Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Cybersecurity Threat Vectors and Mitigation

Microsoft via Coursera

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Describe the active threat landscape • Describe common types of cyber attacks • Classify different types of encryption algorithms • Explain security and compliance concepts This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.

Syllabus

  • Threats and attacks
    • Dive into the world of cyber threats and attacks and get to know the active threat landscape.
  • Cryptography
    • Explore the cryptographic methods and standards used to protect data and secure communication.
  • Network and device-based threats
    • Examine the various types of threats that can occur during data transmission, the importance of security controls in protecting against these threats, and the importance of keeping applications and devices updated to mitigate these risks.
  • Security, compliance and identity
    • Explore the different laws, regulations, and industry standards that organizations must adhere to in order to ensure the security of their systems and data.
  • Cybersecurity threat vectors and mitigation
    • Put your skills into practice by creating your own compliance strategy for the end-of-course project and reinforce your understanding of the key concepts you’ve learned.

Taught by

Microsoft

Reviews

4.7 rating at Coursera based on 230 ratings

Start your review of Cybersecurity Threat Vectors and Mitigation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.