title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Microsoft Security, Compliance, and Identity Fundamentals
Course Description
Overview
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.Objectives
Audience
Prerequisites
-
Before attending this course, students must have:
- General understanding of networking and cloud computing concepts.
- General IT knowledge or any general experience working in an IT environment.
- General understanding of Microsoft Azure and Microsoft 365.
Topics
- Introduction
- Describe the shared responsibility model
- Describe defense in depth
- Describe the Zero Trust model
- Describe encryption and hashing
- Describe governance, risk, and compliance (GRC) concepts
- Knowledge check
- Introduction
- Define authentication and authorization
- Define identity as the primary security perimeter
- Describe the role of the identity provider
- Describe the concept of directory services and Active Directory
- Describe the concept of federation
- Knowledge check
- Introduction
- Describe Microsoft Entra ID
- Describe types of identities
- Describe hybrid identity
- Describe external identities
- Knowledge check
- Introduction
- Describe authentication methods
- Describe multifactor authentication
- Describe self-service password reset
- Describe password protection and management capabilities
- Knowledge check
- Introduction
- Describe Conditional Access
- Describe Microsoft Entra roles and role-based access control (RBAC)
- Knowledge check
- Introduction
- Describe Microsoft Entra ID Governance
- Describe access reviews
- Describe entitlement management
- Describe the capabilities of Privileged identity Management
- Describe Microsoft Entra ID Protection
- Describe Microsoft Entra Permissions Management
- Describe Microsoft Entra Verified ID
- Knowledge check
- Introduction
- Describe Azure DDoS protection
- Describe Azure Firewall
- Describe Web Application Firewall
- Describe network segmentation in Azure
- Describe Azure Network Security Groups
- Describe Azure Bastion
- Describe Azure Key Vault
- Knowledge check
- Introduction
- Describe Microsoft Defender for Cloud
- Describe how security policies and initiatives improve cloud security posture
- Describe Cloud security posture management
- Describe the enhanced security of Microsoft Defender for Cloud
- Describe DevOps security management
- Knowledge check
- Introduction
- Define the concepts of SIEM and SOAR
- Describe threat detection and mitigation capabilities in Microsoft Sentinel
- Describe Microsoft Security Copilot
- Knowledge check
- Introduction
- Describe Microsoft 365 Defender services
- Describe Microsoft Defender for Office 365
- Describe Microsoft Defender for Endpoint
- Describe Microsoft Defender for Cloud Apps
- Describe Microsoft Defender for Identity
- Describe Microsoft Defender Vulnerability Management
- Describe Microsoft Defender Threat Intelligence
- Describe the Microsoft 365 Defender portal
- Knowledge check
- Introduction
- Describe the offerings of the Service Trust portal
- Describe Microsoft's privacy principles
- Describe Microsoft Priva
- Knowledge check
- Introduction
- Describe the Microsoft Purview compliance portal
- Describe Compliance Manager
- Describe use and benefits of compliance score
- Knowledge check
- Introduction
- Know your data, protect your data, and govern your data
- Describe the data classification capabilities of the compliance portal
- Describe sensitivity labels and policies
- Describe data loss prevention
- Describe retention policies and retention labels
- Describe records management
- Describe the Microsoft Purview unified data governance solution
- Knowledge check
- Introduction
- Describe insider risk management
- Describe communication compliance
- Knowledge check
- Introduction
- Describe the eDiscovery solutions in Microsoft Purview
- Describe the audit solutions in Microsoft Purview
- Knowledge check
Related Courses
-
RHEL SELinux Policy Administration
OSUN-429- Duration: 3 Days
- Delivery Format: Classroom Training, Online Training
- Price: 1,755.00 USD
-
Microsoft Security Operations Analyst
MOC-SC-200T00- Duration: 4 Days
- Delivery Format: Classroom Training, Online Training
- Price: 2,380.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Please refer to the full terms and conditions here.
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.
STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.