Researcher’s footnotes: a sailcloth adjustment.
Hey folks, just wrapped up my exam with MS365 SA and I wanted to post some thoughts that I’m allowed to share on the coursework and journey.
On the course material through microsoft learn, there was a section talking about how cloud app security detects and logs mimikatz activity on the network. Microsoft’s stance and adaptation of mitre attack framework through sentinel playbooks was also on display. That was the stuff I was engaged in, getting trials for and getting my hands dirty building out.
A good portion of the content I reviewed alongside that wasn’t grabbing me with an interest in enterprise & E5 tools, plus office 365 administration. I figured I’d just get the exam out of the way and go back to building stuff, like static websites and saml pentests.
4 weeks to learn all this without the work experience, it was a steep mountain for sure. Can’t say the results surprised me, but the fact that I got the chance to build out all kind of invaluable resources to document in my blog was worth the time. I’m far from discouraged, and I’m rather empowered to move back into making tools and experimenting with more in the Azure dev security course.
Now that we’re done looking at this, a quick break. Carry that knowledge onto az-500 and building some apps to host these topics.
Thanks for sticking around, more exciting projects ahead so stay tuned, and stay safe!