- Understand the principles of computer science.
- Learn the principles of IT security and cybersecurity.
- Develop practical skills for securing networks.
Overview
This learning path teaches fundamental networking and security operations concepts. It is a prerequisite as part of the admissions process for the Microsoft Software and Systems Academy (MSSA) program, Cybersecurity Operations (CSO) learning path. To learn more about the MSSA program, visit https://aka.ms/mssa.
Syllabus
Courses under this program:
Course 1: Computer Science Principles: Digital Information
-Learn how digital information is stored, transmitted, and encoded by computers. This course covers the first part of the AP Computer Science Principles exam.
Course 2: Computer Science Principles: The Internet
-Explore the internet's history and the technology underlying the web, including IP addressing, web servers, URLs, and HTML.
Course 3: IT Security Foundations: Core Concepts
-Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
Course 4: Cybersecurity Foundations
-Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Course 5: Cybersecurity Foundations: Security Architecture
-Learn to cut through buzzwords and easily-confusing concepts in order to build more effective cybersecurity programs.
Course 6: Security Frameworks Fundamentals
-Get an introduction to multiple security frameworks and learn how to bring standardization and consistency to your security practices.
Course 7: IT Security Foundations: Operating System Security
-Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.
Course 8: IT Security Foundations: Network Security
-Learn how to secure an organization's network and keep your interconnected systems and data safe.
Course 9: Introduction to Identity and Access Management
-Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
Course 10: SSL/TLS for Beginners: Securing Network Communications (2019)
-Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
Course 11: Cybersecurity with Cloud Computing
-Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
Course 12: Cybersecurity Foundations: Computer Forensics
-Learn how to acquire and analyze data from computers or storage devices with computer forensics.
Course 1: Computer Science Principles: Digital Information
-Learn how digital information is stored, transmitted, and encoded by computers. This course covers the first part of the AP Computer Science Principles exam.
Course 2: Computer Science Principles: The Internet
-Explore the internet's history and the technology underlying the web, including IP addressing, web servers, URLs, and HTML.
Course 3: IT Security Foundations: Core Concepts
-Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
Course 4: Cybersecurity Foundations
-Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Course 5: Cybersecurity Foundations: Security Architecture
-Learn to cut through buzzwords and easily-confusing concepts in order to build more effective cybersecurity programs.
Course 6: Security Frameworks Fundamentals
-Get an introduction to multiple security frameworks and learn how to bring standardization and consistency to your security practices.
Course 7: IT Security Foundations: Operating System Security
-Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.
Course 8: IT Security Foundations: Network Security
-Learn how to secure an organization's network and keep your interconnected systems and data safe.
Course 9: Introduction to Identity and Access Management
-Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
Course 10: SSL/TLS for Beginners: Securing Network Communications (2019)
-Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
Course 11: Cybersecurity with Cloud Computing
-Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
Course 12: Cybersecurity Foundations: Computer Forensics
-Learn how to acquire and analyze data from computers or storage devices with computer forensics.
Courses
-
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
-
Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
-
Get an introduction to multiple security frameworks and learn how to bring standardization and consistency to your security practices.
-
Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
-
Learn how digital information is stored, transmitted, and encoded by computers. This course covers the first part of the AP Computer Science Principles exam.
-
Explore the internet's history and the technology underlying the web, including IP addressing, web servers, URLs, and HTML.
-
Learn how to secure an organization's network and keep your interconnected systems and data safe.
-
Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
-
Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.
-
Learn how to acquire and analyze data from computers or storage devices with computer forensics.
-
Learn to cut through buzzwords and easily-confusing concepts in order to build more effective cybersecurity programs.
-
Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
Taught by
Rich Winnie, Lisa Bock, Malcolm Shore, Pete Lindstrom, Mandy Huth, CISSP, CIPT, QTE, Dan Lachance and Jungwoo Ryoo