We may earn an affiliate commission when you visit our partners.
Course image
Microsoft

In this course, you’ll learn about the types of cloud security policies that protect against DDoS Attacks, Firewall Breaches, and Unauthorized Access. Explore tools like MS Defender for cloud, security information and event management (SICM) and security orchestration, automation, and response (SOAR).

Read more

In this course, you’ll learn about the types of cloud security policies that protect against DDoS Attacks, Firewall Breaches, and Unauthorized Access. Explore tools like MS Defender for cloud, security information and event management (SICM) and security orchestration, automation, and response (SOAR).

You’ll gain an understanding of security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance. You’ll also learn how to protect your organization’s assets from various types of threats, including malware, phishing, and identity-based attacks. This course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.

After completing this course, you’ll be able to:

• Explain cloud-based security concepts

• Discuss security information and event management (SIEM)

• Define 365 Defender capabilities

This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.

Enroll now

What's inside

Syllabus

Azure: Basic security capabilities
This module provides a comprehensive overview of Azure networking and security. It covers essential topics such as Azure's built-in security measures, recommended practices for securing Azure resources, and protection against Distributed Denial of Service (DDoS) attacks, firewall breaches, and unauthorized access. You will gain a deep understanding of how to secure Azure resources against malicious threats and gain insight into just-in-time access and encryption.
Read more
Security management in Azure
This module provides an overview of cloud security and security management in Azure. It covers key concepts such as Azure security standards, use of the Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities of Microsoft Sentinel. On completion of this module, you will have a thorough understanding of the security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance.
Microsoft 365 Defender threat protection
This module covers the different threat protection services available in Microsoft 365, including Azure Defender, Azure Advanced Threat Protection, and Azure Information Protection. The module is designed to help you understand how to protect an organization's assets from various types of threats, including malware, phishing, and identity-based attacks. The module covers key concepts such as defender services, endpoint and cloud app protection, and identity defence. It also provides best practices for implementing these threat protection services in an organization.
Graded assessment and course wrap up
In this module, you will be assessed on the key skills covered in the course. You will gain a real-life example of demonstrating protection strategies by completing a scenario-based project. You'll also complete a graded course quiz that will test your knowledge of all the topics you covered in this course. Lastly, you will get the opportunity to reflect on your learning and explore the next steps in your cybersecurity journey.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides a strong foundation for beginners who want to gain an understanding of cloud security
Taught by Microsoft, who are recognized for their work in cloud security
Develops skills and knowledge that are highly relevant to industry
Covers unique perspectives and ideas that may add color to other topics and subjects
Is multi-modal and includes a mix of media, such as videos, readings, discussions, etc

Save this course

Save Cybersecurity Solutions and Microsoft Defender to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity Solutions and Microsoft Defender with these activities:
Review Azure networking basics
Start by reviewing the fundamentals of Azure Networking to lay a strong foundation for understanding Azure Security Concepts.
Show steps
  • Read through Azure Networking documentation
  • Complete hands-on exercises
Review Networking and Security Fundamentals
Refreshing your knowledge of networking and security fundamentals will strengthen your understanding of the concepts covered in the course.
Browse courses on Networking
Show steps
  • Read through your class notes from previous networking and security courses.
  • Review online resources, such as articles and tutorials, on networking and security basics.
  • Complete a few practice exercises or quizzes to test your understanding.
Explore Microsoft Sentinel Simulations
Microsoft Sentinel simulations provide a hands-on environment to practice using the SIEM capabilities covered in the course.
Browse courses on Microsoft Sentinel
Show steps
  • Sign up for a free Microsoft Sentinel trial account.
  • Follow the guided tutorials to set up and configure Sentinel.
  • Run simulations to practice detecting and responding to security incidents.
Eight other activities
Expand to see all activities and additional details
Show all 11 activities
Discuss Azure Security Best Practices
Engaging in discussions with peers will provide you with diverse perspectives and deepen your understanding of best practices for securing Azure resources.
Show steps
  • Join an online forum or community dedicated to Azure security.
  • Initiate or participate in discussions about Azure security best practices.
  • Share your knowledge and experiences with other members.
Configure Azure Security settings
Practice working with the different security settings in Azure to gain a hands-on understanding of the security features available.
Show steps
  • Enable Azure Monitor
  • Deploy Microsoft Sentinel in your environment
  • Apply Azure Security benchmark
Configure Azure Firewall Rules
Practicing the configuration of Azure Firewall rules will solidify your understanding of how to protect your Azure resources from unauthorized access.
Browse courses on Azure Firewall
Show steps
  • Create a new virtual network and subnet in Azure.
  • Create an Azure Firewall and configure rules to allow or deny traffic.
  • Test your firewall rules by simulating traffic from different sources.
Follow Microsoft Cloud Security Tutorials
Expand your knowledge of cloud security by following the Microsoft Cloud Security Tutorials which provide a guided learning experience.
Browse courses on Azure Security
Show steps
  • Choose a tutorial that interests you
  • Follow the step-by-step instructions
Develop a Cloud Security Incident Response Plan
Creating a Cloud Security Incident Response Plan will reinforce your understanding of the steps involved in responding to and mitigating security incidents.
Browse courses on Incident Response
Show steps
  • Gather input from stakeholders to identify potential security threats and risks.
  • Develop a step-by-step plan for responding to different types of security incidents.
  • Define roles and responsibilities for each member of the incident response team.
  • Test your plan through simulations or exercises.
Participate in Azure Security Workshop
Participate in an Azure Security Workshop to get hands-on experience with Azure Security features and best practices.
Browse courses on Cloud Security
Show steps
  • Find an Azure Security Workshop
  • Register for the workshop
  • Attend the workshop
  • Complete the hands-on exercises
Develop a Security Plan
Create a security plan to put your theoretical knowledge into practice and apply it to a real-world scenario.
Browse courses on Cloud Security
Show steps
  • Identify your security goals and objectives
  • Conduct a security risk assessment
  • Develop security policies and procedures
  • Implement and monitor your security plan
Contribute to Open Source Security Projects
Get involved in open source security projects to contribute to the community and gain valuable experience.
Browse courses on Open Source Security
Show steps
  • Find an open source security project to contribute to
  • Review the project documentation
  • Identify an area where you can contribute
  • Submit a pull request

Career center

Learners who complete Cybersecurity Solutions and Microsoft Defender will develop knowledge and skills that may be useful to these careers:
Database Security Engineer
Database Security Engineers design, implement, and maintain security measures for databases. They work with other IT professionals to identify and mitigate security risks. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Database Security Engineers gain a better understanding of the latest security threats and trends.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze security systems to detect and respond to security breaches. They work with other IT professionals to investigate security incidents and implement security measures. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Cybersecurity Analysts gain a better understanding of the latest security threats and trends.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for an organization's computer networks. They work with other IT professionals to identify and mitigate security risks. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Network Security Engineers gain a better understanding of the latest security threats and trends.
Security Manager
Security Managers oversee the security of an organization's computer networks and systems. They work with other IT professionals to develop and implement security policies and procedures. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Security Managers gain a better understanding of the latest security threats and trends.
Security Operations Analyst
Security Operations Analysts monitor and analyze security systems to detect and respond to security breaches. They work with other IT professionals to investigate security incidents and implement security measures. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Security Operations Analysts gain a better understanding of the latest security threats and trends.
Application Security Engineer
Application Security Engineers design, implement, and maintain security measures for software applications. They work with other IT professionals to identify and mitigate security risks. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Application Security Engineers gain a better understanding of the latest security threats and trends.
Incident Responder
Incident Responders investigate and respond to security breaches. They work with other IT professionals to contain the damage caused by security breaches and restore normal operations. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Incident Responders gain a better understanding of the latest security threats and trends.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. They work with other IT professionals to identify and mitigate security risks. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Cybersecurity Engineers gain a better understanding of the latest security threats and trends.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security measures for cloud-based systems. They work with other IT professionals to ensure that cloud-based systems are secure and compliant with regulations. This course may be useful in providing a foundation in cloud security concepts, including Azure security, threat protection, and security management. The course can help Cloud Security Engineers gain a better understanding of the latest cloud security threats and trends.
Penetration Tester
Penetration Testers assess the security of computer networks and systems by simulating attacks. They identify vulnerabilities that could be exploited by attackers and recommend ways to mitigate those vulnerabilities. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Penetration Testers gain a better understanding of the latest security threats and trends.
Malware Analyst
Malware Analysts research and analyze malware to identify its capabilities and how to protect against it. They work with other IT professionals to develop and implement security measures to protect against malware. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Malware Analysts gain a better understanding of the latest malware threats and trends.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze information about security threats to identify patterns and trends. They work with other IT professionals to develop and implement security measures to protect against threats. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Threat Intelligence Analysts gain a better understanding of the latest security threats and trends.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They work with clients to identify and mitigate security risks. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Security Consultants gain a better understanding of the latest security threats and trends.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems to detect and respond to security breaches. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Information Security Analysts stay up-to-date on the latest security threats and trends.
Security Architect
Security Architects design, implement, and maintain an organization's security infrastructure. They work with other IT professionals to identify and mitigate security risks. This course may be useful in providing a foundation in cybersecurity concepts, including cloud security, threat protection, and security management. The course can help Security Architects gain a better understanding of the latest security threats and trends.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity Solutions and Microsoft Defender.
Provides comprehensive coverage of the CISSP certification. Covers topics such as security assessment, risk management, and incident response.
Provides a comprehensive guide to security engineering. It covers the key concepts and techniques for designing and building secure distributed systems.
Provides a comprehensive overview of the Security+ certification. Covers topics such as network security, cloud security, and incident response.
Provides a strong foundation in network security. Covers topics such as network threats, vulnerabilities, and countermeasures. Offers practical guidance on implementing and managing network security solutions.
Provides a comprehensive guide to malware analysis. It covers the key techniques and tools for analyzing malware, and provides practical guidance on how to protect your systems from malware.
Provides a practical introduction to ethical hacking techniques. Covers topics such as penetration testing, vulnerability assessment, and exploitation.
Provides a comprehensive overview of cloud computing security. It covers the key concepts, threats, and best practices for securing cloud computing environments.
Provides a comprehensive guide to hacking and securing Microsoft Windows systems. It covers the key vulnerabilities and exploits, and provides best practices for protecting your systems from attack.
Provides a comprehensive overview of cybersecurity for beginners. It covers the key concepts, threats, and best practices for protecting your systems and data from cyberattacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybersecurity Solutions and Microsoft Defender.
Microsoft SC-900 Exam Preparation and Practice
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Cybersecurity Management and Compliance
Most relevant
Cybersecurity Threat Vectors and Mitigation
Most relevant
Introduction to the Microsoft Security, Compliance, and...
Most relevant
Manage Security Operations
Most relevant
Cybersecurity Identity and Access Solutions using Azure AD
Most relevant
Mitigate Threats Using Microsoft Defender
Most relevant
Introduction to Networking and Cloud Computing
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser