In this course, you’ll learn about the types of cloud security policies that protect against DDoS Attacks, Firewall Breaches, and Unauthorized Access. Explore tools like MS Defender for cloud, security information and event management (SICM) and security orchestration, automation, and response (SOAR).

推荐体验
推荐体验
初级
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
推荐体验
推荐体验
初级
You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
您将学到什么
Explain cloud-based security concepts
Discuss security information and event management (SIEM)
Define 365 Defender capabilities
您将获得的技能
- Security Controls
- Encryption
- Network Security
- Scenario Testing
- Cyber Security Policies
- Threat Management
- Event Management
- Identity and Access Management
- Threat Detection
- Malware Protection
- Cyber Attacks
- Cybersecurity
- Security Information and Event Management (SIEM)
- Cloud Security
- Distributed Denial-Of-Service (DDoS) Attacks
要了解的详细信息

添加到您的领英档案
20 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
This module provides a comprehensive overview of Azure networking and security. It covers essential topics such as Azure's built-in security measures, recommended practices for securing Azure resources, and protection against Distributed Denial of Service (DDoS) attacks, firewall breaches, and unauthorized access. You will gain a deep understanding of how to secure Azure resources against malicious threats and gain insight into just-in-time access and encryption.
涵盖的内容
17个视频21篇阅读材料7个作业1个讨论话题
17个视频• 总计80分钟
- Introduction to the course• 4分钟
- Azure DDoS Protection overview• 6分钟
- Azure DDoS Protection configuration• 5分钟
- Azure DDoS Protection features and best practices• 6分钟
- Azure and virtual machines• 3分钟
- Spinning up a virtual machine• 3分钟
- Azure networking• 7分钟
- Introduction to Azure Firewall• 5分钟
- Azure Firewall Standard and Basic• 4分钟
- Web Application Firewall• 4分钟
- Azure Firewall deployment• 3分钟
- Azure Firewall rule configuration• 5分钟
- Hackers and firewalls• 4分钟
- Just-in-time access (JIT)• 4分钟
- Key management and encryption• 6分钟
- Implementing just-in-time access• 3分钟
- Module summary: Azure basic security capabilities• 7分钟
21篇阅读材料• 总计250分钟
- Course syllabus• 10分钟
- How to be successful in this course• 10分钟
- Microsoft Azure Active Directory name change• 10分钟
- Clean up resources • 10分钟
- How to open an image in a new tab• 10分钟
- Additional resources: Azure basic security capabilities• 5分钟
- Azure DDoS Network Protection in detail• 10分钟
- Exercise: Create a Windows virtual machine in the Azure portal• 30分钟
- Exemplar: Create a Windows virtual machine in the Azure portal• 10分钟
- Clean up resources • 10分钟
- Additional Resources: DDoS Protection• 5分钟
- Azure Firewall in depth• 10分钟
- Activity: Resource group & VNet creation• 10分钟
- Exercise: Configure Azure Firewall• 30分钟
- Exemplar: Configure Azure Firewall• 10分钟
- Additional resources: Azure Firewall protection• 5分钟
- JIT and encryption• 10分钟
- Best practices for securing Azure resources• 10分钟
- Exercise: Secure ports with JIT• 30分钟
- Exemplar: Secure ports with JIT• 10分钟
- Additional resources: Just-in-time access and encryption• 5分钟
7个作业• 总计125分钟
- Self-review: Create a Windows virtual machine in the Azure portal• 10分钟
- Knowledge check: DDoS Protection• 15分钟
- Self-review: Configure Azure Firewall• 10分钟
- Knowledge check: Azure Firewall protection• 15分钟
- Knowledge check: Just-in-time access and encryption• 15分钟
- Self-review: Secure ports with JIT• 10分钟
- Module quiz: Azure basic security capabilities• 50分钟
1个讨论话题• 总计10分钟
- What do you hope to learn?• 10分钟
This module provides an overview of cloud security and security management in Azure. It covers key concepts such as Azure security standards, use of the Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities of Microsoft Sentinel. On completion of this module, you will have a thorough understanding of the security features available in Azure and best practices for protecting Azure resources, as well as Azure security standards and compliance.
涵盖的内容
15个视频12篇阅读材料6个作业
15个视频• 总计71分钟
- Overview of cloud security• 5分钟
- Advanced cloud security• 4分钟
- Azure security• 6分钟
- Azure security best practices• 4分钟
- Microsoft Defender interface• 5分钟
- Azure Bastion• 6分钟
- Bastion and virtual machines• 4分钟
- Introduction to Azure policies• 6分钟
- Custom policy definition• 4分钟
- Azure Blueprints• 3分钟
- SIEM• 4分钟
- Microsoft Sentinel• 4分钟
- Microsoft Sentinel data connectors• 6分钟
- Introducing SOAR• 5分钟
- Module summary: Security management in Azure• 7分钟
12篇阅读材料• 总计120分钟
- Azure security in depth• 10分钟
- Additional resources: Introduction to cloud security• 5分钟
- Exercise: Shield virtual machines using Bastion• 30分钟
- Exemplar: Shield virtual machines using Bastion• 10分钟
- Additional resources: Virtual security solutions• 5分钟
- Managing Azure policies• 10分钟
- Working with policy definitions in Azure• 10分钟
- Types of policies• 10分钟
- Additional resources: Azure standards and policies• 5分钟
- Expanding on Sentinel• 10分钟
- SIEM and SOAR use case• 10分钟
- Additional resources: Introduction to SIEM and SOAR• 5分钟
6个作业• 总计123分钟
- Knowledge check: Introduction to cloud security• 15分钟
- Self-review: Shield virtual machines using Bastion• 10分钟
- Knowledge check: Virtual security solutions• 18分钟
- Knowledge check: Azure Standards and policies• 15分钟
- Knowledge check: Introduction to SIEM and SOAR• 15分钟
- Module quiz: Security management in Azure• 50分钟
This module covers the different threat protection services available in Microsoft 365, including Azure Defender, Azure Advanced Threat Protection, and Azure Information Protection. The module is designed to help you understand how to protect an organization's assets from various types of threats, including malware, phishing, and identity-based attacks. The module covers key concepts such as defender services, endpoint and cloud app protection, and identity defence. It also provides best practices for implementing these threat protection services in an organization.
涵盖的内容
17个视频11篇阅读材料5个作业
17个视频• 总计94分钟
- Introduction to Defender• 7分钟
- Microsoft 365 Defender portal• 4分钟
- Microsoft 365 Defender incidents and alerts• 6分钟
- Managing users• 5分钟
- Introduction to endpoint security• 7分钟
- Endpoint modernization• 6分钟
- Deployment methods for WaaS and Microsoft 365 Apps• 6分钟
- Defender portal for endpoint capabilities and services• 5分钟
- Threat technologies• 6分钟
- Endpoint encryption• 5分钟
- Introduction to identity defense• 7分钟
- Microsoft Purview• 6分钟
- Azure Active Directory Identity Protection• 6分钟
- Microsoft Defender for Identity• 4分钟
- Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Preparation• 5分钟
- Identity theft• 3分钟
- Module Summary: Microsoft 365 Defender threat protection• 6分钟
11篇阅读材料• 总计115分钟
- Working with Microsoft 365 Defender portal• 10分钟
- Microsoft Defender use-case: Office 365• 10分钟
- Exercise: Implement Microsoft Sentinel with Microsoft Defender data connectors• 30分钟
- Exemplar: Implement Microsoft Sentinel with Microsoft Defender data connectors• 10分钟
- Additional resources: Defender services• 5分钟
- Defender services in depth• 10分钟
- Next gen antivirus and endpoint response• 10分钟
- Additional resources: Endpoints and cloud apps security• 5分钟
- Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Deployment• 10分钟
- Identity Protection in Microsoft 365• 10分钟
- Additional resources: Identity defense• 5分钟
5个作业• 总计105分钟
- Self-Review: Implement Microsoft Sentinel with Microsoft Defender data connectors• 10分钟
- Knowledge check: Defender services• 15分钟
- Knowledge check: Endpoints and cloud apps security• 15分钟
- Knowledge check: Identity defense• 15分钟
- Module quiz: Microsoft 365 Defender threat protection• 50分钟
In this module, you will be assessed on the key skills covered in the course. You will gain a real-life example of demonstrating protection strategies by completing a scenario-based project. You'll also complete a graded course quiz that will test your knowledge of all the topics you covered in this course. Lastly, you will get the opportunity to reflect on your learning and explore the next steps in your cybersecurity journey.
涵盖的内容
2个视频5篇阅读材料2个作业1个讨论话题
2个视频• 总计10分钟
- Course Recap: Security solutions• 6分钟
- Congratulations• 4分钟
5篇阅读材料• 总计70分钟
- About the final project and assessment: Cybersecurity Solutions and Microsoft Defender• 10分钟
- Exercise: Securing virtual machines • 30分钟
- Exemplar: Securing virtual machines• 10分钟
- Clean up resources• 10分钟
- Next steps• 10分钟
2个作业• 总计225分钟
- Self-review: Securing virtual machines• 75分钟
- Course Quiz: Cybersecurity solutions and Microsoft Defender• 150分钟
1个讨论话题• 总计10分钟
- Reflect on learning• 10分钟
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方

提供方

Our goal at Microsoft is to empower every individual and organization on the planet to achieve more. In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
从 Computer Security and Networks 浏览更多内容

课程

课程

课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
This program is for you:
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,


