- Level Foundation
- Duration 20 hours
- Course by Microsoft
-
Offered by
About
This course engages you in the world of cybersecurity attack and defense, dealing with both sides and working with the tools associated with security testing within a cloud environment. You’ll gain knowledge on the penetration testing strategies employed by the industry to assess the integrity of their network. You’ll also interpret the results of security scans and deal with mitigation strategies such as vulnerability management. This course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Explain the concept of system testing • Create a penetration test plan • Execute penetration testing on a cloud platform This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.Modules
Course introduction
1
Discussions
- What do you hope to learn?
1
Videos
- Introduction to the course
6
Readings
- Course syllabus: Cybersecurity tools and technologies
- How to be successful in this course
- Microsoft Azure Active Directory name change
- Clean up resources
- How to open an image in a new tab
- Additional resources: Course introduction
Defense and offense - Red versus blue
1
Assignment
- Knowledge check: Defense and offense - Red versus blue
3
Videos
- Security testing and ethical hacking
- Blue team: Responsibilities
- Red team: Responsibilities
2
Readings
- Red versus blue
- Additional resources: Defense and offense - Red versus blue
Testing stages
1
Assignment
- Knowledge check: Testing stages
7
Videos
- Penetration testing overview
- Stage 1 - Reconnaissance
- Stage 2 - Enumeration
- Stage 3 - Exploitation
- Stage 4 - Escalation
- Stage 5 - Reporting and remediation
- ATT&CK (Adversarial Tactics, Techniques and Common Knowledge) Framework
2
Readings
- Penetration testing walkthrough
- Additional resources: Testing stages
Types of penetration test
3
Assignment
- Self review: Penetration testing strategy
- Knowledge check: Types of penetration tests
- Module quiz: Penetration testing
4
Videos
- Black box testing
- White box testing
- Grey box testing
- Module summary: Penetration testing
6
Readings
- Compliance testing
- Penetration testing tools
- Exercise: Penetration testing strategy
- Exemplar: Penetration testing strategy
- Clean up resources
- Additional resources: Types of penetration testing
Intrusion Detection and Prevention Systems
1
Assignment
- Knowledge check: IDPS
5
Videos
- Introduction to Intrusion Detection and Prevention Systems (IDPS)
- Unpacking internet packets
- Azure Firewall Premium Intrusion Detection and Prevention System (IDPS)
- Azure IDPS in action
- IDPS use cases
5
Readings
- Intrusion detection tools
- Different threat signature types
- IDPS best practices
- Incident response
- Additional resources: IDPS
Designing firewalls solutions in Azure
2
Assignment
- Self review: Firewall design and configuration
- Knowledge check: Configuring firewalls
3
Videos
- Introduction to firewall design in Azure
- Azure Firewall rule design and configuration
- Network security group and Azure firewall integration
6
Readings
- Azure Firewall design in action
- Advanced firewall design patterns in Azure
- Best practices for Azure Firewall design
- Exercise: Firewall design and configuration
- Exemplar: Firewall design and configuration
- Additional resources: Configuring firewalls
Azure Virtual Private Network (VPN)
1
Assignment
- Knowledge check: Azure VPN
5
Videos
- VPN gateway
- How Azure VPN can help your business
- Configure VPNs on Azure
- Azure Point-to-Site VPN
- IP addressing and subnets
6
Readings
- Azure configuration for Point-to-Site VPN: VNet
- Azure configuration for Point-to-Site VPN: Gateway
- Azure configuration for Point-to-Site VPN: Connect
- Best practices for Azure VPN
- IP addressing and subnets setup steps
- Additional resources: Azure VPN
Vulnerability management
2
Assignment
- Knowledge check: Vulnerability management
- Module quiz: Preventative tools
5
Videos
- Introduction to vulnerability management
- Vulnerability management process
- Security control: Vulnerability management
- Vulnerability management in Azure
- Module summary: Preventative tools
2
Readings
- Vulnerability management tools in Azure
- Additional resources: Vulnerability management
The Command Line and Windows Powershell
1
Assignment
- Knowledge check: The Command Line
4
Videos
- Introduction to Command Line
- Command Line in action
- Introduction to Windows PowerShell
- Windows PowerShell Script in action
5
Readings
- Activity: Basic Command Line
- Introduction to Windows PowerShell Script
- Command Line tools
- Best practices for Command Line penetration testing
- Additional resources: The Command Line
Setting up Azure for testing
1
Assignment
- Knowledge check: Setting up Azure for testing
6
Videos
- Introduction to penetration testing on Azure
- How does Azure penetration testing work?
- Azure penetration test overview
- Getting Azure ready
- Penetration testing framework
- Azure security settings
3
Readings
- Azure penetration testing guidelines
- Defender for Cloud's integrated Qualys vulnerability scanner
- Additional resources: Setting up Azure for testing
Running the test
2
Assignment
- Knowledge check: Running the test
- Module quiz: Azure penetration testing
5
Videos
- Running the penetration test and analyzing the result
- Penetration testing and Azure Security Center
- Configuring security center automation
- Cold wars at Sam's Scoops
- Module summary: Azure penetration testing
3
Readings
- Interpreting scan and test results
- Penetration testing best practices
- Additional resources: Running the test
Final project and assessment: Cybersecurity tools and technologies
2
Assignment
- Self review: Plan of attack
- Course quiz: Cybersecurity tools and technologies
1
Videos
- Course recap: Cybersecurity tools and technologies
4
Readings
- About the final project and assessment: Cybersecurity tools and technologies
- Exercise: Plan of attack
- Exemplar: Plan of attack
- Clean up resources
Wrap-up: Cybersecurity Tools and Technologies
1
Discussions
- Reflect on learning
1
Videos
- Congratulations
1
Readings
- Next steps
Auto Summary
Dive into the dynamic field of cybersecurity with Coursera's "Cybersecurity Tools and Technologies" course, designed to immerse you in both the offensive and defensive aspects of cybersecurity within a cloud environment. This foundational course is perfect for those looking to step into the world of IT and Computer Science, even without prior experience or a degree. Guided by expert instructors, you'll explore industry-standard penetration testing strategies to evaluate network integrity, learn to interpret security scan results, and develop effective mitigation tactics, including vulnerability management. By the end of the course, you'll be equipped to explain system testing concepts, create comprehensive penetration test plans, and execute these tests on cloud platforms. With a total duration of 1200 minutes, this course is part of the pathway to attaining the Microsoft Cybersecurity Analyst Professional Certificate. It also serves as an excellent preparation for the Microsoft SC-900 exam, leading to the Microsoft Security, Compliance, and Identity Fundamentals Certification. Enrollment options include Starter and Professional subscriptions, catering to your specific learning needs and professional ambitions. Ideal for beginners, this course provides an essential foundation for anyone aspiring to a career in cybersecurity.

Microsoft