- Learn how to design security solutions that address regulatory compliance requirements across multicloud environments. Translate compliance requirements into security controls using Zero Trust principles, Microsoft Purview, Microsoft Priva, Azure Policy, and Microsoft Defender for Cloud.
Upon completion of this module, the learner will be able to:
- Translate compliance requirements into security solutions using Zero Trust principles
- Address compliance requirements with Microsoft Purview including AI governance templates
- Design a solution to address privacy requirements with Microsoft Priva
- Design Azure Policy solutions to address security and compliance requirements
- Evaluate infrastructure compliance across multicloud environments using Microsoft Defender for Cloud
- Learn how to design identity and access management solutions for cloud, hybrid, and multicloud environments, including external identities, Conditional Access, and secrets management.
By the end of this module, you're able to:
- Design access strategies for SaaS, PaaS, IaaS, hybrid, and multicloud resources using identity, networking, and application controls
- Design a solution for Microsoft Entra ID, including hybrid and multicloud environments
- Design a solution for external identities, including B2B collaboration and customer identity
- Design a solution for agent identities using Microsoft Entra Agent ID
- Design modern authentication and authorization strategies
- Validate Conditional Access alignment with Zero Trust
- Specify requirements for securing Active Directory Domain Services
- Design a solution for managing secrets, keys, and certificates
- You learn advanced techniques for designing solutions that secure privileged access using Zero Trust principles, the Enterprise Access Model, and Microsoft security frameworks.
By the end of this module, you're able to:
- Understand privileged access and the Enterprise Access Model
- Design identity governance solutions
- Design a solution for securing administration of cloud tenants
- Design for cloud infrastructure entitlement management
- You learn techniques to design security operations capabilities including logging, auditing, Security Information, and Event Management (SIEM), Security Orchestration and Automated Response (SOAR), and security workflows.
By the end of this module, you're able to:
- Design security operations capabilities in hybrid and multicloud environments.
- Design centralized logging and auditing.
- Design Security Information and Event Management (SIEM) solutions.
- Design a solution for detection and response that includes Extended Detection and Response (XDR).
- Design a solution for security orchestration, automation, and response (SOAR).
- Design security workflows.
- Design and evaluate threat detection with the MITRE ATT&CK framework.
- Apply your cybersecurity architect skills on a real business scenario in the area of identity and data security. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
In this interactive case study, you:
- Explore identity lifecycle gaps, guest access risks, and monitoring limitations.
- Learn how these challenges align with Zero Trust principles.
- Apply architectural reasoning to assess threats and design secure solutions.
- Apply your cybersecurity architect skills on a real business scenario focused on user access control and threat resilience. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
In this interactive case study, you:
- Explore the operational and security challenges commonly associated with fragmented identity systems, legacy infrastructure, and inconsistent access governance.
- Learn how to apply Zero Trust principles using Microsoft technologies to modernize access control, improve threat detection, and enforce compliance across hybrid environments.
- Apply architectural reasoning to assess threats and design secure solutions.
The Most Addictive Python and SQL Courses
Gain a Splash of New Skills - Coursera+ Annual Just ₹7,999
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Design solutions for regulatory compliance
- Introduction
- Translate compliance requirements into security controls
- AI compliance considerations
- Design a solution to address compliance requirements by using Microsoft Purview
- Address privacy requirements with Microsoft Priva
- Address security and compliance requirements with Azure Policy
- Evaluate and validate alignment with regulatory standards and benchmarks by using Microsoft Defender for Cloud
- Module assessment
- Summary
- Design solutions for identity and access management
- Introduction
- Design a solution for access to SaaS, PaaS, IaaS, hybrid, and multicloud resources
- Design a solution for Microsoft Entra ID, including hybrid and multicloud environments
- Design a solution for external identities
- Design modern authentication and authorization strategies
- Design a solution for agent identities using Microsoft Entra Agent ID
- Design Conditional Access policies for AI agents
- Validate alignment of Conditional Access policies with a Zero Trust strategy
- Specify requirements for securing Active Directory Domain Services
- Design a solution to manage secrets, keys, and certificates
- Knowledge check
- Summary
- Design solutions for securing privileged access
- Introduction
- Secure privileged access
- Design privileged role assignment using the Enterprise Access Model
- Evaluate security and governance with Microsoft Entra ID solutions
- Design a solution to secure tenant administration
- Design a solution for cloud infrastructure entitlement management
- Design a solution for privileged access workstations and remote access
- Evaluate an access review management solution
- Module assessment
- Summary
- Design solutions for security operations
- Introduction
- Describe the function of Security operations (SecOps)
- Design monitoring to support hybrid and multicloud environments
- Design solutions to support centralized logging and auditing
- Design solutions for detection and response that includes extended detection and response (XDR) and security information and event management (SIEM)
- Design a solution for security orchestration, automation, and response (SOAR)
- Design and evaluate security workflows, including incident response, threat hunting, and incident management
- Design and evaluate threat detection coverage by using MITRE ATT&CK matrices, including Cloud, Enterprise, Mobile, and ICS
- Module assessment
- Summary
- Interactive case study: Modernizing identity and data security
- Introduction
- Interactive case study
- Interactive case study highlights
- Knowledge check
- Summary
- Interactive case study: Modernizing user access control and threat resilience
- Introduction
- Interactive case study
- Interactive case study highlights
- Knowledge check
- Summary