Free Excel Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Excel.

Excel Assessment

Free Microsoft Word Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Word.

Word Assessment

Free PowerPoint Skills Assessment

Very short questionnaire to establish your skill level with Microsoft PowerPoint.

PowerPoint Assessment

Demand for cybersecurity skills is at an all-time high

Closing the Gap in Leadership Training Closing the Gap in Leadership Training
Previous Article
Are You Opening the Door to Black Hats? Are You Opening the Door to Black Hats?
Next Article

Discover your Security, Compliance, and Identity opportunity

Demand for cybersecurity skills is at an all-time high

Discover your Security, Compliance, and Identity opportunity

The unrelenting headlines about cyberattacks from ransomware to international cyberwarfare as precursor to invasion remind us of one thing, the importance and need for highly skilled professionals to defend and secure our critical systems.

Trouble is, there simply aren’t enough of them!

The cybersecurity challenge—and opportunity

  1. The need for skilled cybersecurity professionals is clear
  2. The threats are real, from ransomware to international cyberwarfare
  3. We simply don't have enough

The number of cybersecurity jobs is expected to more than double between now and 2025. And it'scosting money: 71% of employers have incurred damages because of cyber talent deficit.3

And these are great jobs with some of the highest salaries in the tech field. Some are full-time cybersecurity jobs, like a chief information security officer, or CISO.  Others involve a combination of cybersecurity and other IT functions.

Security, compliance, and identity job titles also include:

  1. Cybersecurity Analyst
  2. Information Security Engineer
  3. Software Developer
  4. Software Engineer
  5. Network Engineer
  6. Computer Systems Architect
  7. Network/Systems Administrator
  8. Computer Support Specialist
  9. IT Project Manager
  10. Business Management Analyst
  11. Systems Analyst

If you have any interest in becoming a certified security professional, Microsoft offers a comprehensive collection of training options across Microsoft solutions that allow you to advance your technical skills while earning credentials and security, compliance, and identity certifications. If you’re looking to expand your career, explore how Microsoft's role-based courses can help keep you aligned to meet today’s challenges. Skill up with Microsoft training Partner New Horizons and prove your expertise, gain recognition and cultivate new opportunities. 

Choose your security, compliance, and identity certification path

Microsoft Certified: Security, Compliance, and Identity Fundamentals
Whether you’re a business stakeholder, new or existing IT professional, or a student who has an interest in Microsoft security, compliance, and identity (SCI) solutions, this certification can help you familiarize yourself with the fundamentals of SCI across cloud-based and related Microsoft services.

Microsoft Certified: Azure Security Engineer Associate
Azure Security Engineers implement security controls and threat protection, manage identity and access, and protect data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure.

Microsoft Certified: Microsoft 365 Security Administrator Associate
Microsoft 365 Security Administrators proactively secure Microsoft 365 enterprise and hybrid environments, implement and manage security and compliance solutions, respond to threats, and enforce data governance.

Microsoft Certified: Security Operations Analyst Associate
The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.

Microsoft Certified: Identity and Access Administrator Associate
The Identity and Access Administrator may be a single individual or a member of a larger team. This role collaborates with many other roles in the organization to drive strategic identity projects to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

Microsoft Certified: Information Protection Administrator Associate
The Information Protection Administrator defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

View all our Microsoft Security Courses

1: Industry Skills Report, 2021, Coursera 

2: A Resilient Cybersecurity Profession Charts the Path Forward, (ISC)2 Cybersecurity Workforce Study, 2021, (ISC)2, 2021

3: Key Statistics from Global Cybersecurity Outlook 2022, Swiss Cyber Institute, March 10, 2022

/ Author: Suellen Machado / Number of views: 1460 / Comments: 0 /

Theme picker



Subscribe to our Newsletter

cheat sheet resources

Subscribe to our Newsletter for all the latest cheat sheets and resources.


Follow us on Linkedin for the lastest cheat sheets and learning resources