Cybersecurity Threat Vectors and Mitigation
Instructor: Microsoft
Beginner Level • 1 week at 10 hours a week • Flexible Schedule
What You'll Learn
- Gain a comprehensive understanding of the constantly evolving world of cyber threats, including the types of attacks and vulnerabilities that exist.
- Explore different encryption algorithms and their various applications, as well as the strengths and weaknesses of each type.
- Gain an understanding of key concepts in security and compliance, such as risk assessment, defense models, and regulatory requirements.
Skills You'll Gain
Data Security
Authentications
Identity and Access Management
Active Directory
Threat Detection
Network Security
Security Strategy
Firewall
Cybersecurity
Cryptography
Authorization (Computing)
Cyber Attacks
Multi-Factor Authentication
Threat Management
Encryption
Shareable Certificate
Earn a shareable certificate to add to your LinkedIn profile
Outcomes
-
Learn new concepts from industry experts
-
Gain a foundational understanding of a subject or tool
-
Develop job-relevant skills with hands-on projects
-
Earn a shareable career certificate from Microsoft
There are 5 modules in this course
Dive into the world of cyber threats and attacks and get to know the active threat landscape.
Explore the cryptographic methods and standards used to protect data and secure communication.
Examine the various types of threats that can occur during data transmission, the importance of security controls in protecting against these threats, and the importance of keeping applications and devices updated to mitigate these risks.
Explore the different laws, regulations, and industry standards that organizations must adhere to in order to ensure the security of their systems and data.
Put your skills into practice by creating your own compliance strategy for the end-of-course project and reinforce your understanding of the key concepts you’ve learned.