Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Security Primer

Course Summary

This Security Primer course provides learners with a high-level view of cybersecurity ecosystems and tools, as well as best practices and pitfalls in general. Students learn fundamental security concepts and the core elements to a secure infrastructure. They explore how to write security objectives for planning a secure application deployment. The course concludes with students learning to identify security weaknesses and exploring best practices for securing any compute infrastructure.

Audience
Anyone interested in learning about security
Skill level
Beginner
Style
Lecture | Hands-on Activities
Duration
2 days
Related technologies
Azure

 

Learning objectives
  • Understand cybersecurity best practices from a big picture perspective.
  • Discuss fundamental security concepts
  • Describe the core elements to a secure infrastructure
  • Write security objectives for planning a secure application deployment
  • Identify security weaknesses
  • Apply best practices for securing any compute infrastructure

What you'll learn:

In this course, you'll learn:
  • Network Security Essentials
    • Defensible Network
    • Network and Device Security
    • Networking and Protocols
    • Securing Wireless Networks
    • Securing web comms
  • Attack types
    • Threat actors
    • Phishing
    • Malware
    • Social Networking
    • Man in the middle
  • Encryption/Cryptography
    • Cryptography overview
    • Algorithms
    • Applying cryptography
  • Cyber Risk management frameworks
    • NIST
    • ISO27
    • Zero Trust
    • Identification of personally identifiable information
    • Portable data and destruction
  • Incident Response
    • Incident handling foundations
  • Introduction to Azure Security
    • What is Cloud Security and why is it important?
    • Types of Cloud security integrations
    • Security as a joint responsibility
    • Azure Security and your role
    • Common Security Threats

Dive in and learn more

When transforming your workforce, it’s important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.