- You learn how to analyze security requirements for different cloud offerings (SaaS, PaaS, and IaaS), IoT workloads, web workloads, containers, and AI workloads.
By the end of this module, you're able to:
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for IoT workloads
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
- Specify security requirements for AI workloads
- Evaluate security for Microsoft Foundry workloads
- You learn how to design security posture management solutions that integrate into hybrid and multicloud scenarios using capabilities in Microsoft Defender for Cloud, Azure Arc, and Microsoft Cloud Security Benchmark (MCSB).
By the end of this module, you're able to:
- Evaluate security posture by using Microsoft Cloud Security Benchmark, Microsoft Defender for Cloud, and Secure Scores
- Design integrated security posture management and workload protection solutions in hybrid and multicloud environments
- Design cloud workload protection solutions that use Microsoft Defender for Cloud
- You learn how to analyze the security requirements for different types of endpoints including servers, clients, IoT, OT, mobile, and embedded devices. These requirements take into account different platforms and operating systems and set standards for endpoint protection, hardening, and configuration.
By the end of this module, you're able to:
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify security requirements for IoT devices and embedded systems
- Design a solution for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
- You learn how to design secure network solutions using techniques like network segmentation, traffic filtering, network monitoring, and posture management.
By the end of this module, you're able to:
- Evaluate network designs to align with security requirements and best practices
- Design solutions for network segmentation
- Design solutions for filtering traffic with network security groups
- Design solutions for network posture management
- Design solutions for network monitoring
- Evaluate solutions that use Microsoft Entra Internet Access
- Evaluate solutions that use Microsoft Entra Private Access
- Apply your cybersecurity architect skills on a real business scenario in the area of endpoint and infrastructure security. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
In this interactive case study, you:
- Explore common security gaps in distributed, hybrid enterprises spanning endpoints, OT/IoT, and cloud governance.
- Learn how to analyze threats and map Microsoft security capabilities to address risks across IT and industrial environments.
- Apply architectural reasoning to design and sequence a Zero Trust–aligned solution that secures endpoints and infrastructure end‑to‑end.
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Specify requirements for securing SaaS, PaaS, and IaaS services
- Introduction
- Specify security baselines for SaaS, PaaS, and IaaS services
- Specify security requirements for IoT workloads
- Specify security requirements for web workloads
- Specify security requirements for containers and container orchestration
- Specify security requirements for AI workloads
- Evaluate security for Microsoft Foundry workloads
- Module assessment
- Summary
- Design solutions for security posture management in hybrid and multicloud environments
- Introduction
- Evaluate security posture by using Microsoft Defender for Cloud, including the Microsoft cloud security benchmark
- Evaluate security posture by using Microsoft Secure Score
- Design integrated posture management solutions that include Microsoft Defender for Cloud in hybrid and multicloud environments
- Select cloud workload protection solutions in Microsoft Defender for Cloud
- Design a solution for integrating hybrid and multicloud environments by using Azure Arc
- Design a solution for Microsoft Defender External Attack Surface Management
- Specify requirements and priorities for a posture management process that uses Microsoft Security Exposure Management attack paths
- Module assessment
- Summary
- Design solutions for securing server and client endpoints
- Introduction to endpoint security
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify security requirements for IoT devices and embedded systems
- Evaluate solutions for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
- Evaluate Windows Local Admin Password Solution (LAPS) solutions
- Module assessment
- Summary
- Design solutions for network security
- Introduction
- Evaluate network designs to align with security requirements and best practices
- Design solutions for network segmentation
- Design solutions for traffic filtering with network security groups
- Design solutions for network posture management
- Design solutions for network monitoring
- Evaluate solutions that use Microsoft Entra Internet Access
- Evaluate solutions that use Microsoft Entra Private Access
- Module assessment
- Summary
- Interactive case study: Securing endpoints and infrastructure
- Introduction
- Interactive case study
- Interactive case study highlights
- Knowledge check
- Summary