Schedule
Asynchronous
Delivery method
Online
20.89 Hours
Estimated learning time
Self-Paced
Progress at your own speed
Popular course
A popular course among students
In this course, you’ll learn about threat mitigation by following the three stages of threat modeling. The steps are: decomposing the application, determining and ranking threats, and determining countermeasures and mitigation. You’ll learn about access control, secure development, cryptography, as well as asset management. You’ll also be introduced to the types of attacks that IoT (Internet of Things) devices and services face.
At the end of this course, you’ll also complete a focused security mitigation strategy plan for a given business. This capstone project integrates the knowledge you’ll have gained from the previous courses into a standalone portfolio piece, demonstrating your new cybersecurity skills. The course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
After completing this course, you’ll be able to:
• Explain threat modeling
• Discuss security conscious design
• Plan threat mitigation strategies
This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
This Course is part of a program
You can only buy it along with program.
Schedule
Asynchronous
Delivery method
Online
Earn necessary number of credit hours for completing this content