| Module 0: Case study introduction | CaseStudy: Case study introduction | 
    
      | Module 01: Introduction to Zero Trust and best practice frameworks | CaseStudy: Design a Zero Trust solution | 
    
      | Module 01: Introduction to Zero Trust and best practice frameworks | CaseStudy: Architecture best practices | 
    
      | Module 02: Design solutions that align with CAF and WAF | Case study: Design solutions that align with the Cloud Adoption Framework (CAF) | 
    
      | Module 03: Design solutions that align with MCRA and MCSB | Case study: Design solutions with best practices from MCRA and MCSB | 
    
      | Module 04: Design a resiliency strategy for common cyberthreats like ransomware | Case study: Design a resiliency strategy for a ransomware attack | 
    
      | Module 05: Design solutions for regulatory compliance | CaseStudy: Evaluate regulatory compliance | 
    
      | Module 06: Design solutions for identity and access management | CaseStudy: Design an identity security solution | 
    
      | Module 07: Design solutions for securing privileged access | CaseStudy: Design solutions for securing privileged access | 
    
      | Module 08: Design solutions for security operations | CaseStudy: Design solutions for security operations | 
    
      | Module 09: Design solutions for securing Microsoft 365 | CaseStudy: Design solutions for securing Microsoft 365 | 
    
      | Module 10: Design solutions for securing applications | CaseStudy: Design solutions for securing applications | 
    
      | Module 11: Design solutions for securing an organizations data | CaseStudy: Design solutions for securing an organizations data | 
    
      | Module 12: Specify requirements for securing SaaS PaaS and IaaS services | CaseStudy: Specify requirements for securing SaaS PaaS and IaaS services | 
    
      | Module 13: Design solutions for security posture management in hybrid and multi-cloud environments | CaseStudy: Design solutions for security posture management and threat intelligence | 
    
      | Module 14: Design solutions for securing server and client endpoints | CaseStudy: Create a remote access and endpoint strategy |