When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
This course engages you in the world of cybersecurity attack and defense, dealing with both sides and working with the tools associated with security testing within a cloud environment.
You’ll gain knowledge on the penetration testing strategies employed by the industry to assess the integrity of their network. You’ll also interpret the results of security scans and deal with mitigation strategies such as vulnerability management.
After completing this course, you’ll be able to:
• Explain the concept of system testing
• Create a penetration test plan
• Execute penetration testing on a cloud platform
Discover the essential concepts and practices for effective penetration testing, including its stages like reconnaissance, enumeration, and exploitation.
Knowledge check: Types of penetration tests•15 minutes
Module quiz: Penetration testing•30 minutes
1 discussion prompt•Total 10 minutes
What do you hope to learn?•10 minutes
Preventative tools
Module 2•7 hours to complete
Module details
Delve into crucial security tools and techniques for averting and identifying network threats. The material includes understanding intrusion detection and prevention systems (IDPS), firewall setup, virtual private networks (VPNs), and managing vulnerabilities.
What's included
18 videos19 readings6 assignments
Show info about module content
18 videos•Total 109 minutes
Introduction to Intrusion Detection and Prevention Systems (IDPS)•6 minutes
Unpacking internet packets•6 minutes
Azure Firewall Premium Intrusion Detection and Prevention System (IDPS)•6 minutes
Azure IDPS in action•4 minutes
IDPS use cases•6 minutes
Introduction to firewall design in Azure•6 minutes
Azure Firewall rule design and configuration•5 minutes
Network security group and Azure firewall integration•5 minutes
VPN gateway•5 minutes
How Azure VPN can help your business•7 minutes
Configure VPNs on Azure•7 minutes
Azure Point-to-Site VPN•6 minutes
IP addressing and subnets•7 minutes
Introduction to vulnerability management•5 minutes
Discover how to conduct penetration tests on the Azure platform and external servers. You'll learn about the concepts and best practices of penetration testing, setting up and configuring test environments, running and analyzing tests, and reporting and documenting results.
What's included
15 videos11 readings4 assignments
Show info about module content
15 videos•Total 93 minutes
Introduction to Command Line•8 minutes
Command Line in action•5 minutes
Introduction to Windows PowerShell•5 minutes
Windows PowerShell Script in action•8 minutes
Introduction to penetration testing on Azure•6 minutes
How does Azure penetration testing work?•8 minutes
Azure penetration test overview •6 minutes
Getting Azure ready•6 minutes
Penetration testing framework•6 minutes
Azure security settings•7 minutes
Running the penetration test and analyzing the result•6 minutes
Penetration testing and Azure Security Center•5 minutes
Introduction to Windows PowerShell Script•10 minutes
Command Line tools•10 minutes
Best practices for Command Line penetration testing•10 minutes
Additional resources: The Command Line•5 minutes
Azure penetration testing guidelines•10 minutes
Defender for Cloud's integrated Qualys vulnerability scanner•10 minutes
Additional resources: Setting up Azure for testing•5 minutes
Interpreting scan and test results•10 minutes
Penetration testing best practices•10 minutes
Additional resources: Running the test•5 minutes
4 assignments•Total 75 minutes
Knowledge check: The Command Line•15 minutes
Knowledge check: Setting up Azure for testing•15 minutes
Knowledge check: Running the test•15 minutes
Module quiz: Azure penetration testing•30 minutes
Final project and assessment: Cybersecurity Tools and Technologies
Module 4•4 hours to complete
Module details
Put your skills into practice by completing end-of-course project and reinforce your understanding of the key concepts you’ve learned. This week provides a summary of the course, reflects on the primary learning objectives and provides the opportunity for you to consolidate your learning in a hands-on activity.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
What background knowledge is necessary?
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
What is the main benefit of a Professional Certificate?
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
How long does it take to complete the Professional Certificate?
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
What will I be able to do upon completing the Professional Certificate?
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
What does a cybersecurity analyst do?
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
What jobs can I get with cybersecurity skills?
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
Will I be able to complete this course online?
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
Do I need to take the courses in specific order?
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.