In the “Professional Diploma in Cyber Security”, learners will be well-equipped to pursue a wide range of job roles in the field of cybersecurity. Job prospects include Cyber Security Analyst, Information Security Specialist, Security Operations Center (SOC) Analyst, Cloud Security Engineer, and Cybersecurity Consultant, among others. With the increasing complexity and frequency of cyber threats, organizations across various industries are seeking skilled professionals who can effectively secure their digital assets, mitigate risks, and ensure regulatory compliance. This diploma offers learners a pathway to enter or advance in the cybersecurity domain, providing them with the necessary knowledge and skills to excel in dynamic and challenging roles within the rapidly evolving cybersecurity landscape.
The seven modules comprising the Professional Diploma in Cyber Security cover a comprehensive range of topics essential for cybersecurity professionals. In the "Install and Configure Server" module, learners will delve into Cloud Fundamentals, administering identity and resources, virtual networking, Azure storage and virtual machines, and PaaS compute options, focusing on data protection and monitoring. "Applied Python Programming" introduces learners to the Mitre ATT&CK Framework and Python libraries for offensive and defensive network scanning, passive reconnaissance techniques, and methods for achieving initial access. "Security Fundamentals" covers cybersecurity terminology, network fundamentals, information protection, data loss prevention, and information governance.
In "Cloud Security," learners will manage identity and access, implement advanced network security, configure security for compute, manage security operations, and secure data and operations, including configuring and managing Azure Key Vault. "Security Operation Analysis" equips learners with skills to mitigate threats using Microsoft Defender for Cloud, perform queries with Kusto Query Language, configure and connect logs in Microsoft Sentinel, and conduct investigations and threat hunting. "Agile Project Management" focuses on adapting to complexity using empiricism and Scrum, managing agile teams and organizations effectively, creating efficient workflows, planning product releases, building effective Scrum teams, prioritizing valuable business outcomes, conducting effective Scrum events, and implementing continuous growth and development practices.
Finally, the "Capstone Project – Cyber Security" module tasks learners with investigating incidents using Microsoft Sentinel, implementing Microsoft 365 Defender for Endpoint Protection, and utilizing the Microsoft Purview compliance portal to assess data exposure and compliance risks, providing them with hands-on experience in addressing real-world cybersecurity challenges.
Course Knowledge, Skills & Ability Summary
Upon completing the course, learners will possess the ability to effectively apply cloud security, Python programming, and Agile project management skills in cybersecurity operations, ensuring robust protection and efficient response to threats.
Blended Learning Journey
(413.5 Hours)
The" Install and Configure Server” learners module focuses on equipping learners with the essential knowledge and skills required for server installation and configuration. Throughout the module, learners will engage with a comprehensive range of instructional units (IUs) covering various aspects of server administration.
The IUs include Cloud Fundamentals, Administer Identity and Resources, Administer Virtual Networking and Traffic Management, Administer Azure Storage and Virtual Machines, Administer PaaS Compute Option, and Administer Data Protection & Monitoring. By completing these units, learners will gain a deep understanding of cloud computing principles, resource management, network optimization, storage administration, and data protection.
The module's projects are designed to consolidate and apply the acquired knowledge and skills. Learners will take on the responsibility of leading large-scale installation projects, encompassing the deployment, decommissioning, and coordination of multiple hardware and software components. Through these projects, learners will refine their ability to develop comprehensive deployment plans and execute them efficiently.
Upon successful completion of the Install and Configure Server module, learners will possess the expertise to prioritize and execute server installation projects effectively. They will demonstrate proficiency in designing and implementing deployment strategies, managing hardware and software components, and ensuring the smooth coordination of installation activities. The module will enable learners to contribute to the successful implementation of server infrastructure, supporting organizations in meeting their computing needs.
The module "Python for Cyber Security (Applied Python Programming)" is designed to equip learners with essential knowledge and skills in Python specifically tailored for cybersecurity applications. It offers a comprehensive exploration of Python's relevance and application within the realm of cybersecurity, delving into key topics including Introduction to Mitre ATT&CK Framework & Use Cases with Python libraries, Offensive Network Scanning, Network Scanning for Defenders , Search Open Technical Databases Technique and understand the techniques attackers to achieve initial access into systems.
Through a project-based learning approach, participants will immerse themselves in practical exercises aimed at developing proficiency in managing network security across diverse network architectures. By actively applying the concepts learned throughout the modules, learners will gain hands-on experience in implementing robust cybersecurity measures, which include mastering encryption methodologies and deploying effective network scanning protocols. This experiential learning method ensures that learners not only grasp theoretical concepts but also cultivate the practical skills necessary to navigate real-world cybersecurity challenges with confidence and efficacy.
Upon successful completion of the module, participants will possess the capability to harness the power of Python effectively in securing networks, detecting vulnerabilities, and implementing resilient cybersecurity strategies. This proficiency positions them as valuable assets within the cybersecurity landscape, ready to tackle the evolving threats and complexities inherent in safeguarding digital assets and networks against malicious actors and cyber threats.
The "Security Fundamentals" module equips learners with essential knowledge and skills crucial for establishing a secure digital environment. Based on the learning units covered in the module, participants will attain proficiency in implementing information protection, data loss prevention, data lifecycle and records management, and monitoring and investigating data and activities using Microsoft Purview. Additionally, learners will gain the expertise to manage insider and privacy risks within the Microsoft 365 ecosystem.
Through practical application and hands-on projects, learners will develop a comprehensive understanding of security principles and their operational implementation. They will learn to plan and administer security programs effectively, ensuring the technical operationalization of security measures. Furthermore, participants will develop the ability to investigate and respond to security breaches concerning information, systems, and network access, strengthening their capabilities in identifying and mitigating potential threats.
By completing the "Security Fundamentals" module, learners will be well-equipped to safeguard sensitive information, prevent data breaches, and establish a robust security framework within Microsoft 365, enhancing their value as security professionals and contributing to the overall resilience of digital systems and networks.
The module " Cloud security " offers a comprehensive and structured curriculum designed to equip learners with essential knowledge and skills in the field of cloud security. The learning units (IU) cover a wide range of critical topics, including Managing Identity, Managing Access, Implementing Platform Protection, Securing Data and Applications, and Managing Security Operations. Through these units, participants will gain a deep understanding of cloud security principles and best practices.
Upon successful completion of the module, learners will emerge with a diverse set of learning outcomes and abilities, further enriched by engaging in practical projects. The focal point of these projects lies in effectively managing network security throughout an entire network. By participating in these hands-on experiences, learners will not only refine their technical expertise but also develop a keen sense of problem-solving and critical thinking in the context of real-world cloud security challenges.
This formal and comprehensive module caters to a broad audience, including aspiring cloud security professionals and experienced practitioners seeking to enhance their skill set. Whether new to the domain or looking to advance their career, learners will be well-prepared to navigate the complexities of cloud security confidently. Armed with industry-relevant insights and practical experience, they will be ready to tackle the dynamic landscape of cloud security, contributing to the robust protectionof cloud-based systems and data.
The "Security Operation Analysis" module offers learners a comprehensive skill set through various learning units (IUs) designed to foster expertise in key areas. Learners will delve into Microsoft 365 Defender and Microsoft Defender for Endpoint, gaining a profound understanding of these cutting-edge security solutions. They will learn to leverage Microsoft Defender for Cloud to proactively mitigate potential threats, thereby safeguarding critical assets effectively.
A significant aspect of the module revolves around mastering the Kusto Query Language, empowering learners to craft intricate queries for data analysis and security monitoring. Furthermore, learners will explore log configurations in the Microsoft Sentinel environment, enabling them to optimize log data management and real-time threat detection.
The module emphasizes honing investigative skills and proactive threat-hunting techniques within Microsoft Sentinel. Learners will delve into incident response methodologies, learning to identify and neutralize security breaches swiftly and efficiently.
The module culminates in a series of hands-on projects that challenge learners to apply their acquired knowledge and skills. Learners will develop cyber risk assessment techniques and implement endorsed measures to address identified security risks, threats, and vulnerabilities. Through these projects, learners will gain practical experience and build confidence in managing complex security operations.
This module provides learners with a holistic understanding of security operations and equips them with practical skills to handle cybersecurity challenges effectively. By combining Microsoft's cutting-edge security solutions with expert investigative and analytical abilities, learners will become indispensable assets in safeguarding organizations from evolving cyber threats. environments.
The Agile Management course offers a transformative experience, equipping businesses with essential skills and tools to thrive in today's dynamic environment. Participants gain proficiency in Agile principles, fostering adaptability, collaboration, and continuous improvement. Comprehensive Instructional Units shape agile leaders capable of navigating complexity, employing Scrum methodology, leading teams, and delivering value-driven outcomes. The Agile Management Capstone provides a framework for implementing agility in Business-as-Usual activities, ensuring efficient and customer-centric delivery while reducing risk.
Beginning with "Adapt to Complexity using Empiricism and Scrum," participants delve into core Agile Management principles, mastering complexity and Scrum. Subsequent units cover leadership, organizational agility, growth strategies, metrics, and creating an agile culture. Participants learn to create efficient workspaces, facilitate Scrum events, and plan releases predictably. "Build Effective Scrum Teams & Prioritize Valuable Business Outcomes" focuses on team dynamics and product backlog management.
"Conduct Effective Scrum Events for High Performing Teams" refines skills in sprint planning and daily scrum ceremonies. The core units conclude with "Implement Continuous Growth and Development," exploring the learning loop concept within the broader Agile ecosystem.
Hands-on projects engage participants in applying learned skills, integrating Scrum framework and agile leadership. The Agile Management Capstone integrates real-world business applications, allowing participants to map out business value, define strategic outcomes, and use Scrum for impactful project delivery.
Completing the course, participants emerge as Agile Management champions, adept at navigating business complexities, optimizing outcomes, and propelling organizations toward sustainable success in an agile world.
The capstone project presented in this module serves as a comprehensive hands-on exercise for learners to apply their knowledge and skills acquired throughout the course. Tasked with investigating a simulated ransomware attack and data leak within a provided Microsoft environment, learners are challenged to demonstrate their proficiency in cybersecurity incident response. They must meticulously identify the root cause of the attack, assess the extent of data compromise, implement effective remediation measures, and develop a robust cybersecurity strategy to prevent similar incidents in the future. This hands-on approach enables learners to gain practical expertise in leveraging Microsoft tools such as Microsoft Sentinel, Microsoft 365 Defender, and Entra ID for threat detection, investigation, and mitigation.
By engaging in this capstone project, learners deepen their understanding of cybersecurity principles and best practices, particularly in the context of combating ransomware threats and data breaches. Through the simulation of a realistic cyber-attack scenario, learners are exposed to the complexities and challenges involved in responding to and mitigating such incidents effectively. Furthermore, the emphasis on utilizing Microsoft's integrated security solutions underscores the importance of leveraging advanced technologies and centralized platforms for comprehensive threat detection and response.
Upon completion of the capstone project, learners are equipped with practical skills and knowledge that empower them to safeguard organizations against the evolving landscape of cybersecurity threats. They gain confidence in their ability to detect, investigate, and remediate ransomware incidents, thereby enhancing their organization's cybersecurity posture. Ultimately, this module aims to prepare learners to tackle real-world cybersecurity challenges head-on, leveraging the capabilities of Microsoft tools to fortify defenses and mitigate risks effectively.