Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
In this course, you’ll learn about threat mitigation by following the three stages of threat modeling. The steps are: decomposing the application, determining and ranking threats, and determining countermeasures and mitigation. You’ll learn about access control, secure development, cryptography, as well as asset management. You’ll also be introduced to the types of attacks that IoT (Internet of Things) devices and services face.
At the end of this course, you’ll also complete a focused security mitigation strategy plan for a given business. This capstone project integrates the knowledge you’ll have gained from the previous courses into a standalone portfolio piece, demonstrating your new cybersecurity skills. The course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
After completing this course, you’ll be able to:
• Explain threat modeling
• Discuss security conscious design
• Plan threat mitigation strategies
This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.
Syllabus
- Threat modeling
- This module introduces the core principles and processes of threat modeling used to identify and mitigate security risks. You will learn how to decompose applications, analyze and rank threats, and define appropriate countermeasures. The module also explores frameworks such as STRIDE, PASTA, CVSS, and VAST, along with practical applications using Azure tools. By the end, you will be able to develop structured threat models to secure systems and infrastructure effectively.
- Advanced threats and mitigation
- This module focuses on identifying modern cyber threats and applying effective mitigation strategies. You will explore threat vectors, ransomware, and vulnerabilities in infrastructure using frameworks like the MITRE ATT&CK Matrix. The module also covers IoT security risks and defense mechanisms, along with practical approaches to prevention, detection, and response. By the end, you will understand how to assess risks and implement mitigation strategies across different environments.
- Security conscious modeling
- This module explores how to design secure systems using defense-in-depth strategies and secure architecture principles. You will learn to identify threat vectors, entry points, and appropriate mitigation approaches across network, data, and cloud environments. The module also covers Azure security practices, identity protection, and monitoring techniques. By the end, you will be able to design layered security strategies that protect systems from evolving threats.
- Capstone project
- This module consolidates your learning through a comprehensive capstone project that applies threat modeling and mitigation strategies in a real-world scenario. You will design and implement a defense-in-depth security strategy, including identity, access, and policy configurations. The module also includes a final assessment to evaluate your understanding and readiness to apply cybersecurity concepts in professional contexts.
Taught by
Microsoft