Topics
Skill: Design Solutions That Align with Security Best Practices and Priorities
Part 1: Designing Resiliency Strategies
Session 1: Designing for Ransomware and Other Attacks
- Strategies for business resiliency against ransomware and attacks
- Prioritizing threats to business-critical assets
Session 2: Designing Business Continuity and Disaster Recovery (BCDR) Solutions
- Secure backup and restore solutions for hybrid and multicloud environments
- Mitigating ransomware attacks with BCDR prioritization
Session 3: Evaluating Security Update Solutions
- Solutions to ensure timely and effective security updates
Part 2: Aligning with Microsoft Cybersecurity Reference Architectures and Benchmarks
Session 4: Designing Cybersecurity Capabilities
- Solutions that align with MCRA and MCSB best practices
- Protecting against insider, external, and supply chain attacks
Session 5: Zero Trust and Security Frameworks
- Designing Zero Trust security strategies
- Aligning with Microsoft Cloud Adoption Framework and Well-Architected Framework
Session 6: Implementing Security Governance
- Solutions using Azure landing zones
Designing DevSecOps processes for cloud adoption frameworks
Skill: Design Security Operations, Identity, and Compliance Capabilities
Part 1: Designing Security Operations
Session 7: Detection and Response Solutions
- Extended detection and response (XDR) and SIEM solutions
- Centralized logging and auditing with Microsoft Purview Audit
Session 8: Threat Management and Coverage
- Evaluating workflows for incident response and threat hunting
Using MITRE ATT&CK matrices for threat detection
Part 2: Identity and Access Management Solutions
Session 9: Designing Access Controls
- Identity and access solutions for SaaS, PaaS, IaaS, and hybrid resources
- Designing Microsoft Entra ID solutions for hybrid and multicloud environments
Session 10: Modern Authentication and Authorization
- Conditional Access strategies, risk scoring, and protected actions
- Strategies for hardening Active Directory Domain Services (AD DS)
Session 11: Securing Privileged Access
- Assigning and delegating privileged roles
- Evaluating Microsoft Entra Privileged Identity Management (PIM) and entitlement management
Part 3: Regulatory Compliance Solutions
Session 12: Translating Compliance into Security Controls
- Designing solutions with Microsoft Purview for compliance
- Addressing privacy requirements with Microsoft Priva
Session 13: Security Benchmarks and Standards
Validating regulatory standards with Microsoft Defender for Cloud
Skill: Design Security Solutions for Infrastructure
Part 1: Security Posture Management
Session 14: Managing Security Posture
- Evaluating security posture using Microsoft Defender for Cloud and Secure Score
- Integrating posture management solutions for hybrid and multicloud environments
Session 15: Securing Server and Client Endpoints
- Security baselines for servers, clients, and IoT devices
- Evaluating solutions for operational technology and ICS security
Part 2: Securing SaaS, PaaS, and IaaS Services
Session 16: Workload Security
- Security baselines for web workloads, containers, and orchestration
- Evaluating Azure AI services security
Session 17: Network Security and SSE Solutions
- Designing network security with Microsoft Entra Internet Access
Securing Microsoft 365 access in cross-tenant configurations
Skill: Design Security Solutions for Applications and Data
Part 1: Application Security
Session 18: Securing Application Portfolios
- Threat modeling for business-critical applications
- Full lifecycle strategies for application security
Session 19: API Management and Security
- Designing workload identity and API security solutions
- Using Azure Web Application Firewall (WAF) for protection
Part 2: Data Security
Session 20: Evaluating Data Security Solutions
- Data discovery, classification, and encryption solutions
- Securing Azure workloads, including SQL, Synapse Analytics, and Cosmos DB
Session 21: Defender for Storage and Databases
- Security solutions with Microsoft Defender for Storage and Defender for Databases