- You learn about security best practices and antipatterns, the concept of Zero Trust and its guiding principles, and key best practice frameworks including CAF, WAF, MCRA, and MCSB. You also learn about the Zero Trust adoption framework and how the frameworks relate to each other.
By the end of this module, you're able to:
- Describe common security antipatterns and the role of best practices for cybersecurity architects.
- Describe the concept of Zero Trust and its guiding principles.
- Describe the purpose and scope of CAF, WAF, MCRA, and MCSB.
- Describe the Zero Trust adoption framework and the approach to rapid modernization.
- Describe how the different best practice frameworks relate to each other.
- You'll learn about the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) and how you can use them to design more secure solutions.
Upon completion of this module, the learner will be able to:
- Understand the Cloud Adoption Framework and how it can be used to accelerate and secure an organizations move to the cloud.
- Understand the Well-Architected Framework and how it can be used to design solutions in the cloud that adhere to sound design principles including security.
- You learn about the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB) and how you can use them to design more secure solutions.
By the end of this module, you're able to:
- Use the Microsoft Cybersecurity Reference Architecture (MCRA) to design more secure solutions.
- Use Microsoft Cloud Security Benchmark (MCSB) to design more secure solutions.
- Design solutions with best practices for security capabilities and controls.
- Design solutions for protecting against insider threats, external attacks, and supply chain attacks.
- Design solutions for AI security.
- You learn about common cyberthreats like ransomware and what kinds of attack patterns an organization must be prepared for.
By the end of this module, you are able to:
- Understand common cyberthreats like ransomware.
- Understand how to support business resiliency.
- Design configurations for secure backup and restore.
- Design solutions for managing security updates.
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Introduction to Zero Trust and best practice frameworks
- Introduction
- Describe antipatterns and best practices
- Describe the concept of Zero Trust
- Describe the frameworks
- Describe the Zero Trust adoption framework and rapid modernization plan
- Describe how the frameworks relate to each other
- Module assessment
- Summary
- Design security solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Introduction
- Understand the Cloud Adoption Framework
- Understand the Cloud Adoption Framework secure methodology
- Understand Azure landing zones
- Design security with Azure landing zones
- Understand the Well-Architected Framework
- Understand the Well-Architected Framework security pillar
- Evaluate a security strategy
- Define a security strategy
- Recommend solutions for security and governance
- Design secure DevSecOps processes
- Design a strategy for secure AI adoption
- Module assessment
- Summary
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Introduction
- Describe the Microsoft Cybersecurity Reference Architecture
- Describe the Microsoft Cloud Security Benchmark
- Design solutions with best practices for capabilities and controls
- Design solutions with best practices for protecting against insider, external and supply chain attacks.
- Design AI solutions that align to the Microsoft Cloud Security Benchmark
- Design solutions that align with the Zero Trust adoption framework
- Module assessment
- Summary
- Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
- Introduction
- Common cyberthreats and attack patterns
- Support business resiliency
- Design solutions for mitigating ransomware attacks, including prioritization of BCDR and privileged access
- Design solutions for business continuity and disaster recovery (BCDR), including secure backup and restore
- Evaluate solutions for security updates
- Module assessment
- Summary