
This course is designed for individuals who want to gain a foundational understanding of security, compliance, and identity (SCI) within cloud-based and related Microsoft services.
You should have familiarity with Microsoft Azure and Microsoft 365 and aim to understand how Microsoft SCI solutions integrate across these platforms to offer a comprehensive, end-to-end solution.
Skills taught:
- Security, Compliance, and Identity Concepts (10–15%)
- Understand security and compliance concepts
- Shared responsibility model
- Defense-in-depth
- Zero Trust model
- Encryption and hashing
- Governance, Risk, and Compliance (GRC) concepts
- Understand identity concepts
- Identity as the primary security perimeter
- Authentication
- Authorization
- Identity providers
- Directory services and Active Directory
- Federation
- Understand security and compliance concepts
- Microsoft Entra Capabilities (25–30%)
- Understand Microsoft Entra ID functions and identity types
- Microsoft Entra ID
- Types of identities
- Hybrid identity
- Understand authentication capabilities of Microsoft Entra ID
- Authentication methods
- Multi-factor authentication (MFA)
- Password protection and management
- Understand access management capabilities of Microsoft Entra ID
- Conditional Access
- Microsoft Entra roles and role-based access control (RBAC)
- Understand identity protection and governance capabilities of Microsoft Entra
- Microsoft Entra ID Governance
- Access reviews
- Microsoft Entra Privileged Identity Management
- Microsoft Entra ID Protection
- Microsoft Entra Permissions Management
- Understand Microsoft Entra ID functions and identity types
- Microsoft Security Solutions Capabilities (35–40%)
- Understand core infrastructure security services in Azure
- Azure distributed denial-of-service (DDoS) Protection
- Azure Firewall
- Web Application Firewall (WAF)
- Network segmentation with Azure virtual networks
- Network security groups (NSGs)
- Azure Bastion
- Azure Key Vault
- Understand security management capabilities of Azure
- Microsoft Defender for Cloud
- Cloud Security Posture Management (CSPM)
- Security policies and initiatives for cloud security posture improvement
- Enhanced security features for cloud workload protection
- Understand capabilities of Microsoft Sentinel
- Security information and event management (SIEM) and security orchestration automated response (SOAR) concepts
- Threat detection and mitigation in Microsoft Sentinel
- Understand threat protection with Microsoft Defender XDR
- Microsoft Defender XDR services
- Microsoft Defender for Office 365
- Microsoft Defender for Endpoint
- Microsoft Defender for Cloud Apps
- Microsoft Defender for Identity
- Microsoft Defender Vulnerability Management
- Microsoft Defender Threat Intelligence (Defender TI)
- Microsoft Defender portal
- Understand core infrastructure security services in Azure
- Microsoft Compliance Solutions Capabilities (20–25%)
- Understand Microsoft Service Trust Portal and privacy principles
- Service Trust Portal offerings
- Privacy principles of Microsoft
- Microsoft Priva
- Understand compliance management capabilities of Microsoft Purview
- Microsoft Purview compliance portal
- Compliance Manager
- Uses and benefits of compliance score
- Understand information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
- Data classification capabilities
- Benefits of Content explorer and Activity explorer
- Sensitivity labels and sensitivity label policies
- Data loss prevention (DLP)
- Records management
- Retention policies, retention labels, and retention label policies
- Unified data governance solutions in Microsoft Purview
- Understand insider risk, eDiscovery, and audit capabilities in Microsoft Purview
- Insider risk management
- eDiscovery solutions in Microsoft Purview
- Audit solutions in Microsoft Purview
- Understand Microsoft Service Trust Portal and privacy principles