AI Academy

Introduction to Computers and Operating Systems and Security

Instructor: Microsoft Duration: 4 hours to complete
Objective 1 Identify various components of a computer system.
Objective 2 Explain the way in which computer components interact with an operating system.
Objective 3 Describe the basics of the cybersecurity landscape and various business computing environments.
Objective 4 NEW [optional] introduction to Generative AI
Computer Hardware
Information Systems Security
Operating Systems
Generative AI
Servers
Cybersecurity
Computer Systems
Patch Management
Enterprise Security
Business Software
Artificial Intelligence
Data Storage
Microsoft 365
Business Systems

Introduction to Networking and Cloud Computing

Instructor: Microsoft Duration: 2 hours to complete
Objective 1 How to set up a cloud computing environment, virtual machines and cloud services.
Objective 2 How to set up common network infrastructure and monitoring.
Objective 3 How to use network security components, approaches and mitigation.
Objective 4 How to produce a coherent expansion plan for a business enterprise to take advantage of cloud infrastructure.
Artificial Intelligence and Machine Learning (AI/ML)
Firewall
Cybersecurity
Computer Networking
Network Security
Network Protocols
Cloud Computing
Cloud Services
Virtualization and Virtual Machines
Digital Transformation
Network Infrastructure
Networking Hardware
Microsoft Azure

Cybersecurity Threat Vectors and Mitigation

Instructor: Microsoft Duration: 1 week at 10 hours a week
Objective 1 Gain a comprehensive understanding of the constantly evolving world of cyber threats, including the types of attacks and vulnerabilities that exist.
Objective 2 Explore different encryption algorithms and their various applications, as well as the strengths and weaknesses of each type.
Objective 3 Gain an understanding of key concepts in security and compliance, such as risk assessment, defense models, and regulatory requirements.
Data Security
Authentications
Identity and Access Management
Active Directory
Threat Detection
Network Security
Security Strategy
Firewall
Cybersecurity
Cryptography
Authorization (Computing)
Cyber Attacks
Multi-Factor Authentication
Threat Management
Encryption

Cybersecurity Identity and Access Solutions using Azure AD

Instructor: Microsoft Duration: Approx. 23 hours
Authentications
Single Sign-On (SSO)
Azure Active Directory
Authorization (Computing)
Software As A Service
Cloud Services
Identity and Access Management
Microsoft Azure
Active Directory
Multi-Factor Authentication
Role-Based Access Control (RBAC)
User Accounts

Cybersecurity Solutions and Microsoft Defender

Instructor: Microsoft Duration: Approx. 23 hours
Endpoint Security
Threat Management
Threat Detection
Network Security
Distributed Denial-Of-Service (DDoS) Attacks
Cyber Security Policies
Firewall
Security Controls
Cloud Security
Security Information and Event Management (SIEM)
Encryption
Microsoft Azure
Malware Protection
Identity and Access Management
Virtual Machines
Cybersecurity

Cybersecurity Tools and Technologies

Instructor: Microsoft Duration: 3 hours to complete
Objective 1 How to work with the tools associated with security testing within a cloud environment.
Objective 2 How to execute penetration testing on a cloud platform.
Objective 3 How to create a penetration test plan.
Vulnerability Management
Network Security
Cybersecurity
Firewall
Cloud Security
Intrusion Detection and Prevention
Virtual Private Networks (VPN)
Microsoft Azure
Penetration Testing
System Testing
Security Testing
Vulnerability Scanning

Cybersecurity Management and Compliance

Instructor: Microsoft Duration: Approx. 20 hours
Objective 1 Learn about data and record management, Information security, standards and policy formation, and implementation.
Objective 2 Explore cloud adoption frameworks and regulatory compliance frameworks.
Objective 3 Learn how to use available tools for compliance management.
General Data Protection Regulation (GDPR)
Security Management
Information Assurance
Data Governance
Information Privacy
Data Security
Cloud Computing
Data Management
Cloud Security
Records Management
Cloud Computing Architecture
Microsoft Azure
Cyber Security Policies
Disaster Recovery
Security Controls

Advanced Cybersecurity Concepts and Capstone Project

Instructor: Microsoft Duration: 9 hours to complete
Objective 1 How to manage and reduce the risk of threats to an organization or system.
Objective 2 How to mitigate common cyber threats using various tools and strategies.
Objective 3 How to develop strategies to protect data and applications from unauthorized access.
Cybersecurity
Cyber Security Strategy
Microsoft Azure
Security Strategy
Cloud Security
Identity and Access Management
Secure Coding
Internet Of Things
Vulnerability Assessments
Network Security
Application Security
Threat Management
Threat Modeling
Threat Detection
Security Controls
MITRE ATT&CK Framework

Microsoft SC-900 Exam Preparation and Practice

Instructor: Microsoft Duration: Approx. 26 hours
Objective 1 Describe the various security, compliance, and identity concepts.
Objective 2 Describe the capabilities of Microsoft’s identity and access management solutions.
Objective 3 Describe the capabilities of Microsoft security and compliance solutions.
Objective 4 NEW [optional] introduction to Generative AI
Security Controls
Threat Detection
Authentications
Cloud Security
Data Governance
Generative AI
Azure Active Directory
Network Security
Data Security
Security Information and Event Management (SIEM)
System Monitoring
Scenario Testing
Identity and Access Management
Multi-Factor Authentication
Role-Based Access Control (RBAC)
Active Directory