Microsoft Cybersecurity Analyst Professional Certificate
About Course
Microsoft Cybersecurity Analyst Professional Certificate, Organizations rely on cybersecurity experts to protect themselves from threats, but nearly 60% report security talent shortages. Prepare for a new career in this high-demand field with professional training from Microsoft — an industry-recognized leader in cybersecurity. The role of a cybersecurity analyst includes monitoring networks for vulnerabilities or potential threats, mitigating attacks on the network infrastructures, and implementing strategies for data protection. With 95% of fortune 500 companies using Azure, it’s critical for cybersecurity professionals to learn to protect data within an Azure environment.
Through a mix of videos, assessments, and hands-on activities, you’ll learn cybersecurity concepts and how they apply to a business environment, discuss threat mitigation strategies from an enterprise perspective, apply effective cybersecurity policy measures within an Azure environment, & practice on tools like MS defender, Azure Active Directory & more. When you graduate, you’ll have tangible examples to talk about in job interviews and you’ll also be prepared to take the Microsoft SC-900 Certification Exam. This program has been uniquely mapped to key job skills required in cybersecurity analyst roles. In each course, you’ll be able to consolidate what you have learned by completing a capstone project that simulates real-world cybersecurity scenarios. You’ll also complete a final capstone project where you’ll create your own cybersecurity proposal for the creation and protection of a business network and infrastructure. The projects will include practicing on:
What Will You Learn?
- Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.
- Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.
- Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.
- Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam.
Course Content
01. Introduction to Computers and Operating Systems and Security
-
003 01_introduction-to-the-program-microsoft-cybersecurity-analyst.mp4
00:00 -
006 02_introduction-to-the-course-introduction-to-computers-and-operating-systems-and.mp4
00:00 -
007 03_skills-measured-exam-sc-900_instructions.html
00:00 -
008 04_course-syllabus_instructions.html
00:00 -
009 05_how-to-be-successful-in-this-course_instructions.html
00:00 -
012 06_a-day-in-the-life.mp4
00:00 -
013 07_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
014 08_how-to-locate-your-downloaded-files_instructions.html
00:00 -
015 09_additional-resources-microsoft-cybersecurity-analyst_instructions.html
00:00 -
018 01_threat-landscape-overview.mp4
00:00 -
019 02_threat-stats_instructions.html
00:00 -
022 03_linked-threats.mp4
00:00 -
023 04_exercise-explaining-the-threat-landscape_instructions.html
00:00 -
024 05_self-review-explaining-the-threat-landscape_quiz.html
00:00 -
025 06_knowledge-check-elements-of-the-threat-landscape_quiz.html
00:00 -
026 07_additional-resources-threat-landscape_instructions.html
00:00 -
029 01_what-is-a-computer-and-what-is-inside-it.mp4
00:00 -
030 02_hardware-versus-software_instructions.html
00:00 -
033 03_how-does-a-computer-operate.mp4
00:00 -
034 04_knowledge-check-introduction-to-computing-devices_quiz.html
00:00 -
035 05_additional-resources-introduction-to-computing-devices_instructions.html
00:00 -
038 01_what-is-an-operating-system-and-what-does-it-do.mp4
00:00 -
039 02_types-of-operating-systems_instructions.html
00:00 -
042 03_popular-operating-systems.mp4
00:00 -
043 04_proprietary-and-open-source-software_instructions.html
00:00 -
044 05_knowledge-check-operating-systems_quiz.html
00:00 -
047 06_module-summary-introduction-to-computers-and-operating-systems.mp4
00:00 -
048 07_additional-resources-operating-systems_instructions.html
00:00 -
051 01_infrastructure-and-servers.mp4
00:00 -
052 02_types-of-servers-storage-and-backups_instructions.html
00:00 -
055 03_risk-mitigation-backup-frequency.mp4
00:00 -
056 04_knowledge-check-servers-storage-and-backup_quiz.html
00:00 -
057 05_additional-resources-servers-storage-and-backup_instructions.html
00:00 -
060 01_what-are-computing-environments.mp4
00:00 -
061 02_traditional-versus-cloud-computing-environments_instructions.html
00:00 -
064 03_security-in-computing-environments.mp4
00:00 -
065 04_security-in-computing-environments-in-depth_instructions.html
00:00 -
066 05_knowledge-check-computing-environments_quiz.html
00:00 -
067 06_additional-resources-computing-environments_instructions.html
00:00 -
070 01_what-is-maintenance-and-patching.mp4
00:00 -
071 02_types-of-maintenance_instructions.html
00:00 -
074 03_patch-management-pros-cons-and-challenges.mp4
00:00 -
075 04_vulnerability-management_instructions.html
00:00 -
076 05_knowledge-check-maintenance-and-patching_quiz.html
00:00 -
079 06_module-summary-enterprise-systems-and-security.mp4
00:00 -
080 07_additional-resources-maintenance-and-patching_instructions.html
00:00 -
083 01_what-is-business-software.mp4
00:00 -
084 02_common-business-software_instructions.html
00:00 -
087 03_a-day-in-the-life-of-a-business-computer.mp4
00:00 -
088 04_exercise-business-software_instructions.html
00:00 -
089 05_self-review-business-software_quiz.html
00:00 -
090 06_computers-under-pressure_instructions.html
00:00 -
091 07_knowledge-check-business-software_quiz.html
00:00 -
092 08_additional-resources-business-software_instructions.html
00:00 -
095 01_how-email-changed-the-world.mp4
00:00 -
098 02_email-app-functions.mp4
00:00 -
099 03_email-security-functions_instructions.html
00:00 -
100 04_knowledge-check-email-apps_quiz.html
00:00 -
101 05_additional-resources-email-apps_instructions.html
00:00 -
104 01_growing-your-knowledge-on-storage.mp4
00:00 -
105 02_data-warehousing-and-data-lakes_instructions.html
00:00 -
108 03_processing-data.mp4
00:00 -
111 04_machine-learning-and-data.mp4
00:00 -
112 05_machine-learning-in-action_instructions.html
00:00 -
115 06_artificial-intelligence-and-machine-learning.mp4
00:00 -
116 07_knowledge-check-storage-solutions_quiz.html
00:00 -
119 08_module-summary-business-systems-applications.mp4
00:00 -
120 09_additional-resources-storage-solutions_instructions.html
00:00 -
123 01_course-recap-introduction-to-computers-and-operating-systems-and-security.mp4
00:00 -
124 02_about-the-final-course-assessment_instructions.html
00:00 -
127 01_congratulations.mp4
00:00 -
128 02_next-steps_instructions.html
00:00
02. Introduction to Networking and Cloud Computing
-
003 01_introduction-to-the-course-introduction-to-networking-and-cloud-computing.mp4
00:00 -
004 02_course-syllabus_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
007 05_additional-resources-computer-networking_instructions.html
00:00 -
011 01_network-types.mp4
00:00 -
012 02_area-networks_instructions.html
00:00 -
015 03_topologies.mp4
00:00 -
016 04_physical-and-logical-topology_instructions.html
00:00 -
017 05_data-transmission_instructions.html
00:00 -
018 06_exercise-network-construction_instructions.html
00:00 -
019 07_self-review-network-construction_quiz.html
00:00 -
020 08_knowledge-check-understanding-types-and-topologies_quiz.html
00:00 -
021 09_additional-resources-understanding-types-and-topologies_instructions.html
00:00 -
026 01_what-is-ip-and-whats-an-ip-address.mp4
00:00 -
027 02_whats-the-difference-between-ipv4-and-ipv6_instructions.html
00:00 -
028 03_exercise-find-your-ip_instructions.html
00:00 -
029 04_self-review-find-your-ip_quiz.html
00:00 -
032 05_using-ip-addresses-on-a-network.mp4
00:00 -
033 06_how-does-a-device-get-its-ip-address_instructions.html
00:00 -
034 07_knowledge-check-ip-addressing_quiz.html
00:00 -
037 08_module-summary-computer-networking.mp4
00:00 -
039 09_additional-resources-ip-addressing_instructions.html
00:00 -
042 01_hybrid-networking.mp4
00:00 -
043 02_the-internet_instructions.html
00:00 -
046 03_introduction-to-cloud-computing.mp4
00:00 -
047 04_infrastructure_instructions.html
00:00 -
048 05_internet-of-things_instructions.html
00:00 -
049 06_knowledge-check-infrastructure_quiz.html
00:00 -
050 07_additional-resources-infrastructure_instructions.html
00:00 -
053 01_what-is-the-osi-model.mp4
00:00 -
054 02_layered-architecture_instructions.html
00:00 -
057 03_tcp-ip.mp4
00:00 -
058 04_tcp-ip-versus-osi_instructions.html
00:00 -
059 05_exercise-expanding-the-network-layout_instructions.html
00:00 -
060 06_self-review-expanding-the-network-layout_quiz.html
00:00 -
061 07_knowledge-check-network-communication-models_quiz.html
00:00 -
062 08_additional-resources-network-communication-models_instructions.html
00:00 -
067 01_what-is-a-port.mp4
00:00 -
068 02_protocols_instructions.html
00:00 -
071 03_ports-and-protocols.mp4
00:00 -
072 04_reserved-and-commonly-allocated-ports_instructions.html
00:00 -
074 05_exercise-ports-in-use_instructions.html
00:00 -
075 06_self-review-ports-in-use_quiz.html
00:00 -
076 07_knowledge-check-protocols-and-ports_quiz.html
00:00 -
077 08_additional-resources-protocols-and-ports_instructions.html
00:00 -
081 01_dns-and-networking.mp4
00:00 -
082 02_dns-attacks_instructions.html
00:00 -
083 03_introduction-to-network-traffic-monitoring_instructions.html
00:00 -
086 04_health-and-metric-analysis.mp4
00:00 -
087 05_network-logs_instructions.html
00:00 -
088 06_knowledge-check-network-traffic-monitoring_quiz.html
00:00 -
091 07_module-summary-network-devices-and-protocols.mp4
00:00 -
092 08_additional-resources-network-traffic-monitoring_instructions.html
00:00 -
095 01_client-server-network.mp4
00:00 -
096 02_client-server-models_instructions.html
00:00 -
097 03_different-types-of-servers_instructions.html
00:00 -
100 04_remote-access.mp4
00:00 -
101 05_dynamic-host-configuration-protocol-dhcp_instructions.html
00:00 -
102 06_knowledge-check-network-client-and-server_quiz.html
00:00 -
103 07_additional-resources-network-client-and-server_instructions.html
00:00 -
106 01_introduction-to-authentication.mp4
00:00 -
107 02_authorization_instructions.html
00:00 -
110 03_types-of-authorization.mp4
00:00 -
111 04_internet-extranet-and-intranet_instructions.html
00:00 -
112 05_authorization-protocols-on-vpns_instructions.html
00:00 -
115 06_authentication-versus-authorization.mp4
00:00 -
116 07_knowledge-check-authentication-and-authorization_quiz.html
00:00 -
117 08_additional-resources-authentication-and-authorization_instructions.html
00:00 -
120 01_common-network-attacks.mp4
00:00 -
121 02_network-attacks_instructions.html
00:00 -
124 03_network-security.mp4
00:00 -
125 04_network-security-best-practices_instructions.html
00:00 -
128 05_firewalls.mp4
00:00 -
129 06_firewall-types_instructions.html
00:00 -
130 07_firewall-rules_instructions.html
00:00 -
133 08_security-tools.mp4
00:00 -
134 09_firewall-threats-and-network-analysis_instructions.html
00:00 -
135 10_knowledge-check-firewalls-and-security-tools_quiz.html
00:00 -
138 11_module-summary-network-security.mp4
00:00 -
139 12_additional-resources-firewalls-and-security-tools_instructions.html
00:00 -
143 01_what-is-azure.mp4
00:00 -
144 02_what-is-cloud-computing_instructions.html
00:00 -
145 03_what-services-are-available-with-azure_instructions.html
00:00 -
148 04_business-enterprise-use-case.mp4
00:00 -
149 05_azure-technologies_instructions.html
00:00 -
150 06_exercise-cloud-transformation_instructions.html
00:00 -
151 07_self-review-cloud-transformation_quiz.html
00:00 -
152 08_knowledge-check-introduction-to-azure_quiz.html
00:00 -
153 09_additional-resources-introduction-to-azure_instructions.html
00:00 -
156 01_what-is-virtualization.mp4
00:00 -
157 02_what-are-virtual-environments-machines_instructions.html
00:00 -
160 03_virtual-world.mp4
00:00 -
163 04_azure-virtual-desktop.mp4
00:00 -
164 05_virtual-machines-and-containers_instructions.html
00:00 -
165 06_get-started-with-figma_instructions.html
00:00 -
166 07_exercise-virtual-network-simulation_instructions.html
00:00 -
168 08_self-review-virtual-network-simulation_quiz.html
00:00 -
169 09_knowledge-check-virtual-environments_quiz.html
00:00 -
170 10_additional-resources-virtual-environments_instructions.html
00:00 -
173 01_cloud-capabilities.mp4
00:00 -
174 02_cloud-capabilities-in-action_instructions.html
00:00 -
177 03_machine-learning-services.mp4
00:00 -
178 04_types-of-ai_instructions.html
00:00 -
181 05_ai-business-uses.mp4
00:00 -
182 06_cloud-and-ai_instructions.html
00:00 -
183 07_knowledge-check-cloud-services_quiz.html
00:00 -
184 08_additional-resources-cloud-services_instructions.html
00:00 -
187 01_business-benefits-of-xaas.mp4
00:00 -
188 02_a-general-overview-of-xaas_instructions.html
00:00 -
191 03_what-is-software-as-a-service.mp4
00:00 -
192 04_saas-in-action_instructions.html
00:00 -
193 05_saas-and-xaas-as-a-comparison_instructions.html
00:00 -
194 06_iaas-and-paas-as-a-comparison_instructions.html
00:00 -
195 07_knowledge-check-x-as-a-service_quiz.html
00:00 -
198 08_module-summary-cloud-computing-and-networking.mp4
00:00 -
199 09_additional-resources-x-as-a-service_instructions.html
00:00 -
202 01_course-recap-introduction-to-networking-and-cloud-computing.mp4
00:00 -
203 02_about-the-final-course-project-and-assessment_instructions.html
00:00 -
204 03_final-course-project-digital-transformation_instructions.html
00:00 -
207 01_congratulations.mp4
00:00 -
208 02_next-steps_instructions.html
00:00
03. Cybersecurity Threat Vectors and Mitigation
-
003 01_introduction-to-the-course-cybersecurity-threat-vectors-and-mitigation.mp4
00:00 -
004 02_course-syllabus_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
007 05_additional-resources-threats-and-attacks_instructions.html
00:00 -
010 01_introduction-to-cyber-attacks.mp4
00:00 -
011 02_wannacry-ransomware-attack_instructions.html
00:00 -
012 03_stuxnet-worm_instructions.html
00:00 -
015 04_trojans-and-viruses.mp4
00:00 -
016 05_data-breaches_instructions.html
00:00 -
017 06_knowledge-check-epic-attacks_quiz.html
00:00 -
018 07_additional-resources-epic-attacks_instructions.html
00:00 -
021 01_introduction-to-threat-vectors.mp4
00:00 -
024 02_malware-and-ransomware.mp4
00:00 -
025 03_evading-detection_instructions.html
00:00 -
026 04_malware-and-ransomware-in-action_instructions.html
00:00 -
029 05_phishing-and-social-engineering.mp4
00:00 -
030 06_types-of-phishing_instructions.html
00:00 -
033 07_threats.mp4
00:00 -
034 08_other-threat-vectors_instructions.html
00:00 -
035 09_knowledge-check-threat-vectors_quiz.html
00:00 -
036 10_additional-resources-threat-vectors_instructions.html
00:00 -
039 01_personal-mitigation-strategies.mp4
00:00 -
040 02_biometrics_instructions.html
00:00 -
043 03_security-software.mp4
00:00 -
044 04_firewalls-and-antivirus_instructions.html
00:00 -
045 05_protecting-data_instructions.html
00:00 -
046 06_knowledge-check-mitigation-strategies_quiz.html
00:00 -
049 07_module-summary-threats-and-attacks.mp4
00:00 -
050 08_additional-resources-mitigation-strategies_instructions.html
00:00 -
053 01_introduction-to-encryption.mp4
00:00 -
054 02_evolution-of-encryption_instructions.html
00:00 -
057 03_modern-encryptions.mp4
00:00 -
058 04_encryption-tools_instructions.html
00:00 -
059 05_exercise-initial-protective-measures_instructions.html
00:00 -
060 06_self-review-initial-protective-measures_quiz.html
00:00 -
061 07_knowledge-check-encryption_quiz.html
00:00 -
062 08_additional-resources-encryption_instructions.html
00:00 -
065 01_private-key-and-symmetric-encryption.mp4
00:00 -
066 02_the-formation-of-symmetric-standards_instructions.html
00:00 -
069 03_public-key-and-asymmetric-encryption.mp4
00:00 -
070 04_the-formation-of-digital-signatures_instructions.html
00:00 -
073 05_hashing.mp4
00:00 -
074 06_list-of-hashing-and-encryption-techniques-and-algorithms_instructions.html
00:00 -
077 07_the-power-of-encryption.mp4
00:00 -
078 08_knowledge-check-public-private-and-key-hashing_quiz.html
00:00 -
079 09_additional-resources-public-private-key-and-hashing_instructions.html
00:00 -
082 01_digital-signing.mp4
00:00 -
085 02_certificates-and-certificate-authorities.mp4
00:00 -
086 03_secure-certificates_instructions.html
00:00 -
089 04_signed-urls.mp4
00:00 -
090 05_secure-communication-using-ssl-and-https_instructions.html
00:00 -
091 06_knowledge-check-digital-signing-and-certificates_quiz.html
00:00 -
092 07_additional-resources-digital-signing-and-certificates_instructions.html
00:00 -
095 01_centralized-authentication-and-authorization-systems.mp4
00:00 -
096 02_centralized-authentication-and-authorization-systems-examples_instructions.html
00:00 -
099 03_authentication-and-authorization-methods.mp4
00:00 -
100 04_knowledge-check-authentication-and-authorization_quiz.html
00:00 -
103 05_module-summary-cryptography.mp4
00:00 -
104 06_additional-resources-authentication-and-authorization_instructions.html
00:00 -
107 01_data-transmission-threats.mp4
00:00 -
108 02_data-transmission-intercept-tools_instructions.html
00:00 -
111 03_virtual-private-network.mp4
00:00 -
114 04_advanced-persistent-threats-apt.mp4
00:00 -
115 05_apts-in-action_instructions.html
00:00 -
116 06_iot-threats_instructions.html
00:00 -
117 07_knowledge-check-data-transmission_quiz.html
00:00 -
118 08_additional-resources-data-transmission_instructions.html
00:00 -
121 01_firewall-optimization.mp4
00:00 -
122 02_firewall-configuration_instructions.html
00:00 -
125 03_network-segmentation.mp4
00:00 -
128 04_intrusion-detection-and-prevention-system.mp4
00:00 -
129 05_endpoint-security_instructions.html
00:00 -
130 06_exercise-walling-off_instructions.html
00:00 -
131 07_self-review-walling-off_quiz.html
00:00 -
132 08_knowledge-check-security-controls_quiz.html
00:00 -
133 09_additional-resources-security-controls_instructions.html
00:00 -
136 01_introduction-to-application-updates.mp4
00:00 -
137 02_keeping-applications-and-operating-systems-up-to-date_instructions.html
00:00 -
140 03_bring-your-own-device-risks.mp4
00:00 -
141 04_knowledge-check-application-updates_quiz.html
00:00 -
144 05_module-summary-network-and-device-based-threats.mp4
00:00 -
145 06_additional-resources-application-updates_instructions.html
00:00 -
148 01_overview-of-security-compliance.mp4
00:00 -
149 02_industry-standards-and-compliance-frameworks_instructions.html
00:00 -
152 03_risk-management-and-compliance.mp4
00:00 -
153 04_general-data-protection-regulation-gdpr_instructions.html
00:00 -
156 05_browser-cookies-and-gdpr.mp4
00:00 -
157 06_knowledge-check-security-and-compliance-concepts_quiz.html
00:00 -
158 07_additional-resources-security-and-compliance-concepts_instructions.html
00:00 -
161 01_identity-management.mp4
00:00 -
162 02_identity-management-in-action_instructions.html
00:00 -
165 03_single-sign-on-sso.mp4
00:00 -
168 04_active-directory-and-group-policy.mp4
00:00 -
169 05_group-policies_instructions.html
00:00 -
170 06_managing-identities-and-access-with-azure-active-directory_instructions.html
00:00 -
171 07_knowledge-check-id-and-active-directory_quiz.html
00:00 -
172 08_additional-resources-id-and-active-directory_instructions.html
00:00 -
175 01_defense-in-depth.mp4
00:00 -
176 02_defense-in-depth-in-action_instructions.html
00:00 -
177 03_cloud-security-and-defense-in-depth_instructions.html
00:00 -
180 04_zero-trust-model.mp4
00:00 -
181 05_security-operations-and-monitoring_instructions.html
00:00 -
182 06_knowledge-check-defense-models_quiz.html
00:00 -
185 07_module-summary-security-compliance-and-identity.mp4
00:00 -
186 08_additional-resources-defense-models_instructions.html
00:00 -
189 01_course-recap-cybersecurity-threat-vectors-and-mitigation.mp4
00:00 -
190 02_about-the-final-course-project-and-assessment_instructions.html
00:00 -
191 03_final-course-project-security-strategy_instructions.html
00:00 -
194 01_congratulations.mp4
00:00 -
195 02_next-steps_instructions.html
00:00
04. Cybersecurity Identity and Access Solutions using Azure AD
-
003 01_introduction-to-the-course.mp4
00:00 -
004 02_course-syllabus_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_setting-up-your-free-azure-account_instructions.html
00:00 -
007 05_microsoft-azure-active-directory-name-change_instructions.html
00:00 -
008 06_clean-up-resources_instructions.html
00:00 -
009 07_working-with-azure-portal_instructions.html
00:00 -
010 08_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
011 09_additional-resources-identity-services_instructions.html
00:00 -
014 01_introduction-to-aad.mp4
00:00 -
017 02_migration.mp4
00:00 -
020 03_implementing-azure-ad-in-your-organization.mp4
00:00 -
021 04_features-of-azure-ad_instructions.html
00:00 -
022 05_managing-users-and-groups-in-azure-ad_instructions.html
00:00 -
025 06_lets-talk-about-azure-active-directory.mp4
00:00 -
026 07_exercise-azure-active-directory_instructions.html
00:00 -
027 08_self-review-azure-active-directory_quiz.html
00:00 -
028 09_clean-up-resources_instructions.html
00:00 -
029 10_knowledge-check-azure-active-directory_quiz.html
00:00 -
030 11_additional-resources-azure-active-directory_instructions.html
00:00 -
033 01_comparing-azure-ad-editions.mp4
00:00 -
034 02_azure-ad-pricing-model_instructions.html
00:00 -
037 03_choosing-the-right-azure-ad-edition-for-your-organization.mp4
00:00 -
038 04_upgrading-to-a-higher-azure-ad-edition_instructions.html
00:00 -
039 05_knowledge-check-azure-active-directory-and-editions_quiz.html
00:00 -
040 06_additional-resources-azure-active-directory-and-editions_instructions.html
00:00 -
043 01_overview-of-azure-ad-identity-types.mp4
00:00 -
046 02_azure-ad-b2b-and-b2c.mp4
00:00 -
047 03_identity-scope_C4M1L4_Item_03-_Identity_scopeV2.mp4
00:00 -
049 04_activity-create-an-azure-ad-identity_instructions.html
00:00 -
050 05_using-azure-ad-with-other-identity-providers_instructions.html
00:00 -
051 06_knowledge-check-azure-active-directory-identity-types_quiz.html
00:00 -
054 07_module-summary-identity-services.mp4
00:00 -
055 08_additional-resources-azure-active-directory-identity-types_instructions.html
00:00 -
058 01_aad-authentication-introduction.mp4
00:00 -
061 02_introduction-to-hybrid-identities.mp4
00:00 -
062 03_expand-on-azure-ad-authentication-methods_instructions.html
00:00 -
065 04_variations-on-authentication.mp4
00:00 -
066 05_authentication-methods_instructions.html
00:00 -
069 06_introduction-to-vaults.mp4
00:00 -
070 07_password-information_instructions.html
00:00 -
071 08_activity-check-out-how-brute-force-attacks-work_instructions.html
00:00 -
074 09_set-up-a-sso-in-the-free-azure-portal.mp4
00:00 -
075 10_exercise-set-up-a-sso-in-the-free-azure-portal_instructions.html
00:00 -
076 11_additional-resources-active-directory-authentication_instructions.html
00:00 -
079 01_introduction-to-mfa.mp4
00:00 -
082 02_managing-multi-factor-authentication-in-azure-active-directory.mp4
00:00 -
085 03_recovery-for-the-mfa.mp4
00:00 -
086 04_tracking-triggers_instructions.html
00:00 -
087 05_additional-resources_instructions.html
00:00 -
090 01_introducing-self-service-password-reset.mp4
00:00 -
093 02_enabling-and-configuring-self-service-password-reset.mp4
00:00 -
096 03_password-validation.mp4
00:00 -
097 04_exercise-implementing-sspr_instructions.html
00:00 -
100 05_module-summary-active-directory-authentication.mp4
00:00 -
101 06_additional-resources-multi-factor-authentication_instructions.html
00:00 -
104 01_conditional-access-policies.mp4
00:00 -
105 02_how-to-create-a-conditional-policy_instructions.html
00:00 -
108 03_using-conditional-access-in-azure-ad.mp4
00:00 -
109 04_conditional-access-in-azure-ad_instructions.html
00:00 -
110 05_exercise-conditional-policy_instructions.html
00:00 -
111 06_additional-resources-conditional-access_instructions.html
00:00 -
114 01_role-based-access.mp4
00:00 -
115 02_configuring-roles-and-role-based-access_instructions.html
00:00 -
116 03_roles_instructions.html
00:00 -
119 04_roles-in-action.mp4
00:00 -
120 05_creating-custom-roles_instructions.html
00:00 -
121 06_additional-resources-roles-and-role-based-access_instructions.html
00:00 -
124 01_introduction-to-identity-governance.mp4
00:00 -
125 02_aad-security-and-zero-policy_instructions.html
00:00 -
128 03_designing-identity-governance.mp4
00:00 -
129 04_security-principals_instructions.html
00:00 -
132 05_managing-identities.mp4
00:00 -
133 06_best-practices-for-identity-governance_instructions.html
00:00 -
134 07_additional-resources-identity-governance_instructions.html
00:00 -
137 01_just-in-time-and-just-enough-access.mp4
00:00 -
140 02_privileged-identity-management-pim.mp4
00:00 -
141 03_securing-privileged-access-with-azure-ad-pim_instructions.html
00:00 -
142 04_additional-resources-privileged-identity-management-and-protection_instructions.html
00:00 -
145 05_module-summary-active-directory-access-protection-and-governance-management.mp4
00:00 -
148 01_course-recap-identity-and-access-solutions.mp4
00:00 -
149 02_about-the-final-project-and-assessment_instructions.html
00:00 -
150 03_exercise-configure-identity-and-access-policies_instructions.html
00:00 -
151 04_clean-up-resources_instructions.html
00:00 -
154 01_congratulations.mp4
00:00 -
155 02_next-steps_instructions.html
00:00 -
links.txt
00:00
05. Cybersecurity Solutions and Microsoft Defender
-
003 01_introduction-to-the-course.mp4
00:00 -
004 02_course-syllabus_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_microsoft-azure-active-directory-name-change_instructions.html
00:00 -
007 05_clean-up-resources_instructions.html
00:00 -
008 06_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
009 07_additional-resources-azure-basic-security-capabilities_instructions.html
00:00 -
012 01_azure-ddos-protection-overview.mp4
00:00 -
015 02_azure-ddos-protection-configuration.mp4
00:00 -
018 03_azure-ddos-protection-features-and-best-practices.mp4
00:00 -
019 04_azure-ddos-network-protection-in-detail_instructions.html
00:00 -
022 05_azure-and-virtual-machines.mp4
00:00 -
025 06_spinning-up-a-virtual-machine.mp4
00:00 -
026 07_exercise-create-a-windows-virtual-machine-in-the-azure-portal_instructions.html
00:00 -
027 08_self-review-create-a-windows-virtual-machine-in-the-azure-portal_quiz.html
00:00 -
028 09_clean-up-resources_instructions.html
00:00 -
029 10_knowledge-check-ddos-protection_quiz.html
00:00 -
030 11_additional-resources-ddos-protection_instructions.html
00:00 -
033 01_azure-networking.mp4
00:00 -
036 02_introduction-to-azure-firewall.mp4
00:00 -
039 03_azure-firewall-standard-and-basic.mp4
00:00 -
042 04_web-application-firewall.mp4
00:00 -
043 05_azure-firewall-in-depth_instructions.html
00:00 -
044 06_activity-resource-group-vnet-creation_instructions.html
00:00 -
047 07_azure-firewall-deployment.mp4
00:00 -
050 08_azure-firewall-rule-configuration.mp4
00:00 -
051 09_exercise-configure-azure-firewall_instructions.html
00:00 -
052 10_self-review-configure-azure-firewall_quiz.html
00:00 -
055 11_hackers-and-firewalls.mp4
00:00 -
056 12_knowledge-check-azure-firewall-protection_quiz.html
00:00 -
057 13_additional-resources-azure-firewall-protection_instructions.html
00:00 -
060 01_just-in-time-access-jit.mp4
00:00 -
063 02_key-management-and-encryption.mp4
00:00 -
064 03_jit-and-encryption_instructions.html
00:00 -
067 04_implementing-just-in-time-access.mp4
00:00 -
068 05_best-practices-for-securing-azure-resources_instructions.html
00:00 -
069 06_knowledge-check-just-in-time-access-and-encryption_quiz.html
00:00 -
070 07_exercise-secure-ports-with-jit_instructions.html
00:00 -
071 08_self-review-secure-ports-with-jit_quiz.html
00:00 -
074 09_module-summary-azure-basic-security-capabilities.mp4
00:00 -
075 10_additional-resources-just-in-time-access-and-encryption_instructions.html
00:00 -
078 01_overview-of-cloud-security.mp4
00:00 -
081 02_advanced-cloud-security.mp4
00:00 -
084 03_azure-security.mp4
00:00 -
087 04_azure-security-best-practices.mp4
00:00 -
088 05_azure-security-in-depth_instructions.html
00:00 -
089 06_additional-resources-introduction-to-cloud-security_instructions.html
00:00 -
092 01_microsoft-defender-interface.mp4
00:00 -
095 02_azure-bastion.mp4
00:00 -
098 03_bastion-and-virtual-machines.mp4
00:00 -
099 04_exercise-shield-virtual-machines-using-bastion_instructions.html
00:00 -
100 05_additional-resources-virtual-security-solutions_instructions.html
00:00 -
103 01_introduction-to-azure-policies.mp4
00:00 -
104 02_managing-azure-policies_instructions.html
00:00 -
105 03_working-with-policy-definitions-in-azure_instructions.html
00:00 -
108 04_custom-policy-definition.mp4
00:00 -
111 05_azure-blueprints.mp4
00:00 -
112 06_types-of-policies_instructions.html
00:00 -
113 07_additional-resources-azure-standards-and-policies_instructions.html
00:00 -
116 01_siem.mp4
00:00 -
119 02_microsoft-sentinel.mp4
00:00 -
122 03_microsoft-sentinel-data-connectors.mp4
00:00 -
123 04_expanding-on-sentinel_instructions.html
00:00 -
126 05_introducing-soar.mp4
00:00 -
127 06_siem-and-soar-use-case_instructions.html
00:00 -
128 07_guided-project-intro-configure-microsoft-sentinel-to-ingest-data-and-detect_instructions.html
00:00 -
131 08_module-summary-security-management-in-azure.mp4
00:00 -
132 09_additional-resources-introduction-to-siem-and-soar_instructions.html
00:00 -
135 01_introduction-to-microsoft-365-defender.mp4
00:00 -
138 02_microsoft-365-defender-portal.mp4
00:00 -
141 03_microsoft-365-defender-incidents-and-alerts.mp4
00:00 -
142 04_working-with-microsoft-365-defender-portal_Attack_story_video.mp4
00:00 -
144 05_microsoft-defender-use-case-office-365_instructions.html
00:00 -
147 06_managing-users.mp4
00:00 -
148 07_exercise-implement-microsoft-sentinel-with-microsoft-defender-data-connectors_instructions.html
00:00 -
149 08_additional-resources-defender-services_instructions.html
00:00 -
152 01_introduction-to-endpoint-security.mp4
00:00 -
155 02_endpoint-modernization.mp4
00:00 -
158 03_deployment-methods-for-waas-and-microsoft-365-apps.mp4
00:00 -
161 04_defender-portal-for-endpoint-capabilities-and-services.mp4
00:00 -
162 05_defender-services-in-depth_instructions.html
00:00 -
165 06_threat-technologies.mp4
00:00 -
166 07_next-gen-antivirus-and-endpoint-response_instructions.html
00:00 -
169 08_endpoint-encryption.mp4
00:00 -
170 09_additional-resources-endpoints-and-cloud-apps-security_instructions.html
00:00 -
173 01_introduction-to-identity-defense.mp4
00:00 -
176 02_microsoft-purview.mp4
00:00 -
179 03_azure-active-directory-identity-protection.mp4
00:00 -
182 04_microsoft-defender-for-identity.mp4
00:00 -
185 05_deploy-microsoft-defender-for-identity-with-microsoft-365-defender-preparation.mp4
00:00 -
186 06_deploy-microsoft-defender-for-identity-with-microsoft-365-defender-deployment_instructions.html
00:00 -
189 07_identity-theft.mp4
00:00 -
190 08_identity-protection-in-microsoft-365_instructions.html
00:00 -
193 09_module-summary-microsoft-365-defender-threat-protection.mp4
00:00 -
194 10_additional-resources-identity-defense_instructions.html
00:00 -
197 01_course-recap-security-solutions.mp4
00:00 -
198 02_about-the-final-project-and-assessment-cybersecurity-solutions-and-microsoft_instructions.html
00:00 -
199 03_exercise-securing-virtual-machines_instructions.html
00:00 -
200 04_clean-up-resources_instructions.html
00:00 -
203 01_congratulations.mp4
00:00 -
204 02_next-steps_instructions.html
00:00
06. Cybersecurity Tools and Technologies
-
003 01_introduction-to-the-course.mp4
00:00 -
004 02_course-syllabus-cybersecurity-tools-and-technologies_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_microsoft-azure-active-directory-name-change_instructions.html
00:00 -
007 05_clean-up-resources_instructions.html
00:00 -
008 06_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
009 07_additional-resources-course-introduction_instructions.html
00:00 -
012 01_security-testing-and-ethical-hacking.mp4
00:00 -
015 02_blue-team-responsibilities.mp4
00:00 -
018 03_red-team-responsibilities.mp4
00:00 -
019 04_red-versus-blue_instructions.html
00:00 -
021 05_knowledge-check-defense-and-offense-red-versus-blue_quiz.html
00:00 -
022 06_additional-resources-defense-and-offense-red-versus-blue_instructions.html
00:00 -
025 01_penetration-testing-overview.mp4
00:00 -
028 02_stage-1-reconnaissance.mp4
00:00 -
031 03_stage-2-enumeration.mp4
00:00 -
034 04_stage-3-exploitation.mp4
00:00 -
037 05_stage-4-escalation.mp4
00:00 -
040 06_stage-5-reporting-and-remediation.mp4
00:00 -
041 07_penetration-testing-walkthrough_instructions.html
00:00 -
044 08_att-ck-adversarial-tactics-techniques-and-common-knowledge-framework.mp4
00:00 -
045 09_knowledge-check-testing-stages_quiz.html
00:00 -
046 10_additional-resources-testing-stages_instructions.html
00:00 -
049 01_black-box-testing.mp4
00:00 -
052 02_white-box-testing.mp4
00:00 -
055 03_grey-box-testing.mp4
00:00 -
056 04_compliance-testing_instructions.html
00:00 -
057 05_penetration-testing-tools_instructions.html
00:00 -
058 06_exercise-penetration-testing-strategy_instructions.html
00:00 -
059 07_self-review-penetration-testing-strategy_quiz.html
00:00 -
060 08_clean-up-resources_instructions.html
00:00 -
061 09_knowledge-check-types-of-penetration-tests_quiz.html
00:00 -
064 10_module-summary-penetration-testing.mp4
00:00 -
065 11_additional-resources-types-of-penetration-testing_instructions.html
00:00 -
068 01_introduction-to-intrusion-detection-and-prevention-systems-idps.mp4
00:00 -
071 02_unpacking-internet-packets.mp4
00:00 -
072 03_intrusion-detection-tools_instructions.html
00:00 -
075 04_azure-firewall-premium-intrusion-detection-and-prevention-system-idps.mp4
00:00 -
078 05_azure-idps-in-action.mp4
00:00 -
079 06_different-threat-signature-types_instructions.html
00:00 -
083 07_idps-use-cases.mp4
00:00 -
084 08_idps-best-practices_instructions.html
00:00 -
085 09_incident-response_instructions.html
00:00 -
086 10_knowledge-check-idps_quiz.html
00:00 -
087 11_additional-resources-idps_instructions.html
00:00 -
090 01_introduction-to-firewall-design-in-azure.mp4
00:00 -
091 02_azure-firewall-design-in-action_instructions.html
00:00 -
094 03_azure-firewall-rule-design-and-configuration.mp4
00:00 -
097 04_network-security-group-and-azure-firewall-integration.mp4
00:00 -
098 05_advanced-firewall-design-patterns-in-azure_instructions.html
00:00 -
099 06_best-practices-for-azure-firewall-design_instructions.html
00:00 -
100 07_exercise-firewall-design-and-configuration_instructions.html
00:00 -
101 08_self-review-firewall-design-and-configuration_quiz.html
00:00 -
102 09_knowledge-check-configuring-firewalls_quiz.html
00:00 -
103 10_additional-resources-configuring-firewalls_instructions.html
00:00 -
106 01_vpn-gateway.mp4
00:00 -
109 02_how-azure-vpn-can-help-your-business.mp4
00:00 -
112 03_configure-vpns-on-azure.mp4
00:00 -
115 04_azure-point-to-site-vpn.mp4
00:00 -
116 05_azure-configuration-for-point-to-site-vpn-vnet_C6M2L3_Item_06-_Creating_the_VNet_V3.mp4
00:00 -
118 06_azure-configuration-for-point-to-site-vpn-gateway_C6M2L3_Item_08-_Setting_up_the_gateway_V2.mp4
00:00 -
120 07_azure-configuration-for-point-to-site-vpn-connect_C6M2L3_Item_10-_Connection_steps_V2.mp4
00:00 -
122 08_best-practices-for-azure-vpn_instructions.html
00:00 -
125 09_ip-addressing-and-subnets.mp4
00:00 -
126 10_ip-addressing-and-subnets-setup-steps_instructions.html
00:00 -
127 11_knowledge-check-azure-vpn_quiz.html
00:00 -
128 12_additional-resources-azure-vpn_instructions.html
00:00 -
131 01_introduction-to-vulnerability-management.mp4
00:00 -
134 02_vulnerability-management-process.mp4
00:00 -
137 03_security-control-vulnerability-management.mp4
00:00 -
140 04_vulnerability-management-in-azure.mp4
00:00 -
141 05_vulnerability-management-tools-in-azure_instructions.html
00:00 -
142 06_knowledge-check-vulnerability-management_quiz.html
00:00 -
145 07_module-summary-preventative-tools.mp4
00:00 -
146 08_additional-resources-vulnerability-management_instructions.html
00:00 -
149 01_introduction-to-command-line.mp4
00:00 -
152 02_command-line-in-action.mp4
00:00 -
153 03_activity-basic-command-line_instructions.html
00:00 -
157 04_introduction-to-windows-powershell.mp4
00:00 -
158 05_introduction-to-windows-powershell-script_instructions.html
00:00 -
161 06_windows-powershell-script-in-action.mp4
00:00 -
162 07_command-line-tools_instructions.html
00:00 -
163 08_best-practices-for-command-line-penetration-testing_instructions.html
00:00 -
164 09_knowledge-check-the-command-line_quiz.html
00:00 -
166 10_additional-resources-the-command-line_instructions.html
00:00 -
169 01_introduction-to-penetration-testing-on-azure.mp4
00:00 -
172 02_how-does-azure-penetration-testing-work.mp4
00:00 -
175 03_azure-penetration-test-overview.mp4
00:00 -
176 04_azure-penetration-testing-guidelines_instructions.html
00:00 -
179 05_getting-azure-ready.mp4
00:00 -
182 06_penetration-testing-framework.mp4
00:00 -
185 07_azure-security-settings.mp4
00:00 -
186 08_defender-for-clouds-integrated-qualys-vulnerability-scanner_instructions.html
00:00 -
187 09_knowledge-check-setting-up-azure-for-testing_quiz.html
00:00 -
188 10_additional-resources-setting-up-azure-for-testing_instructions.html
00:00 -
192 01_running-the-penetration-test-and-analyzing-the-result.mp4
00:00 -
193 02_interpreting-scan-and-test-results_instructions.html
00:00 -
196 03_penetration-testing-and-azure-security-center.mp4
00:00 -
199 04_configuring-security-center-automation.mp4
00:00 -
200 05_penetration-testing-best-practices_instructions.html
00:00 -
203 06_cold-wars-at-sams-scoops.mp4
00:00 -
204 07_knowledge-check-running-the-test_quiz.html
00:00 -
207 08_module-summary-azure-penetration-testing.mp4
00:00 -
208 09_additional-resources-running-the-test_instructions.html
00:00 -
211 01_course-recap-cybersecurity-tools-and-technologies.mp4
00:00 -
212 02_about-the-final-project-and-assessment-cybersecurity-tools-and-technologies_instructions.html
00:00 -
214 03_exercise-plan-of-attack_instructions.html
00:00 -
215 04_clean-up-resources_instructions.html
00:00 -
218 01_congratulations.mp4
00:00 -
219 02_next-steps_instructions.html
00:00
07. Cybersecurity Management and Compliance
-
003 01_introduction-to-the-course.mp4
00:00 -
004 02_course-syllabus_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_microsoft-azure-active-directory-name-change_instructions.html
00:00 -
007 05_clean-up-resources_instructions.html
00:00 -
008 06_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
009 07_additional-resources_instructions.html
00:00 -
012 01_identity-disaster-recovery-and-training.mp4
00:00 -
013 02_identity-disaster-recovery-and-training-in-depth_instructions.html
00:00 -
016 03_data-network-and-physical-security.mp4
00:00 -
019 04_enterprise-application-integration.mp4
00:00 -
022 05_log-collection-analysis-and-retention.mp4
00:00 -
024 06_security-planning-with-azure-monitor-logs_instructions.html
00:00 -
027 07_security-planning-retention-and-archiving_instructions.html
00:00 -
030 08_azure-security-services.mp4
00:00 -
031 09_activity-application-integration_instructions.html
00:00 -
032 10_knowledge-check-cloud-security-planning_quiz.html
00:00 -
033 11_additional-resources-cloud-security-planning_instructions.html
00:00 -
036 01_azure-cloud-adoption-framework-caf.mp4
00:00 -
037 02_caf-planning-stage-one_instructions.html
00:00 -
038 03_caf-planning-stage-two_instructions.html
00:00 -
041 04_the-5-points-of-security.mp4
00:00 -
042 05_exercise-design-a-security-plan_instructions.html
00:00 -
043 06_self-review-design-a-security-plan_quiz.html
00:00 -
044 07_clean-up-resources_instructions.html
00:00 -
045 08_knowledge-check-cloud-adoption-framework_quiz.html
00:00 -
046 09_additional-resources-cloud-adoption-framework_instructions.html
00:00 -
049 01_privacy-principles.mp4
00:00 -
052 02_service-trust-portal.mp4
00:00 -
053 03_customer-privacy_instructions.html
00:00 -
054 04_customer-privacy-controls_instructions.html
00:00 -
057 05_cloud-security-posture-management-cspm.mp4
00:00 -
060 06_resource-governance.mp4
00:00 -
061 07_knowledge-check-data-management-and-administration_quiz.html
00:00 -
062 08_additional-resources-data-management-and-administration_instructions.html
00:00 -
065 01_introduction-to-availability-and-continuity.mp4
00:00 -
068 02_business-continuity-management.mp4
00:00 -
071 03_region-and-availability-zones.mp4
00:00 -
072 04_continuity-planning_instructions.html
00:00 -
075 05_availability-and-resiliency.mp4
00:00 -
076 06_availability-and-resiliency-testing_instructions.html
00:00 -
079 07_reliability-monitoring.mp4
00:00 -
082 08_availability-and-resiliency-by-design.mp4
00:00 -
083 09_geographically-distributed-applications_instructions.html
00:00 -
084 10_geographically-distributed-data-considerations_instructions.html
00:00 -
085 11_knowledge-check-availability-and-continuity_quiz.html
00:00 -
088 12_module-summary-security-administration.mp4
00:00 -
089 13_additional-resources-availability-and-continuity_instructions.html
00:00 -
092 01_introduction-to-compliance-management.mp4
00:00 -
095 02_risk-assessment.mp4
00:00 -
098 03_microsoft-purview-and-data.mp4
00:00 -
101 04_microsoft-purview-and-record-management.mp4
00:00 -
104 05_purview-portal.mp4
00:00 -
107 06_data-mapping.mp4
00:00 -
110 07_microsoft-purview-policy-concepts.mp4
00:00 -
111 08_a-deeper-look-at-purview_instructions.html
00:00 -
112 09_compliance-frameworks-and-data_instructions.html
00:00 -
113 10_compliance-frameworks-and-records_instructions.html
00:00 -
114 11_knowledge-check-compliance-management_quiz.html
00:00 -
115 12_additional-resources-compliance-management_instructions.html
00:00 -
118 01_understanding-insider-risk.mp4
00:00 -
121 02_insider-risk-management.mp4
00:00 -
124 03_insider-threat-response.mp4
00:00 -
127 04_identifying-and-mitigating-insider-threats.mp4
00:00 -
128 05_communication-compliance_instructions.html
00:00 -
129 06_exercise-identify-and-respond_instructions.html
00:00 -
130 07_self-review-identify-and-respond_quiz.html
00:00 -
131 08_knowledge-check-insider-risk_quiz.html
00:00 -
132 09_additional-resources-insider-risk_instructions.html
00:00 -
135 01_data-lifecycle.mp4
00:00 -
138 02_purview-and-the-data-lifecycle.mp4
00:00 -
141 03_data-concerns.mp4
00:00 -
144 04_information-governance.mp4
00:00 -
147 05_labeling-and-classifying-data.mp4
00:00 -
148 06_data-security-and-mobility_instructions.html
00:00 -
149 07_knowledge-check-information-protection-and-data-lifecycle_quiz.html
00:00 -
152 08_module-summary-compliance-solutions.mp4
00:00 -
153 09_additional-resources-information-protection-and-data-lifecycle_instructions.html
00:00 -
156 01_federal-information-security-management-act-fisma.mp4
00:00 -
159 02_cybersecurity-framework-nist-national-institute-of-standards-and-technology.mp4
00:00 -
162 03_sarbanes-oxley-sox-regulations.mp4
00:00 -
165 04_general-data-protection-regulation-gdpr.mp4
00:00 -
166 05_knowledge-check-information-security-management-act_quiz.html
00:00 -
167 06_additional-resources-information-security-management-act_instructions.html
00:00 -
170 01_introduction-to-iso-standards-for-security.mp4
00:00 -
171 02_security-standard-compliance_instructions.html
00:00 -
174 03_azure-blueprint.mp4
00:00 -
178 04_blueprint-simplifies-compliance-stage-one.mp4
00:00 -
181 05_blueprint-simplifies-compliance-stage-two.mp4
00:00 -
182 06_creating-a-blueprint_instructions.html
00:00 -
183 07_activity-create-a-blueprint_instructions.html
00:00 -
184 08_knowledge-check-iso-standards_quiz.html
00:00 -
185 09_additional-resources-iso-standards_instructions.html
00:00 -
188 01_what-is-cobit.mp4
00:00 -
191 02_nist-cobit-and-the-microsoft-azure-audit-program-defining-steps.mp4
00:00 -
194 03_nist-cobit-and-the-microsoft-azure-audit-program-monitoring-change.mp4
00:00 -
195 04_knowledge-check-cobit_quiz.html
00:00 -
198 05_module-summary-laws-and-standards.mp4
00:00 -
199 06_additional-resources-control-objectives-for-information-and-related-technologies_instructions.html
00:00 -
202 01_course-recap-cybersecurity-management-and-compliance.mp4
00:00 -
203 02_about-the-final-project-and-assessment-cybersecurity-management-and-compliance_instructions.html
00:00 -
204 03_exercise-achieving-compliance_instructions.html
00:00 -
205 04_clean-up-resources_instructions.html
00:00 -
208 01_congratulations.mp4
00:00 -
209 02_next-steps_instructions.html
00:00 -
210 01__resources.html
00:00
08. Advanced Cybersecurity Concepts and Capstone Project
-
004 02_course-syllabus_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_microsoft-azure-active-directory-name-change_instructions.html
00:00 -
007 05_clean-up-resources_instructions.html
00:00 -
008 06_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
009 07_additional-resources_instructions.html
00:00 -
012 01_threat-modeling-process.mp4
00:00 -
015 02_decompose-the-application.mp4
00:00 -
018 03_determine-and-rank-threats.mp4
00:00 -
021 04_stride-threat-list.mp4
00:00 -
022 05_determine-countermeasures-and-mitigation_instructions.html
00:00 -
023 06_threat-modeling_instructions.html
00:00 -
024 07_exercise-create-a-threat-model-for-a-simple-web-application_instructions.html
00:00 -
025 08_self-review-create-a-threat-model-for-a-simple-web-application_quiz.html
00:00 -
026 09_clean-up-resources_instructions.html
00:00 -
027 10_knowledge-check-introduction-to-threat-modeling_quiz.html
00:00 -
028 11_additional-resources-introduction-to-threat-modeling_instructions.html
00:00 -
032 01_benefits-of-threat-modeling.mp4
00:00 -
035 02_ensure-application-security-sans-approach.mp4
00:00 -
036 03_cyberthreat-modeling_instructions.html
00:00 -
039 04_process-for-attack-simulation-and-threat-analysis-pasta.mp4
00:00 -
040 05_pasta-in-depth_instructions.html
00:00 -
043 06_common-vulnerability-scoring-system-cvss.mp4
00:00 -
044 07_cvss-cheat-sheet_instructions.html
00:00 -
047 08_visual-agile-and-simple-threat-vast.mp4
00:00 -
048 09_enterprise-security-methodologies_instructions.html
00:00 -
049 10_exercise-evaluating-threats_instructions.html
00:00 -
050 11_self-review-evaluating-threats_quiz.html
00:00 -
051 12_knowledge-check-threat-modeling-strategies_quiz.html
00:00 -
052 13_additional-resources-threat-modeling-strategies_instructions.html
00:00 -
055 01_microsoft-threat-modeling-tool.mp4
00:00 -
058 02_threat-modeling-for-azure-virtual-networks.mp4
00:00 -
061 03_four-question-framework-for-effective-threat-modeling.mp4
00:00 -
062 04_activity-building-a-model_instructions.html
00:00 -
067 05_security-development-lifecycle-sdl_instructions.html
00:00 -
068 06_exercise-web-application-threat-modeling_instructions.html
00:00 -
069 07_self-review-web-application-threat-modeling_quiz.html
00:00 -
072 08_module-summary-threat-modeling.mp4
00:00 -
073 09_additional-resources-threat-modeling_instructions.html
00:00 -
076 01_understanding-susceptible-infrastructure.mp4
00:00 -
077 02_understanding-susceptible-infrastructure-in-depth_instructions.html
00:00 -
078 03_activity-risk-assessment_instructions.html
00:00 -
081 04_mitre-att-ck-matrix-overview.mp4
00:00 -
084 05_mitre-att-ck-matrix-key-points.mp4
00:00 -
087 06_attack-techniques.mp4
00:00 -
090 07_types-of-malicious-software.mp4
00:00 -
093 08_prevention-detection-and-countermeasures.mp4
00:00 -
094 09_mitigation_instructions.html
00:00 -
095 10_knowledge-check-susceptible-infrastructure_quiz.html
00:00 -
096 11_additional-resources-susceptible-infrastructure_instructions.html
00:00 -
099 01_what-is-an-iot-device.mp4
00:00 -
102 02_iot-attacks.mp4
00:00 -
105 03_iot-attack-risk.mp4
00:00 -
108 04_iot-attack-prevention-strategies.mp4
00:00 -
111 05_azure-iot.mp4
00:00 -
114 06_defender-for-iot.mp4
00:00 -
117 07_defender-for-iot-deployment-and-integration.mp4
00:00 -
118 08_a-guide-to-iot-device-architecture_instructions.html
00:00 -
119 09_exercise-iot-device-analysis_instructions.html
00:00 -
120 10_self-review-iot-device-analysis_quiz.html
00:00 -
121 11_exemplar-iot-device-analysis_instructions.html
00:00 -
122 12_knowledge-check-iot-internet-of-things-and-common-attacks_quiz.html
00:00 -
125 13_module-summary-advanced-threats-and-mitigation.mp4
00:00 -
126 14_additional-resources-iot-internet-of-things-and-common-attacks_instructions.html
00:00 -
129 01_threat-landscape-and-vectors.mp4
00:00 -
132 02_access-brokers.mp4
00:00 -
135 03_mitigation-approaches.mp4
00:00 -
136 04_antivirus-and-anti-malware_instructions.html
00:00 -
137 05_advanced-antivirus-and-antimalware-techniques_instructions.html
00:00 -
138 06_knowledge-check-entry-points_quiz.html
00:00 -
139 07_additional-resources-entry-points_instructions.html
00:00 -
142 01_defense-in-depth-did.mp4
00:00 -
143 02_defense-in-depth-strategy_instructions.html
00:00 -
146 03_defending-your-cloud-infrastructure.mp4
00:00 -
149 04_azure-security-building-a-network-with-did.mp4
00:00 -
150 05_identity-infrastructure_instructions.html
00:00 -
153 06_modern-authentication.mp4
00:00 -
154 07_focused-defense_instructions.html
00:00 -
155 08_knowledge-check-secure-network-design-with-defense-in-depth_quiz.html
00:00 -
156 09_additional-resources-secure-network-design-with-defense-in-depth_instructions.html
00:00 -
159 01_identity-mitigation-strategy.mp4
00:00 -
162 02_azure-security-mitigation-strategies.mp4
00:00 -
165 03_implementing-network-security-on-azure.mp4
00:00 -
168 04_securing-data-on-azure.mp4
00:00 -
169 05_monitoring-azure-security_instructions.html
00:00 -
172 06_network-security.mp4
00:00 -
173 07_knowledge-check-mitigation-strategies_quiz.html
00:00 -
176 08_module-summary-security-conscious-modeling.mp4
00:00 -
177 09_additional-resources-security-conscious-modeling_instructions.html
00:00 -
180 01_course-recap-advanced-cybersecurity-concepts.mp4
00:00 -
181 02_recap-microsoft-cybersecurity-analyst-course-projects_instructions.html
00:00 -
184 03_capstone-introduction.mp4
00:00 -
185 04_capstone-check-in_instructions.html
00:00 -
188 05_stage-one-company-requirements_instructions.html
00:00 -
189 06_stage-two-aad-set-up_instructions.html
00:00 -
190 07_stage-three-roles-and-access_instructions.html
00:00 -
191 08_stage-four-aad-connections_instructions.html
00:00 -
192 09_stage-five-policy-implementation_instructions.html
00:00 -
193 10_clean-up-resources_instructions.html
00:00 -
196 01_congratulations.mp4
00:00 -
197 02_next-steps_instructions.html
00:00 -
003 01_introduction-to-the-course.mp4
00:00
09. Microsoft SC-900 Exam Preparation and Practice
-
004 02_course-syllabus_instructions.html
00:00 -
005 03_how-to-be-successful-in-this-course_instructions.html
00:00 -
006 04_microsoft-azure-active-directory-name-change_instructions.html
00:00 -
007 05_how-to-open-an-image-in-a-new-tab_instructions.html
00:00 -
008 06_clean-up-resources_instructions.html
00:00 -
009 07_how-to-locate-your-downloaded-files_instructions.html
00:00 -
010 08_additional-resources-concepts-of-security-compliance-and-identity_instructions.html
00:00 -
013 01_introduction-to-preparing-for-the-exam.mp4
00:00 -
014 02_how-to-prepare-for-the-proctored-examination_instructions.html
00:00 -
016 03_topics-covered-in-the-exam-sc-900-microsoft-security-compliance-and-identity_instructions.html
00:00 -
017 04_how-the-exam-is-administered_instructions.html
00:00 -
019 05_testing-strategy_instructions.html
00:00 -
021 06_additional-resources-microsoft-certification_instructions.html
00:00 -
026 01_overview-of-security-compliance.mp4
00:00 -
027 02_compliance-concepts_instructions.html
00:00 -
028 03_shared-responsibility-model_instructions.html
00:00 -
031 04_business-continuity-management.mp4
00:00 -
032 05_zero-trust-model_instructions.html
00:00 -
035 06_zero-trust-model-in-depth.mp4
00:00 -
038 07_public-private-key-and-hashing.mp4
00:00 -
039 08_symmetric-and-asymmetric-encryption_instructions.html
00:00 -
040 09_encryption-and-hashing_instructions.html
00:00 -
043 10_hashing-techniques.mp4
00:00 -
046 11_encryption-techniques.mp4
00:00 -
047 12_knowledge-check-security-and-compliance-concepts_quiz.html
00:00 -
048 13_additional-resources-security-and-compliance-concepts_instructions.html
00:00 -
051 01_identity-as-the-primary-security-perimeter.mp4
00:00 -
052 02_authentication_instructions.html
00:00 -
053 03_authorization_instructions.html
00:00 -
056 04_centralized-access-management.mp4
00:00 -
057 05_the-benefits-of-centralized-authentication-and-authorization_instructions.html
00:00 -
060 06_id-and-active-directory.mp4
00:00 -
063 07_identity-management-and-single-sign-on-sso.mp4
00:00 -
064 08_identity-providers_instructions.html
00:00 -
065 09_federation_instructions.html
00:00 -
068 10_group-policies-and-identity-management.mp4
00:00 -
069 11_activity-azure-identity_instructions.html
00:00 -
072 12_identity-scope.mp4
00:00 -
073 13_hybrid-identity_instructions.html
00:00 -
074 14_knowledge-check-identity-concepts_quiz.html
00:00 -
077 15_module-summary-concepts-of-security-compliance-and-identity.mp4
00:00 -
078 16_study-checkpoint-concepts-of-security-compliance-and-identity_quiz.html
00:00 -
079 17_additional-resources-identity-concepts_instructions.html
00:00 -
082 01_authentication-methods-in-azure-ad.mp4
00:00 -
083 02_multi-factor-authentication_instructions.html
00:00 -
086 03_azure-security.mp4
00:00 -
089 04_mfa-recovery.mp4
00:00 -
090 05_self-service-password-reset_instructions.html
00:00 -
091 06_password-protection-and-management-capabilities-in-azure-ad_instructions.html
00:00 -
092 07_knowledge-check-authentication-capabilities-of-azure-ad_quiz.html
00:00 -
093 08_additional-resources-authentication-capabilities-of-azure-ad_instructions.html
00:00 -
096 01_conditional-access.mp4
00:00 -
099 02_azure-ad-roles.mp4
00:00 -
100 03_azure-ad-role-based-access-control_instructions.html
00:00 -
103 04_azure-access-policy-and-management.mp4
00:00 -
104 05_activity-create-a-conditional-policy_instructions.html
00:00 -
105 06_knowledge-check-access-management-capabilities-of-azure-ad_quiz.html
00:00 -
106 07_additional-resources-access-management-capabilities-of-azure-ad_instructions.html
00:00 -
109 01_identity-governance-in-azure-ad.mp4
00:00 -
110 02_entitlement-management-and-access-reviews_instructions.html
00:00 -
111 03_azure-ad-privileged-identity-management-pim_instructions.html
00:00 -
114 04_azure-ad-identity-protection.mp4
00:00 -
115 05_best-practices-for-identity-governance_instructions.html
00:00 -
116 06_knowledge-check-identity-protection-and-governance-capabilities-of-azure-ad_quiz.html
00:00 -
119 07_module-summary-the-capabilities-of-microsoft-azure-active-directory.mp4
00:00 -
120 08_study-checkpoint-the-capabilities-of-microsoft-azure-active-directory_quiz.html
00:00 -
121 09_additional-resources-identity-protection-and-governance-capabilities-of-azure-ad_instructions.html
00:00 -
124 01_azure-ddos-protection.mp4
00:00 -
125 02_ddos-in-depth_instructions.html
00:00 -
128 03_azure-firewall.mp4
00:00 -
129 04_web-application-firewall_instructions.html
00:00 -
132 05_firewalls-in-depth.mp4
00:00 -
133 06_network-segmentation-with-azure-virtual-networks_instructions.html
00:00 -
134 07_azure-network-security-groups_instructions.html
00:00 -
135 08_activity-network-segmentation-and-firewalls_instructions.html
00:00 -
138 09_azure-bastion-and-jit-access.mp4
00:00 -
139 10_activity-securing-resources-with-jit_instructions.html
00:00 -
140 11_azure-and-data-encryption_instructions.html
00:00 -
141 12_knowledge-check-basic-security-capabilities-in-azure_quiz.html
00:00 -
142 13_additional-resources-basic-security-capabilities-in-azure_instructions.html
00:00 -
145 01_cloud-security-posture-management-cspm.mp4
00:00 -
146 02_cloud-security-posture-management-cspm-in-depth_instructions.html
00:00 -
149 03_microsoft-defender-for-cloud.mp4
00:00 -
150 04_defender-for-cloud-enhanced-security-features_instructions.html
00:00 -
153 05_defender-for-cloud-in-depth.mp4
00:00 -
156 06_security-baselines-for-azure.mp4
00:00 -
157 07_knowledge-check-azure-security-management_quiz.html
00:00 -
158 08_additional-resources-azure-security-management_instructions.html
00:00 -
161 01_siem-and-soar.mp4
00:00 -
164 02_microsoft-sentinel.mp4
00:00 -
165 03_sentinel-and-integrated-threat-management_instructions.html
00:00 -
168 04_sentinel-in-depth.mp4
00:00 -
169 05_knowledge-check-security-capabilities-of-microsoft-sentinel_quiz.html
00:00 -
170 06_additional-resources-security-capabilities-of-microsoft-sentinel_instructions.html
00:00 -
173 01_microsoft-365-defender-services.mp4
00:00 -
174 02_defender-for-office-365_instructions.html
00:00 -
177 03_defender-for-endpoint.mp4
00:00 -
178 04_defender-for-cloud-apps_instructions.html
00:00 -
181 05_defender-for-identity.mp4
00:00 -
184 06_microsoft-365-defender-portal.mp4
00:00 -
185 07_defender-365-in-depth_instructions.html
00:00 -
186 08_knowledge-check-threat-protection-with-microsoft-365-defender_quiz.html
00:00 -
189 09_module-summary-microsoft-security-solutions.mp4
00:00 -
190 10_study-checkpoint-microsoft-security-solutions_quiz.html
00:00 -
191 11_additional-resources-threat-protection-with-microsoft-365-defender_instructions.html
00:00 -
194 01_capabilities-of-service-trust-portal.mp4
00:00 -
195 02_microsofts-privacy-principles_instructions.html
00:00 -
196 03_customer-privacy_instructions.html
00:00 -
199 04_trust-and-privacy.mp4
00:00 -
200 05_knowledge-check-microsofts-service-trust-portal-and-privacy-principles_quiz.html
00:00 -
201 06_additional-resources-microsofts-service-trust-portal-and-privacy-principles_instructions.html
00:00 -
204 01_microsoft-purview-compliance-portal.mp4
00:00 -
207 02_compliance-manager.mp4
00:00 -
208 03_microsoft-purview_instructions.html
00:00 -
209 04_benefits-of-compliance-score_instructions.html
00:00 -
212 05_purview-and-compliance.mp4
00:00 -
213 06_knowledge-check-compliance-management-capabilities-of-microsoft-purview_quiz.html
00:00 -
214 07_additional-resources-compliance-management-capabilities-of-microsoft-purview_instructions.html
00:00 -
217 01_data-classification-capabilities.mp4
00:00 -
220 02_benefits-of-content-explorer-and-activity-explorer.mp4
00:00 -
221 03_sensitivity-labels_instructions.html
00:00 -
222 04_records-management_instructions.html
00:00 -
223 05_retention-polices-and-retention-labels_instructions.html
00:00 -
226 06_purview-policies-data-and-labels.mp4
00:00 -
229 07_purview-data-lifecycle.mp4
00:00 -
230 08_knowledge-check-information-protection-and-data-lifecycle-management_quiz.html
00:00 -
233 09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4
00:00 -
234 10_study-checkpoint-capabilities-of-microsoft-compliance-solutions_quiz.html
00:00 -
235 11_additional-resources-information-protection-and-data-lifecycle-management_instructions.html
00:00 -
238 01_insider-risk-management.mp4
00:00 -
239 02_communication-compliance_instructions.html
00:00 -
242 03_information-barriers.mp4
00:00 -
245 04_information-management.mp4
00:00 -
246 05_information-management-and-compliance_instructions.html
00:00 -
247 06_activity-threat-response_instructions.html
00:00 -
248 07_knowledge-check-insider-risk-capabilities-in-microsoft-purview_quiz.html
00:00 -
249 08_additional-resources-insider-risk-capabilities-in-microsoft-purview_instructions.html
00:00 -
252 01_azure-policy.mp4
00:00 -
255 02_azure-blueprints.mp4
00:00 -
256 03_microsoft-purview-unified-data-governance-solution_instructions.html
00:00 -
259 04_resources-and-compliance.mp4
00:00 -
260 05_knowledge-check-resource-governance-capabilities-in-azure_quiz.html
00:00 -
263 06_module-summary-risk-and-resource-governance.mp4
00:00 -
264 07_study-checkpoint-risk-and-resource-governance_quiz.html
00:00 -
265 08_additional-resources-resource-governance-capabilities-in-azure_instructions.html
00:00 -
268 01_introduction-to-the-sc-900-exam.mp4
00:00 -
269 02_preparing-for-the-exam_instructions.html
00:00 -
271 03_practice-assessment-sc-900-microsoft-security-compliance-and-identity_instructions.html
00:00 -
273 04_sign-up-for-the-proctored-exam_instructions.html
00:00 -
276 01_congratulations.mp4
00:00 -
279 02_a-day-in-the-life.mp4
00:00 -
280 03_career-opportunities-through-learning_instructions.html
00:00 -
281 04_next-steps_instructions.html
00:00
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.