Vendor: Microsoft
Tehnologije: Cyber Security
Također naučiti će kako dizajnirati i projektirati rješenja koristeći Zero Trust model i specificirati sigurnosne zahtjeve za cloud infrastrukturu u različitim modelima usluga (SaaS, PaaS, IaaS).
Osnovne informacije
- Dizajnirati Zero Trust strategiju i arhitekturu..
- Procijeniti tehničke strategije i strategije sigurnosnih operacija Governance Risk Compliance (GRC) modela.
- Dizajnirati sigurnosne modele za infrastrukturu.
- Dizajnirati strategiju za podatke i aplikacije.
- Preporuča se pohađanje i polaganje certifikacijskog ispita za koncepte sigurnosti, usklađenosti i identiteta (eng. security, compliance and identity) kao šo su AZ-500, SC-200 or SC-300
- Napredno iskustvo i znanje o identitetu i pristupu, zaštiti platforme, sigurnosnim operacijama, zaštiti podataka i zaštiti aplikacija.
- Iskustvo s hibridnim i cloud implementacijama.
Certifikacijski ispit
- Exam SC-100: Microsoft Cybersecurity Architect
Certifikat: Microsoft Certified
- Cybersecurity Architect Expert
Moduli koji će se izvoditi
In this module you will learn how to build an overall security strategy and architecture with zero trust in mind. After completing this module, students will be able to:
- Develop Integration points in an architecture
- Develop security requirements based on business goals
- Translate security requirements into technical capabilities
- Design security for a resiliency strategy
- Design security strategy for hybrid and multi-tenant environments
- Design technical and governance strategies for traffic filtering and segmentation
In this module you will learn how to design a cybersecurity strategy for security operations (SecOps). After completing this module, students will be able to:
- Design a logging and auditing security strategy.
- Develop security operations for hybrid and multi-cloud environments.
- Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR).
- Evaluate security workflows.
- Review security strategies for incident management.
- Evaluate security operations for technical threat intelligence
- Monitor sources for insights on threats and mitigations
In this module you will learn how to design a cybersecurity strategy for identity management. After completing this module, students will be able to:
- Recommend an identity store for security
- Recommend secure authentication and security authorization strategies
- Secure conditional access
- Design a strategy for role assignment and delegation
- Define Identity governance for access reviews and entitlement management
- Design a security strategy for privileged role access to infrastructure
- Design a security strategy for privileged access
In this module you will learn how to evaluate a cybersecurity strategy for regulatory compliance. After completing this module, students will be able to:
- Interpret compliance requirements and their technical capabilities
- Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- Interpret compliance scores and recommend actions to resolve issues or improve security
- Design and validate implementation of Azure Policy
- Design for data residency Requirements
- Translate privacy requirements into requirements for security solutions
In this module you will learn how to evaluate an organization’s security posture and recommend technical strategies to manage risk. After completing this module, students will be able to:
- Evaluate security postures by using benchmarks
- Evaluate security postures by using Microsoft Defender for Cloud
- Evaluate security postures by using Secure Scores
- Evaluate security hygiene of Cloud Workloads
- Design security for an Azure Landing Zone
- Interpret technical threat intelligence and recommend risk mitigations
- Recommend security capabilities or controls to mitigate identified risk
In this module you will learn best practices for cybersecurity architecture and how they have been affected by cloud computing. After completing this module, students will be able to:
- Plan and implement a security strategy across teams
- Establish a strategy and process for proactive and continuous evolution of a security strategy
In this module you will learn how to design a cybersecurity strategy to secure server and client endpoints. After completing this module, students will be able to:
- Design a logging and auditing security strategy
- Develop security operations for hybrid and multi-cloud environments
- Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR)
- Evaluate security workflows
- Review security strategies for incident management
- Evaluate security operations for technical threat intelligence
- Monitor sources for insights on threats and mitigations
In this module you will learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models. After completing this module, students will be able to:
- Specify security baselines for SaaS, PaaS and IaaS services
- Specify security requirements for web, storage, data and IoT workloads
- Specify security requirements for containers and container orchestration
In this module you will learn how to specify cybersecurity requirements for applications. After completing this module, students will be able to:
- Specify priorities for mitigating threats to applications
- Specify a security standard for onboarding a new application
- Specify a security strategy for applications and APIs
In this module you will learn how to design a cybersecurity strategy to secure data. After completing this module, students will be able to:
- Specify priorities for mitigating threats to data
- Design a strategy to identify and protect sensitive data
- Specify an encryption standard for data at rest and in motion
In this module you will learn how to use guidance in Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks to help an organization apply Zero Trust principles and secure their infrastructure. After completing this module, students will be able to: Use the Microsoft Cybersecurity Reference Architecture (MCRA) to recommend security best practices Use Microsoft Cloud Security Benchmarks to recommend security best practices Use the Zero Trust Rapid Modernization Plan (RaMP) to recommend a strategy for updating organizational security
In this module you will learn how to use the Cloud Adoption Framework to recommend security best practices that help an organization move to the cloud while improving overall security posture. After completing this module, students will be able to:
- Recommend a DevSecOps process
- Recommend a methodology for asset protection
- Recommend strategies for managing and minimizing risk
In this module you will learn how to execute the three important phases of ransomware protection: create a recovery plan, limit the scope of damage, make it hard to get in. After completing this module, students will be able to:
- Recognize different types of ransomware
- Help an organization mitigate risk of a ransomware attack by creating a recovery plan
- Help an organization mitigate risk of a ransomware attack by limiting the scope of damage
- Help an organization mitigate risk of a ransomware attack by hardening key infrastructure elements
Brzi upit
"*" indicates required fields
Prijavite se
Lokacija
Trajanje: 32 sati
Brzi upit
"*" indicates required fields