Topics
Skill: Describe the Concepts of Security, Compliance, and Identity
Part 1: Describe Security and Compliance Concepts
Session 1: Shared Responsibility Model
- Understanding shared responsibilities between cloud providers and customers
Session 2: Defense-in-Depth
- Layers of security to protect against threats
Session 3: Zero Trust Model
- Principles and implementation of the Zero Trust framework
Session 4: Encryption and Hashing
- Concepts and differences between encryption and hashing techniques
Session 5: Governance, Risk, and Compliance (GRC)
- Overview of GRC and its role in managing organizational risk
Part 2: Define Identity Concepts
Session 6: Identity as the Primary Security Perimeter
- Importance of identity in securing modern environments
Session 7: Authentication and Authorization
- Defining authentication vs. authorization
- Exploring identity providers and their roles
Session 8: Directory Services and Federation
- Concepts of Active Directory and federated identity systems
Skill: Describe the Capabilities of Microsoft Entra
Part 1: Functions and Identity Types in Microsoft Entra ID
Session 9: Overview of Microsoft Entra ID
- Key functions and features of Microsoft Entra ID
Session 10: Identity Types
- Types of identities: cloud-only, hybrid, and external
Session 11: Hybrid Identity
- Implementing hybrid identity with on-premises and cloud integration
Part 2: Authentication Capabilities in Microsoft Entra ID
Session 12: Authentication Methods
- Exploring various authentication methods supported by Microsoft Entra ID
Session 13: Multi-Factor Authentication (MFA)
- Benefits and implementation of MFA
Session 14: Password Protection and Management
- Features for secure password management
Part 3: Access Management in Microsoft Entra ID
Session 15: Conditional Access
- Configuring Conditional Access policies
Session 16: Role-Based Access Control (RBAC)
- Defining roles and managing access using RBAC
Session 17: Identity Protection and Governance
- Capabilities of Microsoft Entra ID Governance and Privileged Identity Management (PIM)
- Features of Microsoft Entra ID Protection and Permissions Management
Skill: Describe the Capabilities of Microsoft Security Solutions
Part 1: Core Infrastructure Security Services in Azure
Session 18: Network Security
- Azure DDoS Protection, Azure Firewall, and Web Application Firewall (WAF)
- Network segmentation using virtual networks, NSGs, and Azure Bastion
Session 19: Azure Key Vault
- Secure storage and management of keys, secrets, and certificates
Part 2: Security Management in Azure
Session 20: Microsoft Defender for Cloud
- Features for cloud security posture management and workload protection
Session 21: Microsoft Sentinel
- SIEM and SOAR capabilities of Microsoft Sentinel
- Threat detection and mitigation with Sentinel
Part 3: Threat Protection with Microsoft Defender XDR
Session 22: Overview of Defender Services
- Microsoft Defender for Office 365, Endpoint, Cloud Apps, and Identity
- Threat intelligence with Defender TI and vulnerability management
Session 23: Microsoft Defender Portal
- Unified interface for managing Defender services
Skill: Describe the Capabilities of Microsoft Compliance Solutions
Part 1: Microsoft Service Trust Portal and Privacy Principles
Session 24: Trust and Privacy
- Offerings of the Service Trust Portal
- Overview of Microsoft’s privacy principles
Session 25: Microsoft Priva
- Features and benefits of Priva for data privacy management
Part 2: Compliance Management with Microsoft Purview
Session 26: Compliance Portal and Manager
- Overview of the Purview compliance portal
- Using Compliance Manager and compliance score
Session 27: Data Classification and Governance
- Benefits of Content explorer, Activity explorer, and sensitivity labels
- Features for data loss prevention (DLP) and records management
Session 28: Retention Policies and Unified Governance
- Retention policies, labels, and lifecycle management
- Unified governance with Purview
Part 3: Insider Risk, eDiscovery, and Audit Solutions in Purview
Session 29: Managing Insider Risks
- Capabilities of insider risk management
Session 30: eDiscovery and Audit
- Solutions for eDiscovery and auditing with Microsoft Purview