- Module 1: You'll learn how to interpret and translate regulatory requirements into technical solutions. You'll also learn how to use capabilities found in Microsoft Purview, Microsoft Priva, and Defender for Cloud for compliance.
Upon completion of this module, the learner will be able to:
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Design a solution to address privacy requirements with Microsoft Priva
- Design Azure Policy solutions to address security and compliance requirements
- Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- Module 2: You learn about various strategies for managing identities and access to resources, including hybrid and multicloud scenarios, external identities, and conditional access.
By the end of this module, you are able to:
- Design cloud, hybrid and multicloud access strategies
- Design a solution for Azure Active Directory (Azure AD), part of Microsoft Entra
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Specify requirements to secure Active Directory Domain Services
- Design a solution to manage secrets, keys, and certificates
- Module 3: You learn advanced techniques for designing solutions that manage privileged access effectively.
By the end of this module, you are able to:
- Understand privileged access and the Enterprise Access Model
- Design identity governance solutions
- Design a solution for securing administration of cloud tenants
- Design for cloud infrastructure entitlement management
- Module 4: You learn techniques to design security operations capabilities including logging, auditing, Security Event Management (SIEM), Security Orchestration and Automated Response (SOAR), and security workflows.
By the end of this module, you are able to:
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design Security Event Management (SIEM) solutions
- Design a solution for detection and response that includes Extended Detection and Response (XDR)
- Design a solution for security orchestration, automation and response (SOAR)
- Design security workflows
- Design and evaluate threat detection with the MITRE ATT&CK framework
- Module 5: Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
You learn:
- How to analyze business requirements
- How to match technical capabilities to meet those needs
- How to design cohesive solutions that incorporate all of the required functions
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Syllabus
- Module 1: Module 1: Design solutions for regulatory compliance
- Introduction to regulatory compliance
- Translate compliance requirements into a security solution
- Address compliance requirements with Microsoft Purview
- Address privacy requirements with Microsoft Priva
- Address security and compliance requirements with Azure policy
- Evaluate infrastructure compliance with Defender for Cloud
- Knowledge check
- Summary - Design solutions for regulatory requirements
- Module 2: Module 2: Design solutions for identity and access management
- Introduction to Identity and Access Management
- Design cloud, hybrid and multicloud access strategies (including Microsoft Entra ID)
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Align conditional access and Zero Trust
- Specify requirements to secure Active Directory Domain Services (AD DS)
- Design a solution to manage secrets, keys, and certificates
- Knowledge check - Design solutions for identity and access management
- Summary - Design solutions for identity and access management
- Module 3: Module 3: Design solutions for securing privileged access
- Introduction to privileged access
- The enterprise access model
- Design identity governance solutions
- Design a solution to secure tenant administration
- Design a solution for cloud infrastructure entitlement management (CIEM)
- Design a solution for privileged access workstations and bastion services
- Knowledge check - Design solutions for securing privileged access management
- Summary - Design solutions for securing privileged access
- Module 4: Module 4: Design solutions for security operations
- Introduction to Security operations (SecOps)
- Design security operations capabilities in hybrid and multicloud environments
- Design centralized logging and auditing
- Design security information and event management (SIEM) solutions
- Design solutions for detection and response
- Design a solution for security orchestration, automation, and response (SOAR)
- Design security workflows
- Design threat detection coverage
- Knowledge check - Design solutions for security operations
- Summary - Design solutions for security operations
- Module 5: Module 5: Case study: Design security operations, identity and compliance capabilities
- Introduction
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Knowledge check
- Summary