MPP: Cybersecurity

Successfully provision and manage services in Microsoft Azure.

Log in to Enroll

Lock in your Cybersecurity Skills.

Cybersecurity threats are on the rise and now more than ever businesses need skilled team members to help prevent and mitigate breaches. This 10-course program will help you identify threats early on and minimize breach impacts.

Summary

Who takes this course

IT professionals who want to upskill in Azure

Difficulty

Intermediate

Assessment

The courses have a final assessment with re-take restrictions. Successfully completing the final assessment will enable you to redeem your certificate of completion.

Certification

The Microsoft Professional Program is completed by completing the Capstone project. There isn’t an exam to complete this track.

Completion time

109-205 hours

Curriculum

Enterprise Security Fundamentals

Summary

Length
8-16 hours
Level
Intermediate
Language
English

About this course

In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros–the red team–attacks some part or parts of a company’s security infrastructure, and an opposing group–the blue team–defends against the attack. Both teams work to strengthen a company’s defenses.

You’ll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.

What you’ll learn

After completing this course, students will be able to:

  • Describe the current enterprise security landscape
  • Define the Assume Compromise approach
  • Practice Red team versus Blue team exercises
  • Develop organizational security preparation, processes, and responses

Prerequisites

  • A understanding of the current cybersecurity ecosystem.
Threat Detection: Planning for a Secure Enterprise

Summary

Length
8-16 hours
Level
Intermediate
Language
English

About this course

By 2021, worldwide cybercrime damage is expected to reach $6 trillion—double what it cost businesses in 2015. Unapproved apps, unmanaged devices, poor password protection, and other security issues are leaving far too many organizations vulnerable to attack. And as organizations embrace digital transformation, it becomes increasingly urgent for the organization to increase control over their IT infrastructure and reduce security risks.

This course is an overview of threat detection as part of a defense in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.

What you’ll learn

After completing this course, students will be able to:

  • Describe signature-based and behavioral / heuristic detection methods
  • List the capabilities of on-premise threat detection and mitigation tools
  • Name the capabilities of hybrid and cloud threat detection and mitigation tools
  • Recognize the importance of Enterprise threat detection monitoring

Prerequisites

  • The current cybersecurity ecosystem
  • Analysis of hacks on computers and networks
  • Basic Risk Management
Planning a Security Incident Response

Summary

Length
8-16 hours
Level
Intermediate
Language
English

About this course

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

What you’ll learn

After completing this course, students will be able to:

  • Effectively prioritize the response to a security incident
  • Build a computer security incident response team (CSIRT)
  • Develop an incident response action plan
  • List appropriate post-incident activities

Prerequisites

  • A understanding of the current cybersecurity ecosystem.
Powershell Security Best Practices

Summary

Length
8-16 hours
Level
Intermediate
Language
English

About this course

This course that will teach students how to securely accomplish administrative tasks using Windows PowerShell 5.x. Students will review PowerShell fundamentals, learn Powershell operational security, and configuration management.

Students will also learn how to use administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) to configure and secure servers. This course also looks at new threats, new exploits, the ever-changing attack surface, and how to remediate them.

What you’ll learn

After completing this course, students will be able to:

  • Understand the architecture of Powershell
  • Deploy Powershell operational security
  • Analyze PowerShell Auditing and Logging
  • Enhance server management with Desired State Configuration and Just Enough Administration.
  • Analyze and debug scripts
  • Understand Powershell based exploits and their remediation.

Prerequisites

In addition to their professional experience, students should have:

  • Experience with Windows networking
  • Experience with Windows Server administration
  • Experience with using Windows PowerShell
Managing Identity

Summary

Length
8-12 hours
Level
Intermediate
Language
English

About this course

With identity as the new perimeter in today’s security landscape, it’s important to keep up on the latest ways to manage it. Identity—which defines what protocols you’re allowed to use, who you’re allowed to interact with, and what you’re allowed to do—has evolved significantly in the last few years.

In this security course, go beyond the firewall and ports, and learn practical steps and prescriptive guidance on identity management, based on proven, real-world experience from Microsoft Incident Response teams.

Start with a conceptual look at identity, explore Active Directory best practices, find out how to secure Azure Active Directory, and then get hands-on with a combination of videos, text, and hosted labs.

You will create a protective bastion host for an existing domain, configure Privilege Access Management (PAM) and Just in Time Administration (JIT), install JRE, and set up Microsoft Identity Manager. With successful course completion, you will understand the hows and whys of improving the security posture of your environment, and get started implementing and managing identity as part of your cybersecurity defense plan.

What you’ll learn

  • How identity is the new control plane, the perimeter that is replacing the firewall.
  • The recommended steps to secure Active Directory.
  • Azure Security Architecture and the Identity Federation and access solutions supported by Azure architecture.
  • How Kerberos and Privilege Attribute Certification function.

Prerequisites

  • Experience with Windows Client administration, maintenance and troubleshooting.
  • Introductory level knowledge of Active Directory
  • Be good at accessing and using simple Windows PowerShell commands.
Secure and Protect Data (3 training options available)

Security in Office 365 ( Option 1)

Summary

Length
10-20 hours
Level
Intermediate
Language
English

About this course

In Security in Office 365®, you will learn how to plan, implement, and manage the security features of Office 365 in your organization. The Security and compliance center in Office 365 offers a wide variety of security features to protect your users and data in Office 365. You will learn about the different types of threats that can target your organization and how the security features like Advanced Threat Protection, Threat Intelligence, auditing and Advanced Security Management will protect your organization’s data in Office 365.

What you’ll learn

  • Understanding threats and data breaches targeting your data.
  • Implementing the Office 365 Advanced Threat Protection.
  • Implementing using Office 365 Threat Intelligence.
  • Configuring auditing, alerting and reporting in Office 365.
  • Using Advanced Security Management in Office 365

Prerequisites

  • Understanding of cloud-based service concepts, Office 365, and its component services
  • Background knowledge in security requirements and general threats in IT communications.
Securing Data in Azure and SQL Server ( Option 2 )

Summary

Length
8-12 hours
Level
Intermediate
Language
English

About this course

Given the ever-expanding role of a SQL Server database administrator in today’s security landscape, it’s critical to know how to keep data secure.

In this course, join the experts for a look at user authentication—who the users are—and authorization—what they are allowed to do. Plus, find out about auditing system access and data encryption, to make sure your data is properly secured.

You’ll examine these topics through the lenses of various platforms, comparing what they look like in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.

This computer science course introduces features and technologies for securing databases. Topics include: Authenticating Users and Connections, Authorizing Users to Access Resources, Auditing Access to Data, and Encrypting Data. You will learn how to secure data in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.

What you’ll learn

  • How to authenticate connections and user logins
  • How to authorize users to access resources
  • How to audit access to data
  • How to encrypt data at rest and over the wire

Prerequisites

To complete the hands-on elements in this course, you will require an Azure subscription. You can sign up for a free Azure trial subscription (a valid credit card is required for verification, but you will not be charged for Azure services). Note that the free trial is not available in all regions. It is possible to complete the course and earn a certificate without completing the hands-on practices. Familiarity with database concepts and basic SQL query syntax. A willingness to learn actively and persevere when troubleshooting technical problems is essential.

Microsoft SharePoint 2016: Authentication and Security ( Option 3 )

Summary

Length
27-45 hours
Level
Intermediate
Language
English

About this course

In Microsoft SharePoint 2016 Authentication and Security, you will learn how to plan and configure a SharePoint on premise solution for a variety of authentication levels and security requirements to help protect the environment. You will also learn about the necessary hardware and software requirements and the overall methodology to SharePoint security.

What you’ll learn

  • Plan and Configure authentication based upon infrastructure, processes and methods
  • Management of permission sets
  • Plan and Configuring of platform and farm security
  • Management of User Profiles
  • Provision and configuration of Web Applications

Prerequisites

  • Knowledge of Windows Server 2012 R2 roles and features
  • Foundational knowledge of SQL Server
Windows 10 Security Features

Summary

Length
8-16 hours
Level
Intermediate
Language
English

About this course

Looking to stay ahead of the security curve? As you get to know the new security architecture and features of Windows 10—and learn to deploy them—gain the insights and knowledge you’ll need for the future.

Microsoft security engineers have hardened the operating system at every layer of the stack, reducing the attack surface with new security features that help protect against a range of threats. Join a team of experts to explore the ever-increasing levels of security within Windows 10.

You’ll start with the Windows 10 defensive stack, including bundled security features.

Configure endpoint security, review additional security tools, like Windows Information Protection and Windows Defender Exploit Guard. In this course, you’ll get practical details on built-in, end-to-end protections and support for the larger ecosystem of ISV and OEM partners.

Skill up to face down today’s security threats with hands-on virtualized lab exercises, demos, quizzes, and a final exam. The following team of recognized experts contributed to this course: Andrew Warren, Lesley Kipling, Erdal Ozkaya, Neil Carpenter, Sami Laiho, Raymond Comvalius, Seth Moore, Michiko Short, Mike Terrill, Amitai Rottem, Randy Treit.

What you’ll learn

  • The current nature of the security threat landscape
  • The new security architecture and features of Windows 10 that mitigate threats
  • Insights into the security services bundled with Windows 10 latest edition
  • Knowledge of the supporting security external infrastructure
  • The new security baseline configurable using Group Policy Objects (GPO)

Prerequisites

Students who take this training should understand:

  • Windows Client administration, maintenance, and troubleshooting
  • Windows networking technologies
  • Active Directory
  • Windows Server administration
Windows Server 2016 Security Features

Summary

Length
10-20 hours
Level
Intermediate
Language
English

About this course

Have you had a chance to explore the new and enhanced security functionalities in Windows Server 2016? In this new course authored by Orin Thomas – who literally wrote the book on Windows Server! – you’ll get a guided tour and learn to better safeguard against security breaches.

Windows Server 2016 provides layers of protection that help address both known and emerging threats. You’ll learn how it actively contributes to securing your infrastructure. See how protections were built to mitigate an array of attack vectors and to deal with the overall threat of ongoing attacks inside the datacenter.

You’ll begin with a look at the hardening of Windows Server 2016, including hardware requirements for Secure Boot and guidance on disabling system services. Explore ways to configure network security, including firewalls, and look at secure virtualization, like encryption-supported virtual machines. From there, you’ll dive into secure virtualization, threat detection, privileged identity, Desired State Configuration, and more. See demos, participate in hands-on labs, and pass the final exam, as you shore up your skills for ongoing security management.

What you’ll learn

  • The current nature of the security threat landscape
  • New security architecture and features of Windows Server 2016 that mitigate threats
  • Insights into the security services bundled with Windows Server 2016 latest edition
  • Knowledge of the supporting security external infrastructure
  • Understanding of the new security features of Hyper-V
  • Learn about Desired State Configuration (DSC)
Microsoft Azure Security Services

Understand the current nature of the security threat landscape and study the new security architecture and features of Microsoft Azure.

Summary

Length
8-16 hours
Level
Intermediate
Language
English

About this course

In this course, you will gain insights into Azure Security services to help secure your services and data within Azure.

You will learn Azure security best practice and understand the terminology, tools, and techniques for creating a secure resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune

What you’ll learn

Understanding of the following:

  • Azure security architecture overview
  • Azure Networking Security
  • Network Security Groups
  • Secure Remote Access
  • Monitoring and threat detection
  • Reference architectures
  • Learn about IaaS workload security
  • Understand the features of Azure Security Center
  • Review how Azure deals with Distributed Denial of Services (DDoS) attacks
  • Examination of Azure Anti-malware
  • Understand Microsoft Intune for Windows , iOS, and Android devices
    • MDM
    • MAM
    • Data governance with GDPR
    • AutoPilot

Prerequisites

Students who take this training should understand:

  • On premises TCP/IP networking
  • Familiar with mobile device management
  • General cloud principles
Microsoft Professional Capstone: Cybersecurity

The capstone project is offered directly by Microsoft and can only be done once per quarter: in January, April, July and October.

Enroll for the full MPP track here in the month prior to the one the capstone starts in, using the Microsoft account you used to register on Azure Academy so that your progress is synced.

To have your progress synced with Azure Academy and to be eligible for the capstone project you have to have a Certificate of Completion for each one of 9 required courses from Azure Academy.

Need help?

If you have questions about our courses, check our FAQs or get in touch with us here.