Describe the basic concepts of cybersecurity
- Offered byMicrosoft
Describe the basic concepts of cybersecurity at Microsoft Overview
Duration | 2 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Describe the basic concepts of cybersecurity at Microsoft Course details
- Describe basic cybersecurity threats, attacks, and mitigations
- Describe concepts of cryptography
- Describe authentication and authorization in cybersecurity
- Describe network-based threats and mitigations
- Describe device-based threats and security controls
- Describe application-based threats and how to protect against them
- In this learning path you will learn about cybersecurity concepts and ways to protect yourself and your business from cyberattacks
- Throughout this course you learn about the different elements of cryptography and their application in cybersecurity
- Learn about common identity-based attacks, different authentication methods, and ways to protect against unauthorized access
Describe the basic concepts of cybersecurity at Microsoft Curriculum
Describe basic cybersecurity threats, attacks, and mitigations
Introduction
Describe what is cybersecurity
Describe the threat landscape
Describe malware
Describe basic mitigation strategies
Knowledge check
Summary and resources
Describe concepts of cryptography
Introduction
Describe cryptography
Describe encryption and its use in cybersecurity
Describe hashing and its application in digital signing
Describe digital certificates
Knowledge check
Summary and resources
Describe authentication and authorization in cybersecurity
Introduction
Define authentication
Describe authentication-based attacks
Describe authorization security techniques
Knowledge check
Summary and resources
Describe network-based threats and mitigations
Introduction
Describe the different types of networks
Describe how data moves around a network
Describe threats to network security
Protect your network
Knowledge check
Summary and resources
Describe device-based threats and security controls
Introduction
Describe what your device knows about you
Describe how devices become cybersecurity threats
Describe how to mitigate against device-related threats
Knowledge check
Summary and resources
Describe application-based threats and how to protect against them
Introduction
Describe what are applications
Describe the threat landscape of applications
Describe how to protect your applications
Knowledge check
Summary and resources