Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

8 Lessons, Kick-start Your Cybersecurity Learning.

License

NotificationsYou must be signed in to change notification settings

microsoft/Security-101

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

74 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

GitHub LicenseGitHub Issues or Pull RequestsGitHub Issues or Pull RequestsGitHub Repo starsGitHub watchersGitHub forks

🚀 Cybersecurity for Beginners – a curriculum

In this rapidly changing age of AI technology adoption, it is even more critical to understand how to secure IT systems. This course is designed to teach you fundamental cyber security concepts to kick-start your security learning. It is vendor agnostic and is divided into small lessons that should take around 30-60 mins to complete. Each lesson has a small quiz and links to further reading if you want to dive into the topic a bit more.

Cybersecurity for Beginners

What this course covers 📚

  • 🔐 Basic cyber security concepts such as the CIA triad, the differences between risks, threats, etc,
  • 🛡️ Understanding what a security control is and what forms they take.
  • 🌐 Understanding what zero trust is and why this is important in modern cyber security.
  • 🔑 Understanding key concepts and themes across identity, networking, security operations, infrastructure and data security.
  • 🔧 Giving some examples of tools used to implement security controls.

What this course does not cover 🙅‍♂️

  • 🚫 How to use specific security tools.
  • 🚫 How to "hack" or do red teaming/offensive security.
  • 🚫 Learning about specific compliance standards.

Watch the video

When you have finished this course, you can move onto some of our Microsoft Learn modules. We recommend you continue your learning withMicrosoft Security, Compliance, and Identity Fundamentals.

Ultimately, you could consider taking theExam SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam.

💁 If you have any feedback or suggestions on this course and any content we're missing, we'd love to hear from you!

Modules Overview 📝

Module numberModule nameConcepts taughtLearning objectives
1.1Basic security conceptsThe CIA triadLearn about confidentiality, availability and integrity. Also authenticity and also nonrepudiation and privacy.
1.2Basic security conceptsCommon cyber security threatsLearn about the common cyber security threats facing individuals and organizations.
1.3Basic security conceptsUnderstanding risk managementLearn about assessing and understanding risk – impact/likelihood and implementing controls.
1.4Basic security conceptsSecurity practices and documentationLearn about the difference between policies, procedures, standards and regulations/laws.
1.5Basic security conceptsZero trustLearn about what is zero trust and how does it affect architecture? What is defense in depth?
1.6Basic security conceptsThe shared responsibility modelWhat is the shared responsibility model and how does it affect cyber security?
1.7End of module quiz
2.1Identity & access management fundamentalsIAM key conceptsLearn about the principle of least privilege, segregation of duties, how IAM supports zero trust.
2.2Identity & access management fundamentalsIAM zero trust architectureLearn about how identity is the new perimeter for modern IT environments and the threats it mitigates.
2.3Identity & access management fundamentalsIAM capabilitiesLearn about IAM capabilities and controls to secure identities
2.4End of module quiz
3.1Network security fundamentalsNetworking key conceptsLearn about networking concepts (IP addressing, port numbers, encryption, etc.)
3.2Network security fundamentalsNetworking zero trust architectureLearn about how networking contributes to an E2E ZT architecture and the threats it mitigates.
3.3Network security fundamentalsNetwork security capabilitiesLearn about network security tooling – firewalls, WAF, DDoS protection, etc.
3.4End of module quiz
4.1Security operations fundamentalsSecOps key conceptsLearn about why security operations are important and how it differs from normal IT ops teams.
4.2Security operations fundamentalsSecOps zero trust architectureLearn about how SecOps contributes to an E2E ZT architecture and the threats it mitigates.
4.3Security operations fundamentalsSecOps capabilitiesLearn about SecOps tooling – SIEM, XDR, etc.
4.4End of module quiz
5.1Application security fundamentalsAppSec key conceptsLearn about AppSec concepts such as secure by design, input validation, etc.
5.2Application security fundamentalsAppSec capabilitiesLearn about AppSec tooling: pipeline security tools, code scanning, secret scanning, etc.
5.3End of module quiz
6.1Infrastructure security fundamentalsInfrastructure security key conceptsLearn about hardening systems, patching, security hygiene, container security.
6.2Infrastructure security fundamentalsInfrastructure security capabilitiesLearn about tooling that can assist with infrastructure security e.g. CSPM, container security, etc.
6.3End of module quiz
7.1Data security fundamentalsData security key conceptsLearn about data classification and retention and why this is important to an organization.
7.2Data security fundamentalsData security capabilitiesLearn about data security tooling – DLP, inside risk management, data governance, etc.
7.3End of module quiz
8.1AI security fundamentalsAI security key conceptsLearn about the differences and similarities between traditional security and AI security.
8.2AI security fundamentalsAI security capabilitiesLearn about AI security tooling and the controls that can be used to secure AI.
8.3AI security fundamentalsResponsible AILearn about what responsible AI is and AI specific harms that security professionals need to be aware of.
8.4End of module quiz

🎒 Other Courses

Our team produces other courses! Check out:


[8]ページ先頭

©2009-2025 Movatter.jp