Module 0: Case study introduction |
CaseStudy: Case study introduction |
Module 01: Introduction to Zero Trust and best practice frameworks |
CaseStudy: Design a Zero Trust solution |
Module 01: Introduction to Zero Trust and best practice frameworks |
CaseStudy: Architecture best practices |
Module 02: Design solutions that align with CAF and WAF |
Case study: Design solutions that align with the Cloud Adoption Framework (CAF) |
Module 03: Design solutions that align with MCRA and MCSB |
Case study: Design solutions with best practices from MCRA and MCSB |
Module 04: Design a resiliency strategy for common cyberthreats like ransomware |
Case study: Design a resiliency strategy for a ransomware attack |
Module 05: Design solutions for regulatory compliance |
CaseStudy: Evaluate regulatory compliance |
Module 06: Design solutions for identity and access management |
CaseStudy: Design an identity security solution |
Module 07: Design solutions for securing privileged access |
CaseStudy: Design solutions for securing privileged access |
Module 08: Design solutions for security operations |
CaseStudy: Design solutions for security operations |
Module 09: Design solutions for securing Microsoft 365 |
CaseStudy: Design solutions for securing Microsoft 365 |
Module 10: Design solutions for securing applications |
CaseStudy: Design solutions for securing applications |
Module 11: Design solutions for securing an organizations data |
CaseStudy: Design solutions for securing an organizations data |
Module 12: Specify requirements for securing SaaS PaaS and IaaS services |
CaseStudy: Specify requirements for securing SaaS PaaS and IaaS services |
Module 13: Design solutions for security posture management in hybrid and multi-cloud environments |
CaseStudy: Design solutions for security posture management and threat intelligence |
Module 14: Design solutions for securing server and client endpoints |
CaseStudy: Create a remote access and endpoint strategy |