Microsoft - Cybersecurity Threat Vectors and Mitigation
- Offered byCoursera
Cybersecurity Threat Vectors and Mitigation at Coursera Overview
Duration | 7 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity Threat Vectors and Mitigation at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
- Course 3 of 9 in the Microsoft Cybersecurity Analyst Professional Certificate
- Beginner Level You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
- Approx. 7 hours to complete
- English Subtitles: English
Cybersecurity Threat Vectors and Mitigation at Coursera Course details
- This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats.
- You will gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
- After completing this course, you will be able to:
- Describe the active threat landscape.Describe common types of cyber attacks
- • Classify different types of encryption algorithms
- Explain security and compliance concepts
- This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you will earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
Cybersecurity Threat Vectors and Mitigation at Coursera Curriculum
Threats and attacks
Introduction to the course: Cybersecurity threat vectors and mitigation
Course syllabus
How to be successful in this course
Additional resources
WannaCry ransomware attack
Stuxnet worm
Data breaches
Additional resources
Evading detection
Malware and ransomware in action
Types of phishing
Other threat vectors
Additional resources
Biometrics
Firewalls and antivirus
Protecting data
Additional resources
Knowledge check: Epic attacks
Knowledge check: Threat vectors
Knowledge check: Mitigation strategies
Cryptography
Evolution of encryption
Encryption tools
Exercise: Initial protective measures
Exemplar: Initial protective measures
Additional resources
The formation of symmetric standards
The formation of digital signatures
List of hashing and encryption techniques/algorithms
Additional resources
Secure certificates
Secure communication using SSL and HTTPS
Additional resources
Centralized authentication and authorization systems examples
Additional resources
Self-review: Initial protective measures
Knowledge check: Encryption
Knowledge check: Public/private and key hashing
Knowledge check: Digital signing and certificates
Knowledge check: Authentication and authorization