| Module 0: Case study introduction |
CaseStudy: Case study introduction |
| Module 01: Introduction to Zero Trust and best practice frameworks |
CaseStudy: Design a Zero Trust solution |
| Module 01: Introduction to Zero Trust and best practice frameworks |
CaseStudy: Architecture best practices |
| Module 02: Design solutions that align with CAF and WAF |
Case study: Design solutions that align with the Cloud Adoption Framework (CAF) |
| Module 03: Design solutions that align with MCRA and MCSB |
Case study: Design solutions with best practices from MCRA and MCSB |
| Module 04: Design a resiliency strategy for common cyberthreats like ransomware |
Case study: Design a resiliency strategy for a ransomware attack |
| Module 05: Design solutions for regulatory compliance |
CaseStudy: Evaluate regulatory compliance |
| Module 06: Design solutions for identity and access management |
CaseStudy: Design an identity security solution |
| Module 07: Design solutions for securing privileged access |
CaseStudy: Design solutions for securing privileged access |
| Module 08: Design solutions for security operations |
CaseStudy: Design solutions for security operations |
| Module 09: Design solutions for securing Microsoft 365 |
CaseStudy: Design solutions for securing Microsoft 365 |
| Module 10: Design solutions for securing applications |
CaseStudy: Design solutions for securing applications |
| Module 11: Design solutions for securing an organizations data |
CaseStudy: Design solutions for securing an organizations data |
| Module 12: Specify requirements for securing SaaS PaaS and IaaS services |
CaseStudy: Specify requirements for securing SaaS PaaS and IaaS services |
| Module 13: Design solutions for security posture management in hybrid and multi-cloud environments |
CaseStudy: Design solutions for security posture management and threat intelligence |
| Module 14: Design solutions for securing server and client endpoints |
CaseStudy: Create a remote access and endpoint strategy |