Microsoft Cybersecurity Analyst Professional Certificate

By theetay.com Categories: Coursera
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Microsoft Cybersecurity Analyst Professional Certificate, Organizations rely on cybersecurity experts to protect themselves from threats, but nearly 60% report security talent shortages. Prepare for a new career in this high-demand field with professional training from Microsoft — an industry-recognized leader in cybersecurity. The role of a cybersecurity analyst includes monitoring networks for vulnerabilities or potential threats, mitigating attacks on the network infrastructures, and implementing strategies for data protection. With 95% of fortune 500 companies using Azure, it’s critical for cybersecurity professionals to learn to protect data within an Azure environment.

Through a mix of videos, assessments, and hands-on activities, you’ll learn cybersecurity concepts and how they apply to a business environment, discuss threat mitigation strategies from an enterprise perspective, apply effective cybersecurity policy measures within an Azure environment, & practice on tools like MS defender, Azure Active Directory & more. When you graduate, you’ll have tangible examples to talk about in job interviews and you’ll also be prepared to take the Microsoft SC-900 Certification Exam. This program has been uniquely mapped to key job skills required in cybersecurity analyst roles. In each course, you’ll be able to consolidate what you have learned by completing a capstone project that simulates real-world cybersecurity scenarios. You’ll also complete a final capstone project where you’ll create your own cybersecurity proposal for the creation and protection of a business network and infrastructure. The projects will include practicing on:

Show More

What Will You Learn?

  • Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.
  • Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.
  • Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.
  • Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam.

Course Content

01. Introduction to Computers and Operating Systems and Security

  • 003 01_introduction-to-the-program-microsoft-cybersecurity-analyst.mp4
    00:00
  • 006 02_introduction-to-the-course-introduction-to-computers-and-operating-systems-and.mp4
    00:00
  • 007 03_skills-measured-exam-sc-900_instructions.html
    00:00
  • 008 04_course-syllabus_instructions.html
    00:00
  • 009 05_how-to-be-successful-in-this-course_instructions.html
    00:00
  • 012 06_a-day-in-the-life.mp4
    00:00
  • 013 07_how-to-open-an-image-in-a-new-tab_instructions.html
    00:00
  • 014 08_how-to-locate-your-downloaded-files_instructions.html
    00:00
  • 015 09_additional-resources-microsoft-cybersecurity-analyst_instructions.html
    00:00
  • 018 01_threat-landscape-overview.mp4
    00:00
  • 019 02_threat-stats_instructions.html
    00:00
  • 022 03_linked-threats.mp4
    00:00
  • 023 04_exercise-explaining-the-threat-landscape_instructions.html
    00:00
  • 024 05_self-review-explaining-the-threat-landscape_quiz.html
    00:00
  • 025 06_knowledge-check-elements-of-the-threat-landscape_quiz.html
    00:00
  • 026 07_additional-resources-threat-landscape_instructions.html
    00:00
  • 029 01_what-is-a-computer-and-what-is-inside-it.mp4
    00:00
  • 030 02_hardware-versus-software_instructions.html
    00:00
  • 033 03_how-does-a-computer-operate.mp4
    00:00
  • 034 04_knowledge-check-introduction-to-computing-devices_quiz.html
    00:00
  • 035 05_additional-resources-introduction-to-computing-devices_instructions.html
    00:00
  • 038 01_what-is-an-operating-system-and-what-does-it-do.mp4
    00:00
  • 039 02_types-of-operating-systems_instructions.html
    00:00
  • 042 03_popular-operating-systems.mp4
    00:00
  • 043 04_proprietary-and-open-source-software_instructions.html
    00:00
  • 044 05_knowledge-check-operating-systems_quiz.html
    00:00
  • 047 06_module-summary-introduction-to-computers-and-operating-systems.mp4
    00:00
  • 048 07_additional-resources-operating-systems_instructions.html
    00:00
  • 051 01_infrastructure-and-servers.mp4
    00:00
  • 052 02_types-of-servers-storage-and-backups_instructions.html
    00:00
  • 055 03_risk-mitigation-backup-frequency.mp4
    00:00
  • 056 04_knowledge-check-servers-storage-and-backup_quiz.html
    00:00
  • 057 05_additional-resources-servers-storage-and-backup_instructions.html
    00:00
  • 060 01_what-are-computing-environments.mp4
    00:00
  • 061 02_traditional-versus-cloud-computing-environments_instructions.html
    00:00
  • 064 03_security-in-computing-environments.mp4
    00:00
  • 065 04_security-in-computing-environments-in-depth_instructions.html
    00:00
  • 066 05_knowledge-check-computing-environments_quiz.html
    00:00
  • 067 06_additional-resources-computing-environments_instructions.html
    00:00
  • 070 01_what-is-maintenance-and-patching.mp4
    00:00
  • 071 02_types-of-maintenance_instructions.html
    00:00
  • 074 03_patch-management-pros-cons-and-challenges.mp4
    00:00
  • 075 04_vulnerability-management_instructions.html
    00:00
  • 076 05_knowledge-check-maintenance-and-patching_quiz.html
    00:00
  • 079 06_module-summary-enterprise-systems-and-security.mp4
    00:00
  • 080 07_additional-resources-maintenance-and-patching_instructions.html
    00:00
  • 083 01_what-is-business-software.mp4
    00:00
  • 084 02_common-business-software_instructions.html
    00:00
  • 087 03_a-day-in-the-life-of-a-business-computer.mp4
    00:00
  • 088 04_exercise-business-software_instructions.html
    00:00
  • 089 05_self-review-business-software_quiz.html
    00:00
  • 090 06_computers-under-pressure_instructions.html
    00:00
  • 091 07_knowledge-check-business-software_quiz.html
    00:00
  • 092 08_additional-resources-business-software_instructions.html
    00:00
  • 095 01_how-email-changed-the-world.mp4
    00:00
  • 098 02_email-app-functions.mp4
    00:00
  • 099 03_email-security-functions_instructions.html
    00:00
  • 100 04_knowledge-check-email-apps_quiz.html
    00:00
  • 101 05_additional-resources-email-apps_instructions.html
    00:00
  • 104 01_growing-your-knowledge-on-storage.mp4
    00:00
  • 105 02_data-warehousing-and-data-lakes_instructions.html
    00:00
  • 108 03_processing-data.mp4
    00:00
  • 111 04_machine-learning-and-data.mp4
    00:00
  • 112 05_machine-learning-in-action_instructions.html
    00:00
  • 115 06_artificial-intelligence-and-machine-learning.mp4
    00:00
  • 116 07_knowledge-check-storage-solutions_quiz.html
    00:00
  • 119 08_module-summary-business-systems-applications.mp4
    00:00
  • 120 09_additional-resources-storage-solutions_instructions.html
    00:00
  • 123 01_course-recap-introduction-to-computers-and-operating-systems-and-security.mp4
    00:00
  • 124 02_about-the-final-course-assessment_instructions.html
    00:00
  • 127 01_congratulations.mp4
    00:00
  • 128 02_next-steps_instructions.html
    00:00

02. Introduction to Networking and Cloud Computing

03. Cybersecurity Threat Vectors and Mitigation

04. Cybersecurity Identity and Access Solutions using Azure AD

05. Cybersecurity Solutions and Microsoft Defender

06. Cybersecurity Tools and Technologies

07. Cybersecurity Management and Compliance

08. Advanced Cybersecurity Concepts and Capstone Project

09. Microsoft SC-900 Exam Preparation and Practice

Earn a certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?

×