Why it pays to be secure – Chapter 4 – I want to learn!

Written by

Use these Learning Paths to find a range of Microsoft training references and resources on information security threats and appropriate countermeasures. Learning resources are organised by level (from basic to expert) and provide information on the planning, prevention, detection, and response phases of security implementation.

Threat and Vulnerability Mitigation Learning Resources:

Learn about information security technologies that offer defense-in-depth protection against attacks and provide customers with central visibility and control of the information security environment. These applications include defenses such as firewalls; anti-virus, anti-spyware, and anti-spam software; network access protection; and others.

Security Fundamentals:

Combine Microsoft technology with tools and guidance to help build a secure foundation for your IT infrastructure. Learn about technologies intrinsic to the operating system that help make computers more resilient to attacks and provide the foundation upon which you can build your other technology investments.

Managing Updates and Safeguarding Your Systems:

The exploitation of information security vulnerabilities in operating systems and application software can lead to loss of revenue and intellectual property. Having properly configured systems, using the latest software, and installing the recommended software updates can help you mitigate this threat. Use the resources in this learning path to help you manage updates and simplify the task of protecting your systems.

The IT Infrastructure Threat Modelling Guide is now available.

Organisations today face an increasing number of threats to their computing environments. You need a proactive approach to assist you in your efforts to protect your organisation's assets and sensitive information. This guide provides an easy-to-understand method that enables you to develop threat models for your IT environment and prioritise your investments in IT infrastructure security.

This Solution Accelerator includes a Microsoft Word document that helps IT professionals develop and implement threat models for their IT environments, and a Microsoft PowerPoint® presentation that is designed for use in a learning or lecture environment to present the concept of IT infrastructure threat modelling. These materials are designed to help IT professionals accomplish the following:

  • Provide use case scenarios for each component to be threat modelled.
  • Identify threats that could affect their organisations’ IT infrastructures.
  • Discover and mitigate design and implementation issues that could put IT infrastructures at risk.
  • Prioritise budget and planning efforts to address the most significant threats.
  • Conduct security efforts for both new and existing IT infrastructure components in a more proactive and cost-effective manner.


What’s hot on Infosecurity Magazine?