This course focuses on designing end-to-end cybersecurity strategies using Microsoft technologies, preparing learners to operate at an architect level. It emphasizes aligning security solutions with business goals while addressing modern cloud, identity, and data protection challenges faced by enterprises.

您将学到什么
Design a zero-trust strategy and architecture
Evaluate governance, risk, and compliance (GRC) strategies
Apply encryption standards for data protection
您将获得的技能
- Cyber Security Policies
- Cloud Security
- Threat Modeling
- Regulatory Compliance
- Data Security
- Cyber Threat Intelligence
- Security Requirements Analysis
- Cybersecurity
- API Design
- Infrastructure Security
- Endpoint Security
- Cyber Security Strategy
- Identity and Access Management
- Security Information and Event Management (SIEM)
- Application Security
- IT Security Architecture
- Compliance Management
- Zero Trust Network Access
- Security Controls
您将学习的工具
要了解的详细信息

添加到您的领英档案
March 2026
10 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有10个模块
In this section, we explore security strategies for business resiliency, threat analysis in cloud environments, and BCDR planning for hybrid and multi-cloud setups.
涵盖的内容
2个视频9篇阅读材料1个作业
In this section, we explore how to build a security strategy using MCRA and MCSB, translate business goals into security requirements, and design resiliency strategies for ransomware attacks.
涵盖的内容
1个视频5篇阅读材料1个作业
In this section, we explore designing logging and auditing strategies, implementing SIEM and SOAR solutions, and evaluating workflows for threat intelligence sharing in cloud environments.
涵盖的内容
1个视频4篇阅读材料1个作业
In this section, we will learn to identity security strategies for cloud, hybrid, and multi-cloud environments with a focus on zero trust and access control.
涵盖的内容
1个视频6篇阅读材料1个作业
In this section, we will learn designing regulatory compliance strategies using Azure Policy and Microsoft Defender for Cloud.
涵盖的内容
1个视频3篇阅读材料1个作业
In this section, we will learn to evaluate cloud security posture using benchmarks, Defender for Cloud, and EASM to identify and mitigate risks.
涵盖的内容
1个视频4篇阅读材料1个作业
In this section, we explore strategies for securing server and client endpoints, focusing on security baselines, AD DS protection, and managing secrets and access using Microsoft tools.
涵盖的内容
1个视频4篇阅读材料1个作业
In this section, we explore strategies for securing SaaS, PaaS, and IaaS, focusing on security baselines, cloud storage, containers, and IoT workloads with an emphasis on collaboration and defined roles.
涵盖的内容
1个视频5篇阅读材料1个作业
In this section, we will learn securing applications, including threat prioritization, API security, and onboarding standards.
涵盖的内容
1个视频3篇阅读材料1个作业
In this section, we will learn NIST RMF for risk assessment and encryption strategies for data at rest and in motion to enhance security and compliance.
涵盖的内容
1个视频5篇阅读材料1个作业
位教师

提供方
从 Security 浏览更多内容
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
更多问题
提供助学金,







