Professional Diploma in Cyber Security (top-up), learners will be well-prepared to pursue various job roles in the rapidly expanding field of cybersecurity. Job prospects include Cyber Security Analyst, Cyber Security Engineer, Information Security Specialist, and Cyber Security Consultant, among others. With the increasing prevalence of cyber threats and the critical need for robust security measures, there are abundant opportunities for learners to contribute to organizations across various industries, safeguarding their digital assets and ensuring regulatory compliance. This diploma equips learners with the requisite knowledge and skills to excel in dynamic roles within cybersecurity, offering a pathway to career advancement and specialization in a field essential for the modern digital landscape.
The three comprehensive modules comprising the Professional Diploma in Cyber Security (top-up) provide learners with practical skills and theoretical knowledge crucial for effective cybersecurity operations. In the "Security Operation Analysis" module, learners will delve into Microsoft 365 Defender and Microsoft Defender for Endpoint, mastering techniques to mitigate threats using Microsoft Defender for Cloud and conducting investigations and threat hunting in Microsoft Sentinel. The module also covers essential aspects such as configuring and connecting logs in the Microsoft Sentinel environment, empowering learners to analyze and respond to security incidents effectively. In the "Agile Project Management" module, learners will acquire skills to adapt to complexity using empiricism and Scrum, manage agile teams and organizations effectively, and create efficient workflows for product release planning. With a focus on building high-performing teams and prioritizing valuable business outcomes, this module prepares learners to implement continuous growth and development practices within agile project environments.
Finally, the "Capstone Project – Cyber Security" module offers learners the opportunity to apply their security, compliance, and identity management skills in a real-world scenario. Through tasks such as investigating incidents using Microsoft Sentinel, implementing Microsoft 365 Defender for Endpoint Protection, and assessing data exposure and compliance risk using Microsoft Purview compliance portal, learners will demonstrate their proficiency in handling security breaches and implementing robust cybersecurity measures. This capstone project serves as a culmination of their learning journey, allowing them to showcase their skills and expertise in addressing cybersecurity challenges effectively.
Course Knowledge, Skills & Ability Summary
Upon completing the course, learners will possess the ability to effectively analyze security threats, manage agile projects, and implement robust cybersecurity measures using Microsoft tools and Agile methodologies.
Blended Learning Journey
(181.5 Hours)
The "Security Operation Analysis" module offers learners a comprehensive skill set through various learning units (IUs) designed to foster expertise in key areas. Learners will delve into Microsoft 365 Defender and Microsoft Defender for Endpoint, gaining a profound understanding of these cutting-edge security solutions. They will learn to leverage Microsoft Defender for Cloud to proactively mitigate potential threats, thereby safeguarding critical assets effectively.
A significant aspect of the module revolves around mastering the Kusto Query Language, empowering learners to craft intricate queries for data analysis and security monitoring. Furthermore, learners will explore log configurations in the Microsoft Sentinel environment, enabling them to optimize log data management and real-time threat detection.
The module emphasizes honing investigative skills and proactive threat-hunting techniques within Microsoft Sentinel. Learners will delve into incident response methodologies, learning to identify and neutralize security breaches swiftly and efficiently.
The module culminates in a series of hands-on projects that challenge learners to apply their acquired knowledge and skills. Learners will develop cyber risk assessment techniques and implement endorsed measures to address identified security risks, threats, and vulnerabilities. Through these projects, learners will gain practical experience and build confidence in managing complex security operations.
This module provides learners with a holistic understanding of security operations and equips them with practical skills to handle cybersecurity challenges effectively. By combining Microsoft's cutting-edge security solutions with expert investigative and analytical abilities, learners will become indispensable assets in safeguarding organizations from evolving cyber threats. environments.
The Agile Management course offers a transformative experience, equipping businesses with essential skills and tools to thrive in today's dynamic environment. Participants gain proficiency in Agile principles, fostering adaptability, collaboration, and continuous improvement. Comprehensive Instructional Units shape agile leaders capable of navigating complexity, employing Scrum methodology, leading teams, and delivering value-driven outcomes. The Agile Management Capstone provides a framework for implementing agility in Business-as-Usual activities, ensuring efficient and customer-centric delivery while reducing risk.
Beginning with "Adapt to Complexity using Empiricism and Scrum," participants delve into core Agile Management principles, mastering complexity and Scrum. Subsequent units cover leadership, organizational agility, growth strategies, metrics, and creating an agile culture. Participants learn to create efficient workspaces, facilitate Scrum events, and plan releases predictably. "Build Effective Scrum Teams & Prioritize Valuable Business Outcomes" focuses on team dynamics and product backlog management.
"Conduct Effective Scrum Events for High Performing Teams" refines skills in sprint planning and daily scrum ceremonies. The core units conclude with "Implement Continuous Growth and Development," exploring the learning loop concept within the broader Agile ecosystem.
Hands-on projects engage participants in applying learned skills, integrating Scrum framework and agile leadership. The Agile Management Capstone integrates real-world business applications, allowing participants to map out business value, define strategic outcomes, and use Scrum for impactful project delivery.
Completing the course, participants emerge as Agile Management champions, adept at navigating business complexities, optimizing outcomes, and propelling organizations toward sustainable success in an agile world.
The capstone project presented in this module serves as a comprehensive hands-on exercise for learners to apply their knowledge and skills acquired throughout the course. Tasked with investigating a simulated ransomware attack and data leak within a provided Microsoft environment, learners are challenged to demonstrate their proficiency in cybersecurity incident response. They must meticulously identify the root cause of the attack, assess the extent of data compromise, implement effective remediation measures, and develop a robust cybersecurity strategy to prevent similar incidents in the future. This hands-on approach enables learners to gain practical expertise in leveraging Microsoft tools such as Microsoft Sentinel, Microsoft 365 Defender, and Entra ID for threat detection, investigation, and mitigation.
By engaging in this capstone project, learners deepen their understanding of cybersecurity principles and best practices, particularly in the context of combating ransomware threats and data breaches. Through the simulation of a realistic cyber-attack scenario, learners are exposed to the complexities and challenges involved in responding to and mitigating such incidents effectively. Furthermore, the emphasis on utilizing Microsoft's integrated security solutions underscores the importance of leveraging advanced technologies and centralized platforms for comprehensive threat detection and response.
Upon completion of the capstone project, learners are equipped with practical skills and knowledge that empower them to safeguard organizations against the evolving landscape of cybersecurity threats. They gain confidence in their ability to detect, investigate, and remediate ransomware incidents, thereby enhancing their organization's cybersecurity posture. Ultimately, this module aims to prepare learners to tackle real-world cybersecurity challenges head-on, leveraging the capabilities of Microsoft tools to fortify defenses and mitigate risks effectively.