Content Directory

Hyperlinks to each case study is listed below.

Case studies reorganized for May 2023 content refresh

Module CaseStudy
Module 0: Case study introduction CaseStudy: Case study introduction
Module 01: Introduction to Zero Trust and best practice frameworks CaseStudy: Design a Zero Trust solution
Module 01: Introduction to Zero Trust and best practice frameworks CaseStudy: Architecture best practices
Module 02: Design solutions that align with CAF and WAF Case study: Design solutions that align with the Cloud Adoption Framework (CAF)
Module 03: Design solutions that align with MCRA and MCSB Case study: Design solutions with best practices from MCRA and MCSB
Module 04: Design a resiliency strategy for common cyberthreats like ransomware Case study: Design a resiliency strategy for a ransomware attack
Module 05: Design solutions for regulatory compliance CaseStudy: Evaluate regulatory compliance
Module 06: Design solutions for identity and access management CaseStudy: Design an identity security solution
Module 07: Design solutions for securing privileged access CaseStudy: Design solutions for securing privileged access
Module 08: Design solutions for security operations CaseStudy: Design solutions for security operations
Module 09: Design solutions for securing Microsoft 365 CaseStudy: Design solutions for securing Microsoft 365
Module 10: Design solutions for securing applications CaseStudy: Design solutions for securing applications
Module 11: Design solutions for securing an organizations data CaseStudy: Design solutions for securing an organizations data
Module 12: Specify requirements for securing SaaS PaaS and IaaS services CaseStudy: Specify requirements for securing SaaS PaaS and IaaS services
Module 13: Design solutions for security posture management in hybrid and multi-cloud environments CaseStudy: Design solutions for security posture management and threat intelligence
Module 14: Design solutions for securing server and client endpoints CaseStudy: Create a remote access and endpoint strategy

Old case study organization

Module CaseStudy
Module 0: Case study introduction CaseStudy: Case study introduction
Module 1: Build overall security strategy CaseStudy: design a Zero Trust solution
Module 2: Design security operations strategy CaseStudy: Design a Security Operations Solution
Module 3: Design identity security strategy CaseStudy: Design an identity security solution
Module 4: Evaluate a regulatory compliance strategy CaseStudy: evaluate regulatory compliance
Module 5: Evaluate security posture and recommend technical strategies CaseStudy: evaluate security posture
Module 6: Understand architecture best practices CaseStudy: architecture best practices
Module 7: Design a strategy for securing server and client endpoints CaseStudy: remote access and endpoint strategy
Module 8: Design a strategy for securing PaaS_IaaS_and_SaaS services CaseStudy: securing PaaS, IaaS and SaaS services
Module 9: Specify security requirements for applications CaseStudy: requirements for applications
Module 10: Design a strategy for securing data CaseStudy: data security
Module 11: Recommend security best practices with MCRA and MCSB Case study: Best practices with MCRA and MCSB
Module 12: Recommend secure methodology with CAF Case study: Secure methodology with CAF
Module 13: Recommend a ransomware strategy by using Microsoft Security Best Practices Case study: Ransomware strategy