tasks and a final assessment. The module also provides an opportunity to reflect on your learning and plan your next steps in cybersecurity.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
What background knowledge is necessary?
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
What is the main benefit of a Professional Certificate?
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
How long does it take to complete the Professional Certificate?
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
What will I be able to do upon completing the Professional Certificate?
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
What does a cybersecurity analyst do?
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
What jobs can I get with cybersecurity skills?
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
Will I be able to complete this course online?
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
Do I need to take the courses in specific order?
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.