Microsoft Professional Program (MPP): Cybersecurity

Microsoft Professional Program (MPP): Cybersecurity

Program

Microsoft MPP-CS

From USD 790.00

To USD 1,088.00

Lock in your Cybersecurity Skills.

Abstract


As the number of cyberthreats continues to increase, the demand for skilled cyber professionals is also growing. Become knowledgeable on the wide set of skills that will allow you to start or grow a cybersecurity career.


What you'll learn


  • Protect. Describe the current threat landscape. Identify and prioritize the key enterprise systems that require protection. Demonstrate hardening tactics to make a breach more difficult and costly for a hacker to execute.
  • Detect breaches early. Classify the extent of a system breach.
  • Respond to a security incident effectively, while minimizing business impact. Report technical details and business impact of incident to all relevant stakeholders.

To be eligible to earn a certificate for completing the Microsoft Professional Program in Cybersecurity, please go to https://academy.microsoft.com/en-us/professional-program/tracks/cyber-security/ to create a Microsoft Academy account. After signing up, you’ll be able to track your progress on a personalized dashboard that updates every time you earn a verified certificate in a course from this track.


How it works


This comprehensive curriculum features courses that are presented in a suggested order that builds your skills as you advance through the courses. While the order is a suggestion you are free to take the courses in any order that you wish. Upon completing the coursework, you will be able to demonstrate what you have learned through completion of the capstone project.


Cybersecurity Professional Program - Curriculum Overview


  • Course 1: Enterprise Security Fundamentals
  • Course 2: Threat Detection: Planning for a Secure Enterprise
  • Course 3: Planning a Security Incident Response
  • Course 4: PowerShell Security Best Practices
  • Course 5: Managing Identity
  • Course 6a: Security in Office 365  |   Course 6b: Securing Data in Azure and SQL Server   |   Course 6c: Microsoft SharePoint 2016: Authentication and Security
  • Course 7: Windows 10 Security Features
  • Course 8: Windows Server 2016 Security Features
  • Course 9: Microsoft Azure Security Services
  • Course 10: Microsoft Professional Capstone: Cybersecurity (will be released 1/1/2019)
Write Your Own Review

Only registered users can write reviews. Please Sign in or create an account

Introduction To Cybersecurity

Enterprise Security Fundamentals

Enterprise Security Fundamentals

Microsoft INF246x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

This course is part of the Microsoft Professional Program in Cybersecurity.

According to the Wall Street Journal, “All IT Jobs Are Cybersecurity Jobs Now.”

In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros--the red team--attacks some part or parts of a company’s security infrastructure, and an opposing group--the blue team--defends against the attack. Both teams work to strengthen a company’s defenses.

You'll learn how both the red and blue teams help the business attain a higher level of security, something the security industry is now calling the Purple team.

Detect Security Breaches Early

Threat Detection: Planning for a Secure Enterprise

Threat Detection: Planning for a Secure Enterprise

Microsoft INF249x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

By 2021, worldwide cybercrime damage is expected to reach $6 trillion—double what it cost businesses in 2015. Unapproved apps, unmanaged devices, poor password protection, and other security issues are leaving far too many organizations vulnerable to attack. And as organizations embrace digital transformation, it becomes increasingly urgent for the organization to increase control over their IT infrastructure and reduce security risks.

This course is an overview of threat detection as part of a defense in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.

Respond to Security Incidents

Planning a Security Incident Response

Planning a Security Incident Response

Microsoft INF250x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

This course is part of the Microsoft Professional Program in Cybersecurity.

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

Enhance Security Using Code

Powershell Security Best Practices

Powershell Security Best Practices

Microsoft INF251x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

This course that will teach students how to securely accomplish administrative tasks using Windows PowerShell 5.x. Students will review PowerShell fundamentals, learn Powershell operational security, and configuration management.

Students will also learn how to use administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) to configure and secure servers. This course also looks at new threats, new exploits, the ever-changing attack surface, and how to remediate them.

Manage Identity

Managing Identity

Managing Identity

Microsoft INF253x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

This course is part of the Microsoft Professional Program in Cybersecurity.

With identity as the new perimeter in today’s security landscape, it’s important to keep up on the latest ways to manage it. Identity—which defines what protocols you’re allowed to use, who you’re allowed to interact with, and what you’re allowed to do—has evolved significantly in the last few years.

In this security course, go beyond the firewall and ports, and learn practical steps and prescriptive guidance on identity management, based on proven, real-world experience from Microsoft Incident Response teams.

Start with a conceptual look at identity, explore Active Directory best practices, find out how to secure Azure Active Directory, and then get hands-on with a combination of videos, text, and hosted labs.

You will create a protective bastion host for an existing domain, configure Privilege Access Management (PAM) and Just in Time Administration (JIT), install JRE, and set up Microsoft Identity Manager. With successful course completion, you will understand the hows and whys of improving the security posture of your environment, and get started implementing and managing identity as part of your cybersecurity defense plan.

Secure and Protect Data (choose one)

Security in Office 365

Security in Office 365

Microsoft CLD245x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

In Security in Office 365®, you will learn how to plan, implement, and manage the security features of Office 365 in your organization. The Security and compliance center in Office 365 offers a wide variety of security features to protect your users and data in Office 365. You will learn about the different types of threats that can target your organization and how the security features like Advanced Threat Protection, Threat Intelligence, auditing and Advanced Security Management will protect your organization’s data in Office 365.

Securing Data in Azure and SQL Server

Securing Data in Azure and SQL Server

Microsoft DAT243x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

Given the ever-expanding role of a SQL Server database administrator in today’s security landscape, it’s critical to know how to keep data secure.

In this course, join the experts for a look at user authentication—who the users are—and authorization—what they are allowed to do. Plus, find out about auditing system access and data encryption, to make sure your data is properly secured.

You’ll examine these topics through the lenses of various platforms, comparing what they look like in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.

This computer science course introduces features and technologies for securing databases. Topics include: Authenticating Users and Connections, Authorizing Users to Access Resources, Auditing Access to Data, and Encrypting Data. You will learn how to secure data in SQL Server 2016, SQL Server v.Next on Linux, and Azure SQL Databases.

Microsoft SharePoint 2016: Authentication and Security

Microsoft SharePoint 2016: Authentication and Security

Microsoft CLD211.2x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

This course is part of the Microsoft Professional Program in Cybersecurity.

In Microsoft SharePoint 2016 Authentication and Security, you will learn how to plan and configure a SharePoint on premise solution for a variety of authentication levels and security requirements to help protect the environment. You will also learn about the necessary hardware and software requirements and the overall methodology to SharePoint security.

This course is part of the Microsoft SharePoint Server 2016 XSeries.

Secure Operating Systems

Windows 10 Security Features

Windows 10 Security Features

Microsoft INF258x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

Looking to stay ahead of the security curve? As you get to know the new security architecture and features of Windows 10—and learn to deploy them—gain the insights and knowledge you'll need for the future.

Microsoft security engineers have hardened the operating system at every layer of the stack, reducing the attack surface with new security features that help protect against a range of threats. Join a team of experts to explore the ever-increasing levels of security within Windows 10.

You'll start with the Windows 10 defensive stack, including bundled security features.

Configure endpoint security, review additional security tools, like Windows Information Protection and Windows Defender Exploit Guard. In this course, you'll get practical details on built-in, end-to-end protections and support for the larger ecosystem of ISV and OEM partners.

Skill up to face down today’s security threats with hands-on virtualized lab exercises, demos, quizzes, and a final exam.

Secure Servers

Windows Server 2016 Security Features

Windows Server 2016 Security Features

Microsoft INF259x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

Have you had a chance to explore the new and enhanced security functionalities in Windows Server 2016? In this new course authored by Orin Thomas - who literally wrote the book on Windows Server! - you'll get a guided tour and learn to better safeguard against security breaches.

Windows Server 2016 provides layers of protection that help address both known and emerging threats. You'll learn how it actively contributes to securing your infrastructure. See how protections were built to mitigate an array of attack vectors and to deal with the overall threat of ongoing attacks inside the datacenter.

You'll begin with a look at the hardening of Windows Server 2016, including hardware requirements for Secure Boot and guidance on disabling system services. Explore ways to configure network security, including firewalls, and look at secure virtualization, like encryption-supported virtual machines. From there, you'll dive into secure virtualization, threat detection, privileged identity, Desired State Configuration, and more. See demos, participate in hands-on labs, and pass the final exam, as you shore up your skills for ongoing security management.

Secure Cloud-Enabled Services and Data

Microsoft Azure Security Services

Microsoft Azure Security Services

Microsoft INF260x
Microsoft
Open edX
90 days
Microsoft Certificate of Completion

In this course, you will gain insights into Azure Security services to help secure your services and data within Azure.

You will learn Azure security best practice and understand the terminology, tools, and techniques for creating a secure resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune.

9 Official Microsoft Certificates

Microsoft
Microsoft Certificate of Completion

Original Microsoft Certificate of Completion


Get your Original Microsoft Certificate of Completion that certifies the successful passing of a Microsoft Massive Open Online Course (MOOC).

Learning-as-a-Service (Optional)

1:1 Coaching - 1 hour

Microsoft 1:1 Coaching

Microsoft 1:1 Coaching

MS-COACH
USD 199.00
Don’t waste time searching for answers when being stuck with a problem. Schedule an individual virtual meeting with a dedicated subject-matter expert and explore more difficult topics interactively using screen sharing capabilities.

Q&A Support

Microsoft Q&A Support

Microsoft Q&A Support

MS-QA-SUPPORT
USD 99.00
Ask questions, get opinions and explore ideas with a dedicated subject-matter expert..

* Required Fields

Microsoft Professional Program (MPP): Cybersecurity

Program Microsoft MPP-CS

USD 790.00