Design solutions for securing server and client endpoints
You learn how to analyze the security requirements for different types of endpoints including servers, clients, IoT, OT, mobile, and embedded devices. These requirements will take into account different platforms and operating systems and set standards for endpoint protection, hardening and configuration.
Note
This content was partially created with the help of AI. An author reviewed and revised the content as needed. Read more.
Security Engineer
Solution Architect
Azure
Microsoft Sentinel
Microsoft Defender for Cloud
Microsoft Defender for Cloud Apps
Microsoft Defender for Identity
Module Objectives
By the end of this module, you are able to:
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify security requirements for IoT devices and embedded systems
- Design a solution for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
- Specify security baselines for server and client endpoints
- Design a solution for secure remote access
Units
Prerequisites
- Advanced experience and knowledge in identity and access, platform protection, security operations, securing data, and securing applications.
- Experience with hybrid and cloud implementations.