- Duration: 10 weeks
1. Build an overall security strategy and architecture
Learn how to build an overall security strategy and architecture with zero trust in mind.
Click here to know more
2. Design a security operations strategy
Learn how to design a cybersecurity strategy for security operations (SecOps).
Click here to know more
3. Design an identity security strategy
Learn how to design a cybersecurity strategy for identity management.
Click here to know more
4. Evaluate a regulatory compliance strategy
Learn how to evaluate a cybersecurity strategy for regulatory compliance.
Click here to know more
5. Evaluate security posture and recommend technical strategies to manage risk
Learn how to evaluate an organization’s security posture and recommend technical strategies to manage risk.
Click here to know more
6. Understand architecture best practices and how they are changing with the Cloud
Learn best practices for cybersecurity architecture and how they have been affected by cloud computing.
Click here to know more
7. Design a strategy for securing server and client endpoints
Learn how to design a cybersecurity strategy to secure server and client endpoints.
Click here to know more
8. Design a strategy for securing PaaS, IaaS, and SaaS services
Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models.
Click here to know more
9. Specify security requirements for applications
Learn how to specify cybersecurity requirements for applications.
Click here to know more
10. Design a strategy for securing data
Learn how to design a cybersecurity strategy to secure data.
Click here to know more
11. Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks
You’ll learn how to use guidance in Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks to help an organization apply Zero Trust principles and secure their infrastructure.
Click here to know more
12. Recommend a secure methodology using the Cloud Adoption Framework (CAF)
You’ll learn how to use the Cloud Adoption Framework to recommend security best practices that help an organization move to the cloud while improving overall security posture.
Click here to know more
13. Recommend a ransomware strategy by using Microsoft Security Best Practices
You’ll learn how to execute the three important phases of ransomware protection: create a recovery plan, limit the scope of damage, make it hard to get in.
Click here to know more
Leave feedback about this
You must be logged in to post a comment.