Course Brief

The Advanced Certificate in Cyber Security opens doors to a world of promising job prospects and exciting opportunities for learners. Upon completing this comprehensive course, learners will be well-equipped to take on diverse job roles in the cybersecurity domain, such as Cloud Security Analyst, Security Operations Center (SOC) Analyst or Cloud Security Administrator, With an in-depth understanding of security fundamentals, cloud security, security operation analysis, and cyber security practice, graduates will be ready to tackle the dynamic challenges of the cybersecurity landscape and contribute to safeguarding critical systems and data.

The course "Advanced Certificate in Cyber Security" is designed to provide learners with a broad and practical understanding of various cybersecurity aspects. The four modules in this course offer a comprehensive curriculum, covering essential topics and hands-on experiences to prepare learners for real-world cybersecurity scenarios.

In the module "Security Fundamentals," learners will delve into implementing information protection in Microsoft 365, data loss prevention, data lifecycle, and records management. They will also gain expertise in monitoring and investigating data and activities using Microsoft Purview and managing insider and privacy risks in Microsoft 365.

Moving on to "Cloud Security," participants will explore the critical areas of managing identity, access, and platform protection. They will learn to secure data and applications effectively, and gain insights into managing security operations in cloud environments.

The module "Security Operation Analysis" equips learners with valuable skills in utilizing Microsoft 365 Defender and Microsoft Defender for Endpoint. Participants will learn to mitigate threats through Microsoft Defender for Cloud Queries with Kusto Query Language. Additionally, they will configure and connect logs in Microsoft Sentinel environment and develop expertise in investigations and threat hunting using Microsoft Sentinel.

IIn the final module, "Capstone Project cyber security”, the capstone module focuses on developing security solutions that align with best practices, including Zero Trust design and ransomware resilience strategies. Students will also implement identity security measures and utilize Microsoft Sentinel for effective incident management. Through these activities, participants will gain practical skills to address real-world cybersecurity challenges..

Throughout the course, learners will engage in practical projects, refine their technical expertise, and develop critical thinking and problem-solving skills, all of which are crucial for successful cybersecurity professionals. This comprehensive course caters to aspiring cybersecurity specialists and experienced practitioners looking to enhance their skill set and advance their careers in the cybersecurity domain.

Upon completion of the "Advanced Certificate in Cyber Security," learners will emerge with a diverse set of learning outcomes and abilities, ready to navigate the complexities of cybersecurity confidently. Armed with industry-relevant insights and practical experience, they will be well-prepared to contribute to the robust protection of systems and data, safeguarding organizations from cyber threats in an ever-evolving digital landscape. advancement.

Course Knowledge, Skills & Ability Summary

At the end of the course, you will be able to acquire the following:

Knowledge

  • Describe the implementation of information protection in Microsoft 365.
  • Identify methods to secure data and applications in cloud environments.
  • Explain the use of Microsoft Defender for Cloud Queries with Kusto Query Language.
  • Recognize the key components of security operations in a cyber environment.
  • Recall best practices for designing security solutions for applications, data, and infrastructure.

Skills

  • Apply data loss prevention techniques in Microsoft 365.
  • Utilize Microsoft Purview for monitoring and investigating data and activities.
  • Configure role-based access controls for managing identity in cloud environments.
  • Conduct investigations and threat hunting using Microsoft Sentinel.
  • Design security solutions aligned with cybersecurity principles and priorities.

Ability

Implement, manage, and optimize cybersecurity measures in diverse environments, contributing effectively to safeguarding critical systems and data.

Blended Learning Journey

(242 Hours)

Placeholder Image

E-Learning

36 Hours

Placeholder Image

Flipped Class

48 Hours

Placeholder Image

Mentoring Support (Sync) (Assignment)

54 Hours

Placeholder Image

Mentoring Support (Sync) (Project)

42 Hours

Placeholder Image

Mentoring Support (Async)

60 Hours

Placeholder Image

Summative Assessment

2 Hours

Module Summary

WSQ Security Fundamentals (SF)

Module Brief

The "Security Fundamentals" module equips learners with essential knowledge and skills crucial for establishing a secure digital environment. Based on the learning units covered in the module, participants will attain proficiency in implementing information protection, data loss prevention, data lifecycle and records management, and monitoring and investigating data and activities using Microsoft Purview. Additionally, learners will gain the expertise to manage insider and privacy risks within the Microsoft 365 ecosystem.

Through practical application and hands-on projects, learners will develop a comprehensive understanding of security principles and their operational implementation. They will learn to plan and administer security programs effectively, ensuring the technical operationalization of security measures. Furthermore, participants will develop the ability to investigate and respond to security breaches concerning information, systems, and network access, strengthening their capabilities in identifying and mitigating potential threats.

By completing the "Security Fundamentals" module, learners will be well-equipped to safeguard sensitive information, prevent data breaches, and establish a robust security framework within Microsoft 365, enhancing their value as security professionals and contributing to the overall resilience of digital systems and networks.

Other Information
  • SSG Module Reference No: TGS-2023020569
  • Module Validity Date: 2025-01-31

WSQ Cloud security (SF)

Module Brief

The module " Cloud security " offers a comprehensive and structured curriculum designed to equip learners with essential knowledge and skills in the field of cloud security. The learning units (IU) cover a wide range of critical topics, including Managing Identity, Managing Access, Implementing Platform Protection, Securing Data and Applications, and Managing Security Operations. Through these units, participants will gain a deep understanding of cloud security principles and best practices.

Upon successful completion of the module, learners will emerge with a diverse set of learning outcomes and abilities, further enriched by engaging in practical projects. The focal point of these projects lies in effectively managing network security throughout an entire network. By participating in these hands-on experiences, learners will not only refine their technical expertise but also develop a keen sense of problem-solving and critical thinking in the context of real-world cloud security challenges.

This formal and comprehensive module caters to a broad audience, including aspiring cloud security professionals and experienced practitioners seeking to enhance their skill set. Whether new to the domain or looking to advance their career, learners will be well-prepared to navigate the complexities of cloud security confidently. Armed with industry-relevant insights and practical experience, they will be ready to tackle the dynamic landscape of cloud security, contributing to the robust protection of cloud-based systems and data.

Other Information
  • SSG Module Reference No: TGS-2023020568
  • Module Validity Date: 2025-01-31

WSQ Applied Python Programming (SF)

Module Brief

The module "Python for Cyber Security (Applied Python Programming)" is designed to equip learners with essential knowledge and skills in Python specifically tailored for cybersecurity applications. It offers a comprehensive exploration of Python"s relevance and application within the realm of cybersecurity, delving into key topics including Introduction to Miter ATT&CK Framework & Use Cases with Python libraries, Offensive Network Scanning, Network Scanning for Defenders, Search Open Technical Databases Technique and understand the techniques attackers to achieve initial access into systems.

Through a project-based learning approach, participants will immerse themselves in practical exercises aimed at developing proficiency in managing network security across diverse network architectures. By actively applying the concepts learned throughout the modules, learners will gain hands-on experience in implementing robust cybersecurity measures, which include mastering encryption methodologies and deploying effective network scanning protocols. This experiential learning method ensures that learners not only grasp theoretical concepts but also cultivate the practical skills necessary to navigate real-world cybersecurity challenges with confidence and efficacy.

Upon successful completion of the module, participants will possess the capability to harness the power of Python effectively in securing networks, detecting vulnerabilities, and implementing resilient cybersecurity strategies. This proficiency positions them as valuable assets within the cybersecurity landscape, ready to tackle the evolving threats and complexities inherent in safeguarding digital assets and networks against malicious actors and cyber threats.

Other Information
  • SSG Module Reference No: TGS-2023020489
  • Module Validity Date: 2025-01-31

WSQ Capstone Project - Cyber security (SF)

Module Brief

The capstone project presented in this module serves as a comprehensive hands-on exercise for learners to apply their knowledge and skills acquired throughout the course. Tasked with investigating a simulated ransomware attack and data leak within a provided Microsoft environment, learners are challenged to demonstrate their proficiency in cybersecurity incident response. They must meticulously identify the root cause of the attack, assess the extent of data compromise, implement effective remediation measures, and develop a robust cybersecurity strategy to prevent similar incidents in the future. This hands-on approach enables learners to gain practical expertise in leveraging Microsoft tools such as Microsoft Sentinel, Microsoft 365 Defender, and Entra ID for threat detection, investigation, and mitigation.

By engaging in this capstone project, learners deepen their understanding of cybersecurity principles and best practices, particularly in the context of combating ransomware threats and data breaches. Through the simulation of a realistic cyber-attack scenario, learners are exposed to the complexities and challenges involved in responding to and mitigating such incidents effectively. Furthermore, the emphasis on utilizing Microsoft"s integrated security solutions underscores the importance of leveraging advanced technologies and centralized platforms for comprehensive threat detection and response.

Upon completion of the capstone project, learners are equipped with practical skills and knowledge that empower them to safeguard organizations against the evolving landscape of cybersecurity threats. They gain confidence in their ability to detect, investigate, and remediate ransomware incidents, thereby enhancing their organization"s cybersecurity posture. Ultimately, this module aims to prepare learners to tackle real-world cybersecurity challenges head-on, leveraging the capabilities of Microsoft tools to fortify defenses and mitigate risks effectively.

Other Information
  • SSG Module Reference No: TGS-2023020596
  • Module Validity Date: 2025-01-31