Instructor: Microsoft Duration:1 week at 10 hours a week
Objective 1Gain a comprehensive understanding of the constantly evolving world of cyber threats, including the types of attacks and vulnerabilities that exist.
Objective 2Explore different encryption algorithms and their various applications, as well as the strengths and weaknesses of each type.
Objective 3Gain an understanding of key concepts in security and compliance, such as risk assessment, defense models, and regulatory requirements.
Data Security
Authentications
Identity and Access Management
Active Directory
Threat Detection
Network Security
Security Strategy
Firewall
Cybersecurity
Cryptography
Authorization (Computing)
Cyber Attacks
Multi-Factor Authentication
Threat Management
Encryption
Cybersecurity Identity and Access Solutions using Azure AD