Course curriculum

  • 1

    Introduction to Cybersecurity

    • Introduction to Cybersecurity

    • Test your learning

    • Cybersecurity Resilience

    • Assess your cyber resilience quiz

    • Accelerating Threats + Digital Transformation

    • Digital transformation quiz

    • Critical Security Hygiene and Technical Debt

    • Test your learning

    • Cybersecurity Reference Architecture

    • Test your learning

    • Reference Architecture for Identity and Access

    • Test your learning

    • Reference Architecture for Security Operations Center

    • Test your learning

    • Reference Architecture for PC and Mobile Devices

    • Test your learning

    • Reference Architecture for Hybrid Cloud Infrastructure

    • Test your learning

    • Reference Architecture for Software as a Service

    • Test your learning

    • Reference Architecture for Info Protection Final 11

    • Summary of the Course approach

  • 2

    Chapter 2 - Security Management

    • Introduction Security Management

    • Disrupting Attacker Return on Investment

    • Meet Productivity and Security Goals

    • Assume Compromise

    • Shared Responsibility

    • Cloud is More Secure

    • Security Management Visibility, Control, Guidance

    • Evolution of Vulnerability Management

  • 3

    Chapter 3 - Identity and Zero Trust User Access

    • Identity and Zero Trust History

    • Zero Trust Definition and Models

    • Account Security Measuring Cost of Attack Passwordless Authentication

    • Zero Trust User Access Reference Architecture

    • Build an Identity Perimeter

    • Identity System Security

    • Lowering Risk using business-to-business and business to customer

  • 4

    Chapter 4 - Threat Protection Strategy Section 1

    • Introduction Threat Protection Strategy

    • Security Evolution Overview

    • Security Evolution Office 365

    • Security Evolution Azure

    • Strategies and Success Criteria

    • Roadmap for Application Development & Platform

    • Roadmap for Shadow IT Risk

    • Roadmap for Office 365 Security

    • Roadmap for Infrastructure as a Service and On-Premises

    • Roadmap for Windows 10 Security

    • Roadmap for Securing Privileged Access

  • 5

    Chapter 5 - Threat Protection Strategy Section 2

    • Threat Protection Strategy (Detect-Respond-Recover)

    • Evolution of Threat Landscape

    • Evolution and Trajectory of Security Operations Centers

    • Intelligence Final

    • Success Criteria

    • Full Kill Chain Approach and Integrated Operations

    • Behavior Analytics

    • Dark Markets and Criminal Forums

    • SIEM Integration

    • Summary of Integrated Technology and Automation

  • 6

    Chapter 6 - Information Protection

    • Introduction Information Protection

    • Information Protection History and Context

  • 7

    Next steps

    • More resources for you

    • Before you go...