Coursera
Coursera Logo

Microsoft - Cybersecurity Threat Vectors and Mitigation 

  • Offered byCoursera

Cybersecurity Threat Vectors and Mitigation
 at 
Coursera 
Overview

Duration

7 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cybersecurity Threat Vectors and Mitigation
 at 
Coursera 
Highlights

  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
  • Course 3 of 9 in the Microsoft Cybersecurity Analyst Professional Certificate
  • Beginner Level You do not need a background in IT-related fields. This course is for anyone with an affinity for technology and an interest in cybersecurity.
  • Approx. 7 hours to complete
  • English Subtitles: English
Read more
Details Icon

Cybersecurity Threat Vectors and Mitigation
 at 
Coursera 
Course details

More about this course
  • This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats.
  • You will gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
  • After completing this course, you will be able to:
  • Describe the active threat landscape.Describe common types of cyber attacks
  • • Classify different types of encryption algorithms
  • Explain security and compliance concepts
  • This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you will earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
Read more

Cybersecurity Threat Vectors and Mitigation
 at 
Coursera 
Curriculum

Threats and attacks

Introduction to the course: Cybersecurity threat vectors and mitigation

Course syllabus

How to be successful in this course

Additional resources

WannaCry ransomware attack

Stuxnet worm

Data breaches

Additional resources

Evading detection

Malware and ransomware in action

Types of phishing

Other threat vectors

Additional resources

Biometrics

Firewalls and antivirus

Protecting data

Additional resources

Knowledge check: Epic attacks

Knowledge check: Threat vectors

Knowledge check: Mitigation strategies

Cryptography

Evolution of encryption

Encryption tools

Exercise: Initial protective measures

Exemplar: Initial protective measures

Additional resources

The formation of symmetric standards

The formation of digital signatures

List of hashing and encryption techniques/algorithms

Additional resources

Secure certificates

Secure communication using SSL and HTTPS

Additional resources

Centralized authentication and authorization systems examples

Additional resources

Self-review: Initial protective measures

Knowledge check: Encryption

Knowledge check: Public/private and key hashing

Knowledge check: Digital signing and certificates

Knowledge check: Authentication and authorization

Cybersecurity Threat Vectors and Mitigation
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Cybersecurity Threat Vectors and Mitigation
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...