OnlyTrick

Coursera, ,

Microsoft Cybersecurity Analyst Professional Certificate

Microsoft Cybersecurity Analyst Professional Certificate

Start mastering Cybersecurity today with “Microsoft Cybersecurity Analyst Professional Certificate Free” and Launch your career as a cybersecurity analyst. No prior experience required to get started.

What you’ll learn
✅ Understand the cybersecurity landscape and learn core concepts foundational to security, compliance, and identity solutions.
✅Understand the vulnerabilities of an organizations network and mitigate attacks on network infrastructures to protect data.
✅Develop and implement threat mitigation strategies by applying effective cybersecurity measures within an Azure environment.
✅Demonstrate your new skills with a capstone project and prepare for the industry-recognized Microsoft SC-900 Certification exam.

 

Course Name Original Source Category Publisher
Microsoft Cybersecurity Analyst Professional Certificate https://www.coursera.org/professional-certificates/microsoft-cybersecurity-analyst Cybersecurity Coursera

TIME STAMP

❶ INTRODUCTION TO COMPUTERS AND OPERATING SYSTEMS

Introduction to Computers and Operating systems
00:00 Course Introduction
14:13 Threat Landscape
23:35 Introduction to Computing devices
34:32 Operating systems

Enterprise Systems and Security
49:21 Servers Storage and Backups
1:00:36 Computing Environments
1:11:46 Maintenance and Patches

Business Systems Applications
1:26:27 Business Software
1:36:15 Email Apps
1:47:00 Storage Solutions

Computers Operating Systems and Security
2:09:26 Final Course assessment
2:13:54 Course Wrap up

➋ INTRODUCTION TO NETWORKING AND CLOUD COMPUTING

Computer Networking
2:16:46 Course introduction
2:21:55 Types and Topologies
2:32:52 IP Addressing

Network Devices and Protocols
2:51:22 Infrastructure
3:03:24 Network Communication Models
3:16:00 Protocols and ports
3:26:40 Network Traffic monitoring

Network Security
3:41:09 Network Client and Server
3:52:19 Authentication and Authorization
4:08:09 Firewalls and Security tools

Cloud Computing and Networking
4:37:44 Introduction to Azure
4:46:34 Virtual Environments
4:59:47 Cloud Services
5:14:33 X as A Service

Networking and Cloud Computing
5:30:02 Final Course Project and Assessment
5:37:35 Course wrap up

➌ CYBERSECURITY THREAT VECTORS AND MITIGATION

Threats and attacts
5:40:33 Course introduction
5:44:05 Epic attacts
5:53:59 Theats vectors
6:11:24 Mitigation Strategies

Cryptography
6:26:24 Encryption
6:33:41 Public Private key and hashing
6:49:15 Digital Signing and certificates
7:04:27 Authentication and Authorization

Network and Device Based threats
7:19:42 Data Transmission
7:35:49 Security controls
7:50:47 Application Updates

Security Compliance and Identity
8:06:06 Security and Compaince Concepts
8:19:41 ID and Active Directory
8:34:46 Defence Models

Cybersecurity Threat Vectors and Mitigation
8:49:23 Final Course Project and Assessment
8:55:16 Course Wrap up

➍CYBERSECURITY IDENTITY AND ACCESS WITH AZURE AD

Identity Services
8:58:01 Course introduction
9:02:53 Azure Active Directory
9:24:20 Azure Active Directory and Editions
9:36:51 Azure Active Directory Identity types

Active Directory Authentication
9:58:09 Authentication Methods
10:31:30 Multi-Factor Authentication
10:51:25 Password Protection and Resetting

Active Directory Access Protection and Governance Management
11:17:11 Condition Access
11:33:46 Roles and Role Based Access
11:45:44 Identity Governance
12:06:51 Privileged Identity management and Protection

Identity and Access Solutions
12:26:15 Final Course Project Assessment
12:33:24 Course Wrap up

➎CYBERSECURITY SOLUTIONS AND MICROSOFT DEFENDER

Azure Basics Security Capabilities
12:36:56 Course Introduction
12:41:24 Distributed Denial of Service DDOS Protection
13:04:21 Azure Firewall Protection
13:36:11 Just In Time Access and Encryption

Security Management in Azure
13:56:32 Introduction to Cloud Security
14:14:46 Virtual Security Solutions
14:30:03 Azure Standards and Policies
14:42:48 Introduction to SIEM and SOAR

Microsoft 365 Defender Threat Protection
15:08:04 Defender Services
15:31:47 Endpoints and Cloud Apps Security
16:05:11 Identity Defence

Graded Assessment and Course Wrap up
16:42:45 Final Project and Assessment Cybersecurity Solutions and Microsoft Defender
16:48:18 Course Wrap up

➏CYBERSECURITY TOOLS AND TECHNOLOGIES

Penetration testing
16:52:36 Course Introduction
16:56:34 Defence and Offense red versus blue
17:14:30 Testing Stages
17:49:38 Types of Penetration Test

Preventative Tools
18:13:29 Intrusive Detection and Prevention Systems
18:42:23 Designing Firewalls Solutions in Azure
18:58:55 Azure virtual Private Network VPN
19:37:35 Vulnerability Management

Azure Penetration Testing
20:08:57 The Command LIne and Windows Powershell
20:34:49 Setting up Azure for Testing
21:13:43 Running the Test

Final Project and Assessment Cybersecurity Tools and Technologies
21:42:15 Final Project and Assessment Cybersecurity Tools and Techonologies
21:48:14 Wrap up Cybersecurity tools and technologies

➐CYBERSECURITY MANAGEMENT AND COMPILIANCE

Security Administration
21:52:43 Course Introduction
21:56:54 Cloud Security Planning
22:29:28 Cloud adoption framework
22:44:54 Data Management and Administration
23:08:13 Availability and Continuity

Compliance Solutions
23:58:47 Compliance Management
24:46:38 Insider Risk
25:14:34 Information Protection and Data lifecycle

Laws and Standards
25:47:59 Information Security Management Act ISMA
26:16:26 So International Organizing For Standardization Standards
26:37:44 Control Objectives for Information and related Technologies Cobit

Final Project and Assessment Cybersecurity Managent and Compliance
27:05:27 Final Project and Assessment Cybersecurity Managent and Compliance
27:12:41 Course Wrap up Cybersecurity Management and Compliance

➑ ADVANCED CYBERSECURITY CONCEPTS AND CAPSTONE PROJECT

Threat Modeling
27:17:09 Course Introduction
27:20:53 Introduction to Threats Modeling
27:48:26 Threat Modeling Strategies
28:26:47 Azure and threat Modeling

Advanced Threats and Mitigation
28:56:55 Susceptible infrastructure and Types of attack
29:32:02 IOT Internet of things and common attacks

Security Conscious Modeling
30:23:15 Entry Point and Associated Risks
30:45:36 Secure network Design with Defence in Depth
31:13:19 Mitigation Strategies

Capstone Project
31:53:02 Capstone Project
32:05:21 Wrap up Advanced Cybersecurity Concepts and Capstone

➒ MICROSOFT SC 900 EXAM PREPARATION AND PRACTICE

Concepts of Security Compliance and Identity
32:09:39 Welcome to the Course
32:15:46 Microsoft Certification
32:20:06 Security and Compliance Concepts
32:50:46 Identity Concepts

The Capabilities of Microsoft Azure Active Directory
33:29:52 Authentication Capabilities of Azure AD
33:45:29 Access Management Capabilities of Azure AD
34:01:09 Identity Protection and Governance Capablities of Azure AD

Microsoft Security Solutions
34:19:19 Basic Security Capabilities in Azure
34:41:11 Azure Security Management
35:03:03 Security Capabilities of Microsoft Sentinel
35:18:31 Threat protection with Microsoft 365 Defender

The Capablities of Microsoft Compliance Solutions
35:49:49 Microsoft Service Trust Portal Privacy Principles
36:03:00 Compliance Management Capabilities of Microsoft Purview
36:20:57 Information Protection and Data Lifecycle Managent Capabilities of Microsoft

Risk and Resource Governance
36:49:00 Describe insider risk capabilities in Microsoft Purview
37:07:50 Resource governance Capablities in Azure

Practice Exam
37:29:44 SC-900 Practice-Exam
37:35:37 Course Wrap up

Add your first comment to this post

comment_icon
Scroll to Top