Security Refresher
Security Frameworks
Security Regulations
HIPAA/HITRUST, PCI-DSS, GDPR
Security Operations Centers
SIEM Theory (Sentinel)
SIEM Experience (Sentinel)
Alert Configuration
Incident Response
Azure Active Directory
Logging and Monitoring
Kusto Query Language (KQL)
Actual Resume Experience
Portfolio Creation
Resume Construction
Social Network Development
Practice Interview Questions
Job Hunting Guidance
Josh Madakor began his IT career in 2007 as a help desk technician at a local community college. Over the years, he has gained experience in various disciplines including Software Development, System Engineering, and Cybersecurity. More recently, his roles in cybersecurity has allowed him to work with a diverse range of industries including local and state government, finance, defense contracting, as well as within the private sector as a contractor with Microsoft. At Microsoft, Josh has had the opportunity to assist with the development and maintenance of the Microsoft Cloud Security Benchmark.
In addition to his day job, Josh has been running a successful YouTube channel since 2020, focusing on IT, cybersecurity, education, and career development. His channel has helped hundreds, if not thousands, of viewers advance in their careers.
In celebration of launching the course, I have taken the time to create this completely free Azure Fundamentals (Exam: AZ-900) practice question deck with over 250 questions, complete with explanations for correct and incorrect answers as well as reference links for every single question. In order to use this deck, you'll need to download and install an app called "Anki". This works on Mac, Windows, iPhone, and Android.
One of the SIEM (Azure Sentinel) and incident response labs. Pictured is a list of security incidents waiting to be addressed. (SP 800-61 Rev. 2, Computer Security Incident Handling Guide, covered within the course)
An attack map we create during the course. This map in particular, plots the origination of malicious network flows from around the world destined for the cloud resources we setup.
Here is a diagram of the environment we will setup in Azure. Initially, the Virtual Machines, SQL Server, and other components will be exposed to the public Internet where, once discovered, they will be subject to non-stop attacks which we will use to generate incidents and practice Incident Response. After observing our environment in this insecure state for at least 24 hours, we will then harden the environment by implement a few security controls. After the environment has been hardened, we will monitor it for another 24 hours and observe the results by comparing stats from the two time periods.