Skip to content
Home » Microsoft » Microsoft Cybersecurity Analyst Professional Certificate » Cybersecurity Threat Vectors and Mitigation » Week 5: Cybersecurity threat vectors and mitigation

Week 5: Cybersecurity threat vectors and mitigation

Put your skills into practice by creating your own compliance strategy for the end-of-course project and reinforce your understanding of the key concepts you’ve learned.

Learning Objectives

  • Describe the key concepts and topics covered in the course
  • Create a comprehensive security strategy that includes the implementation of best practices and industry standards to secure the network and business machines used by a business enterprise
  • Demonstrate understanding of threat vectors and mitigation strategies

Final Course project and assessment


Video: Course recap: Cybersecurity threat vectors and mitigation

What You’ve Learned

  • Cybersecurity Fundamentals: You understand cyber threats, attack types, threat vectors (insider attacks, typosquatting, etc.), and mitigation strategies (biometrics, software, data backups).
  • Cryptography: You grasp the concepts of symmetric/asymmetric encryption, hashing, digital signatures, and certificates, as well as centralized authentication and authorization.
  • Network & Device Threats: You learned about vulnerabilities, the importance of updates, data transmission threats, VPNs, firewalls, and network segmentation.
  • Security, Compliance, & Identity: You covered regulations (GDPR), industry standards (ISO 27001, etc.), identity management, Single Sign-On, Active Directory, and defense models like Zero Trust.

The Goal: Applying Your Knowledge

The course aims to equip you to develop effective cybersecurity strategies by:

  • Understanding Threats: You can identify various threat types and how they operate.
  • Implementing Mitigations: You learned tools and techniques (encryption, firewalls, updates) to reduce risk.
  • Staying Compliant: You’re familiar with key regulations and standards to ensure systems meet security requirements.

Ready to Demonstrate Mastery

The final project and assessment will test your ability to apply these concepts in a real-world scenario to create a comprehensive security plan.

You’re almost at the finish line for
this course. You put a lot of work into completing the
videos, readings, quizzes, and exercises, and now you better understand
the topics presented, including cyber threats and
attacks, cryptography, network and device-based threats, and security,
compliance, and identity concepts. You now have the opportunity to
demonstrate this learning in the final course project, where you’ll integrate the concepts you’ve
learned to create a security strategy for. This exercise will assess your ability to
describe cybersecurity threat vectors and develop effective mitigation strategies. Thereafter, you will complete
the final graded assessment, which measures your mastery of the course
objectives, including your ability to describe the active threat landscape,
describe common types of cyber-attacks, classify different types of encryption
algorithms, and explain security and compliance concepts. But before you move on to complete
the final assignment and assessment, let’s take a moment to reflect
on what you’ve learned. This will help you assess your
understanding of key topics and enable you to identify any areas that may require
further exploration before you continue. During the first week,
you explored cyber threats and attacks, discovering how these malicious
activities can disrupt operations, cause damage, and provide unauthorized
access to computers and networks. You then took a deep dive
into threat landscapes, explored various malware types,
and discovered how malware works. You also learned methods
cybercriminals use to evade detection. You examined measures to
reduce your personal risk, including educating yourself and verifying
the identity of anyone who contacts you. Furthermore, you explored threat vectors
and can now explain topics like insider attacks, hardware-based attacks,
and typosquatting. You followed this learning by
delving into mitigation strategies. You explored biometrics and discovered the range of security software
options available for encrypting files. You also learned that the Windows
operating system comes with Microsoft Defender, which offers
robust features to prevent malware and phishing attacks, and
a highly capable firewall. As you wrapped up this first week, you explored the critical topic
of data loss and recovery. You explored the several ways data can be
corrupted or destroyed, and now know how to manage and avoid data loss through
the implementation of data backups. In the following week, you worked through
the fundamentals of cryptography. You learned how symmetric encryption
uses a shared secret key to encrypt and decrypt data, while asymmetric encryption
uses a pair of public and private keys. You also learned how
hashing takes input and turns it into a fixed
sized string of bytes. After that, you discovered how digital
signing and signatures use cryptographic techniques to ensure the authenticity
of electronic documents. You gained insight into digital
certificates, which are electronic credentials that validate the identity
of entities to ensure security. You also explored signed URLs, learning how they ensure only authorized
users can access certain resources. To conclude your learning on cryptography,
you deepened your understanding of centralized authentication and
authorization concepts. This exploration highlighted the
importance of multifactor authentication, a security process that demands two or more forms of authentication
to verify your identity. You then moved on to learning about
network and device-based threats. You discovered how critical it is
to guard against these threats, and learned the significance of keeping
applications and software up to date. You were introduced to
data transmission threats, exploring various attack methods and
examining tools used for intercepting data transmissions, both for
legitimate and malicious purposes. Next, you examined virtual
private networks and discovered how they are used to protect
data transmitted over public networks. You followed this by learning
about advanced persistent threats. You gained insight into the concept of IoT
threats, where actors gain unauthorized access to your IoT devices to
perform malicious activities. The next lesson dived into firewalls, where you studied a guide on configuring
your own firewall on Windows and macOS. You learned about intrusion detection and
prevention systems, which monitor network traffic and system activities to
identify security breaches and prevent it. Then, by completing a network
segmentation exercise, you learned how organizations can
protect systems and sensitive data from potential threats by segmenting
resources into multiple networks. You also explored the importance
of completing software and application updates. And now you understand
how vital they are for maintaining the security of your devices. You then moved on to learn about security,
compliance, and identity concepts. You study the compliance laws,
regulations, and guidelines, safeguarding data and information systems. You learned that GDPR is a regular that
gives individuals more control over their data. You also covered several industry
standards like ISO 27001, SOC 2, PCI-DSS, and HIPAA. You then moved on to learn that identity
management involves accurately defining, verifying, and governing identities
throughout their lifecycle. You also learned how Single sign-on, or
SSO allows you to use a single set of credentials to log in into
various online services. Next, you explored active directory and
group policy. You learned how AD helps organize and
secure network resources, while group policy enables
the centralized management and control of operating systems,
applications, and user settings. Finally, you explored
different defense models. You examined how defense in depth focuses
on data protection, application security, network controls, and physical security to
enhance resilience against cyber threats. You discovered the Zero Trust Model,
which challenges traditional notions of trust and incorporates principles such
as Always verify, Use least privilege, and Assume breach. Your learning throughout this course
has prepared you to develop effective mitigation strategies to protect
against evolving cyber threats. Now you’re finally ready to demonstrate
this learning by completing the course project and assessment. Best of luck.

Reading: About the final course project and assessment

Reading

Reading: Final course project: Security strategy

Reading

Graded Assignment: Self-review: Security strategy

You conducted a security analysis for Sam. You had to identify all potential threats, internal and external, that Sam’s Scoops might face. What were the main objectives that you took into account while conducting the analysis?

At which step in the security strategy report creation process did you consider prioritizing threats based on their potential impact and likelihood of occurrence?

What is the purpose of developing countermeasures for each identified threat in the security strategy report?

What does a comprehensive data protection strategy typically encompass?

What is the purpose of an incident response plan in the security strategy report?

Sam’s Scoops allows their employees to use their personal devices in the shop. As part of developing the security strategy, you implemented a BYOD policy. What would be a primary security enhancement for this policy?

When you created the Phishing avoidance strategy, what was the primary solution for your strategy?

Several employees have installed unapproved software on their work computers. What is the most appropriate action you could take?

Have you developed a continuous improvement plan for Sam’s Scoops’ security strategy?

Does your plan consider the business context, including regulatory requirements and Sam’s Scoops’ rapid growth?

Reading: Exemplar: Security strategy

Reading

Graded Assignment: Course quiz: Cybersecurity threat vectors and mitigation

Which of the following statements are correct regarding the use of an incremental backup system? Select all that apply.

Which of the following reasons can cause a data breach? Select all that apply.

As a cybersecurity specialist, you discovered that most of the computers in your organization are showing similar abnormal activities. Some of these computers in the network are not even connected to the internet, yet they got infected by malware. What could be the issue here? Select all that apply.

Which of the following systems were affected by the Stuxnet worm?

In a ransomware-infected system, why is it tough to recover the data or files?

A cybersecurity analyst team discovered a new type of malware that encrypts its code to evade detection. The malware also changes its code structure and appearance with each iteration. What type of malware is it?

Jamie accidentally deleted an important file containing personal data from their computer. Jamie needs to recover the file to meet a deadline but didn’t have a backup. What would be the best course of action for Jamie to attempt personal data recovery? Select all that apply.

True or False: Full disk encryption can prevent data theft if someone knows your computer password.

True or False: Heuristic analysis is more important than behavioral analysis.

Which type of encryption is typically used for securing large amounts of data?

True or False: S/MIME is typically used to encrypt email communications.

What role does hashing play in ensuring the integrity of files in an organization?

By ______ organizations can secure their remote access and internal communication channels like intranets, VPNs, and messaging applications.

Which of the following best describes the role of centralized authentication and authorization systems in managing network access?

True or False: Kerberos is used to authenticate client-server applications by using a public-key infrastructure.

True or False: The RADIUS protocol is used primarily for file sharing across a network.

Which of the following is a data transmission threat? Select all that apply.

Which of the following are the main features of an advanced persistent threat (APT) attack? Select all that apply.

Which of the following can be the devastating impact of IoT threats? Select all that apply.

Which of the following are solutions offered by Microsoft for Endpoint Security? Select all that apply.

How does an Intrusion Detection and Prevention System (IDPS) work?

Jamie is currently in the middle of a critical project and using an outdated version of the Windows operating system. It will take at least one more month to complete this project. One day, he noticed that there was a security update released by Microsoft for the same version of the operating system. There is also a newer version of Windows released. What would be the appropriate step for Jamie?

Why is security compliance important in an organization?

True or False: The risk management cycle starts with quantifying the risks.

Under GDPR, which right allows data subjects to demand that their data be deleted?

According to GDPR, what is mandatory for companies to provide to users regarding the use of cookies on their websites?

What PCI-DSS is primarily aimed at ensuring the security of?

What does identity refer to in the context of a network?

True or False: The adoption of single sign-on (SSO) increases administrative costs because it raises the number of password-related issues the IT help desk teams must manage.

What is the primary function of organizational units (OUs) within domains?

Course wrap-up


Video: Congratulations

Congratulations on Course Completion

  • You finished a cybersecurity course, demonstrating commitment and foundational knowledge.
  • This prepares you for further learning and entry-level cybersecurity jobs.

Microsoft Cybersecurity Analyst Program

  • This program offers multiple courses for deeper skills and recognized certifications.
  • Consider enrolling in other courses to broaden your expertise and appeal to employers.

Specifically, you learned about:

  • Cybersecurity threats and mitigation strategies
  • Regulations and compliance

Exam Preparation: SC-900

  • The Microsoft SC-900 exam certifies your security, identity, and compliance knowledge.
  • It focuses on Microsoft Azure, Microsoft 365, and related security solutions.
  • Visit www.learn.microsoft.com/certifications [invalid URL removed] for exam details.

Your Journey Continues

  • Cybersecurity is a vast field. Continued learning will make you a more valuable asset.
  • Completing the full program demonstrates dedication and adaptability.

Congratulations on making it
to the end of this course. Your hard work and
determination has paid off. You’ve shown that you
have what it takes to understand key concepts
of cybersecurity. With this course
under your belt, you now have a
solid foundation to build upon as you continue
your learning journey. You gained an understanding of the numerous threats the world of cybersecurity faces today. The common strategies
used to mitigate against them and the various compliance and regulations used
to enforce them. By successfully completing
all the courses in the Microsoft cybersecurity
analysts program, you will receive
Coursera certification. This program is a
great way to expand your understanding of
cybersecurity challenges. Plus, gaining a
qualification will allow you to apply for entry-level
jobs in the field. All the courses in this program, including the one
you just completed, also help you prepare for the SC 900 exam offered
by Pearson VUE. By passing the exam, you will earn Microsoft
certification in security identity
and compliance. This globally recognized
certification is industry endorsed evidence of your technical skills
and knowledge. The SC 900 exam measures
your knowledge about concepts of security
compliance and identity, capabilities of Microsoft
Azure Active Directory or Azure AD as part
of Microsoft entra. Capabilities of Microsoft
security solutions and the capabilities of
Microsoft compliance solutions. To complete the exam, you
should be familiar with Microsoft Azure
and Microsoft 365, and understand how Microsoft security compliance and
identity strategies provides an end-to-end solution
across these platforms. Please remember to check out more information about the exam. You can visit the Microsoft
certifications page at www.learn.microsoft.com/certifications
to learn more about the security
compliance and identity fundamental
certification and exam. This course has enhanced your knowledge and
skills in cybersecurity, threat vectors and mitigation, you’ve made great progress, but your journey
doesn’t end here. There’s still much more for
you to learn and discover. The Microsoft cybersecurity
analysts program offers a diverse
selection of courses, each tailored to develop
specific skills and knowledge with topics like
Information Security, Access Management,
Identity Governance, Enterprise security, and
authentication methods. The program offers
a comprehensive learning experience designed to provide you with
key competencies across various industries. Enrolling in another course is a great opportunity
to expand your skill set and gain expertise in new and exciting areas
of cybersecurity. Whether you’re a novice or just starting out as a
technical professional, completing the whole
program will show potential employers
that you are motivated, capable, and not afraid
to learn new things. It’s been a joy to travel this path of
exploration with you. Wish you all the
best in the future.