title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Microsoft Security, Compliance, and Identity Fundamentals
Course Description
Overview
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.Objectives
Audience
Prerequisites
-
Before attending this course, students must have:
- General understanding of networking and cloud computing concepts.
- General IT knowledge or any general experience working in an IT environment.
- General understanding of Microsoft Azure and Microsoft 365.
Topics
- Introduction
- Describe the shared responsibility model
- Describe defense in depth
- Describe the Zero Trust model
- Describe encryption and hashing
- Describe governance, risk, and compliance (GRC) concepts
- Knowledge check
- Introduction
- Define authentication and authorization
- Define identity as the primary security perimeter
- Describe the role of the identity provider
- Describe the concept of directory services and Active Directory
- Describe the concept of federation
- Knowledge check
- Introduction
- Describe Microsoft Entra ID
- Describe types of identities
- Describe hybrid identity
- Describe external identities
- Knowledge check
- Introduction
- Describe authentication methods
- Describe multifactor authentication
- Describe self-service password reset
- Describe password protection and management capabilities
- Knowledge check
- Introduction
- Describe Conditional Access
- Describe Microsoft Entra roles and role-based access control (RBAC)
- Knowledge check
- Introduction
- Describe Microsoft Entra ID Governance
- Describe access reviews
- Describe entitlement management
- Describe the capabilities of Privileged identity Management
- Describe Microsoft Entra ID Protection
- Describe Microsoft Entra Permissions Management
- Describe Microsoft Entra Verified ID
- Knowledge check
- Introduction
- Describe Azure DDoS protection
- Describe Azure Firewall
- Describe Web Application Firewall
- Describe network segmentation in Azure
- Describe Azure Network Security Groups
- Describe Azure Bastion
- Describe Azure Key Vault
- Knowledge check
- Introduction
- Describe Microsoft Defender for Cloud
- Describe how security policies and initiatives improve cloud security posture
- Describe Cloud security posture management
- Describe the enhanced security of Microsoft Defender for Cloud
- Describe DevOps security management
- Knowledge check
- Introduction
- Define the concepts of SIEM and SOAR
- Describe threat detection and mitigation capabilities in Microsoft Sentinel
- Describe Microsoft Security Copilot
- Knowledge check
- Introduction
- Describe Microsoft 365 Defender services
- Describe Microsoft Defender for Office 365
- Describe Microsoft Defender for Endpoint
- Describe Microsoft Defender for Cloud Apps
- Describe Microsoft Defender for Identity
- Describe Microsoft Defender Vulnerability Management
- Describe Microsoft Defender Threat Intelligence
- Describe the Microsoft 365 Defender portal
- Knowledge check
- Introduction
- Describe the offerings of the Service Trust portal
- Describe Microsoft's privacy principles
- Describe Microsoft Priva
- Knowledge check
- Introduction
- Describe the Microsoft Purview compliance portal
- Describe Compliance Manager
- Describe use and benefits of compliance score
- Knowledge check
- Introduction
- Know your data, protect your data, and govern your data
- Describe the data classification capabilities of the compliance portal
- Describe sensitivity labels and policies
- Describe data loss prevention
- Describe retention policies and retention labels
- Describe records management
- Describe the Microsoft Purview unified data governance solution
- Knowledge check
- Introduction
- Describe insider risk management
- Describe communication compliance
- Knowledge check
- Introduction
- Describe the eDiscovery solutions in Microsoft Purview
- Describe the audit solutions in Microsoft Purview
- Knowledge check
Related Courses
-
RHEL SELinux Policy Administration
OSUN-429- Duration: 3 Days
- Delivery Format: Classroom Training, Online Training
- Price: 1,755.00 USD
-
Microsoft Security Operations Analyst
MOC-SC-200T00- Duration: 4 Days
- Delivery Format: Classroom Training, Online Training
- Price: 2,380.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
ONCE YOU PURCHASE THIS EXAM YOU WILL NOT BE ABLE TO CANCEL YOUR ORDER. You are billed for the course after hitting submit. Exams are non-refundable.
Vouchers expire 12 months from the date they are issued, unless otherwise specified in the terms and conditions. Voucher expiration dates cannot be extended. All sales are final.Please refer to the full terms and conditions here.
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.

STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.