- Level Foundation
- المدة 20 ساعات hours
- الطبع بواسطة Microsoft
-
Offered by
عن
This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Describe the active threat landscape • Describe common types of cyber attacks • Classify different types of encryption algorithms • Explain security and compliance concepts This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.الوحدات
Course introduction
1
Discussions
- What do you hope to learn?
1
Videos
- Introduction to the course: Cybersecurity threat vectors and mitigation
4
Readings
- Course syllabus
- How to be successful in this course
- How to open an image in a new tab
- Additional resources: Threats and attacks
Epic attacks
1
Assignment
- Knowledge check: Epic attacks
1
Discussions
- What examples of cyberattacks have you heard about?
2
Videos
- Introduction to cyber attacks
- Trojans and viruses
4
Readings
- WannaCry ransomware attack
- Stuxnet worm
- Data breaches
- Additional resources: Epic attacks
Threat vectors
1
Assignment
- Knowledge check: Threat vectors
4
Videos
- Introduction to threat vectors
- Malware and ransomware
- Phishing and social engineering
- Threats
5
Readings
- Evading detection
- Malware and ransomware in action
- Types of phishing
- Other threat vectors
- Additional resources: Threat vectors
Mitigation strategies
2
Assignment
- Knowledge check: Mitigation strategies
- Module quiz: Threats and attacks
3
Videos
- Personal mitigation strategies
- Security software
- Module summary: Threats and attacks
4
Readings
- Biometrics
- Firewalls and antivirus
- Protecting data
- Additional resources: Mitigation strategies
Encryption
2
Assignment
- Self-review: Initial protective measures
- Knowledge check: Encryption
2
Videos
- Introduction to encryption
- Modern encryptions
5
Readings
- Evolution of encryption
- Encryption tools
- Exercise: Initial protective measures
- Exemplar: Initial protective measures
- Additional resources: Encryption
Public/private key and hashing
1
Assignment
- Knowledge check: Public/private and key hashing
4
Videos
- Private key and symmetric encryption
- Public key and asymmetric encryption
- Hashing
- The power of encryption
4
Readings
- The formation of symmetric standards
- The formation of digital signatures
- List of hashing and encryption techniques and algorithms
- Additional resources: Public/private key and hashing
Digital signing and certificates
1
Assignment
- Knowledge check: Digital signing and certificates
3
Videos
- Digital signing
- Certificates and certificate authorities
- Signed URLs
3
Readings
- Secure certificates
- Secure communication using SSL and HTTPS
- Additional resources: Digital signing and certificates
Authentication and authorization
2
Assignment
- Knowledge check: Authentication and authorization
- Module quiz: Cryptography
3
Videos
- Centralized authentication and authorization systems
- Authentication and authorization methods
- Module summary: Cryptography
2
Readings
- Centralized authentication and authorization systems examples
- Additional resources: Authentication and authorization
Data transmission
1
Assignment
- Knowledge check: Data transmission
3
Videos
- Data transmission threats
- Virtual private network
- Advanced persistent threats (APT)
4
Readings
- Data transmission intercept tools
- APTs in action
- IoT threats
- Additional resources: Data transmission
Security controls
2
Assignment
- Self-review: Walling off
- Knowledge check: Security controls
3
Videos
- Firewall optimization
- Network segmentation
- Intrusion detection and prevention system
5
Readings
- Firewall configuration
- Endpoint security
- Exercise: Walling off
- Exemplar: Walling off
- Additional resources: Security controls
Application updates
2
Assignment
- Knowledge check: Application updates
- Module quiz: Network and device-based threats
3
Videos
- Introduction to application updates
- Bring your own device risks
- Module summary: Network and device-based threats
2
Readings
- Keeping applications and operating systems up to date
- Additional resources: Application updates
Security and compliance concepts
1
Assignment
- Knowledge check: Security and compliance concepts
3
Videos
- Overview of security compliance
- Risk management and compliance
- Browser cookies and GDPR
3
Readings
- Industry standards and compliance frameworks
- General Data Protection Regulation (GDPR)
- Additional resources: Security and compliance concepts
ID and Active Directory
1
Assignment
- Knowledge check: ID and Active Directory
3
Videos
- Identity management
- Single sign-on (SSO)
- Active Directory and Group Policy
4
Readings
- Identity management in action
- Group Policies
- Managing identities and access with Azure Active Directory
- Additional resources: ID and Active Directory
Defense models
2
Assignment
- Knowledge check: Defense models
- Module quiz: Security, compliance and identity
3
Videos
- Defense in depth
- Zero Trust Model
- Module summary: Security, compliance and identity
4
Readings
- Defense in depth in action
- Cloud security and defense in depth
- Security operations and monitoring
- Additional resources: Defense models
Final Course project and assessment
2
Assignment
- Self-review: Security strategy
- Course quiz: Cybersecurity threat vectors and mitigation
1
Videos
- Course recap: Cybersecurity threat vectors and mitigation
3
Readings
- About the final course project and assessment
- Final course project: Security strategy
- Exemplar: Security strategy
Course wrap-up
1
Discussions
- Reflect on learning
1
Videos
- Congratulations
1
Readings
- Next steps
Auto Summary
"Cybersecurity Threat Vectors and Mitigation" is a foundational IT and Computer Science course offered by Coursera, designed to equip learners with skills to safeguard against cyber threats. Led by expert instructors, it covers threat vectors, encryption techniques, and compliance concepts, preparing you for the Microsoft SC-900 exam and the Cybersecurity Analyst Professional Certificate. The course spans 1200 hours, with subscription options including Starter and Professional, and is ideal for those without prior experience.

Microsoft