Duration:
1 Day
Audience:
Employees of federal, state and local governments; and businesses working with the government.
Course Description:
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions
Learning Objectives:
After completing this course, students will be able to:
- Describe basic concepts of security, compliance, and identity.
- Describe the concepts and capabilities of Microsoft identity and access management solutions.
- Describe the capabilities of Microsoft security solutions.
- Describe the compliance management capabilities in Microsoft
Course Outline
1 – DESCRIBE BASIC CONCEPTS OF SECURITY, COMPLIANCE, AND IDENTITY
- Describe security concepts and methodologies.
- Describe Microsoft security and compliance principles.
- Module summary
- After completing this module, students will be able to:
- Describe security concepts and methodologies.
- Explore the Service Trust Portal.
- Know where to go to find and review Azure compliance documentation.
2 – DESCRIBE THE CONCEPTS AND CAPABILITIES OF MICROSOFT IDENTITY AND ACCESS MANAGEMENT SOLUTIONS
- Describe identity concepts
- Describe the basic services and identity types of Azure AD
- Describe the authentication capabilities of Azure AD
- Describe the access management capabilities of Azure AD
- Describe the identity protection and governance capabilities of Azure AD
- Module summary
- After completing this module, students will be able to:
- Describe basic identity concepts.
- Describe the basic services and identity types of Azure AD
- Describe the authentication capabilities of Azure AD.
- Describe the access management capabilities of Azure AD.
- Describe the identity protection and governance capabilities of Azure AD.
3 – DESCRIBE THE CAPABILITIES OF MICROSOFT SECURITY SOLUTIONS
- Describe the basic security capabilities in Azure
- Describe the security management capabilities of Azure
- Describe the security capabilities of Azure Sentinel
- Describe the threat protection capabilities of Microsoft 365
- Describe the security management capabilities of Microsoft 365
- Describe endpoint security with Microsoft Intune
- Module summary
- After completing this module, students will be able to:
- Describe the basic security capabilities in Azure.
- Describe the security management capabilities of Azure.
- Describe the security capabilities of Azure Sentinel.
- Describe the threat protection capabilities of Microsoft 365.
- Describe the security management capabilities of Microsoft 365.
- Describe endpoint security with Microsoft Intune.
4 – DESCRIBE THE CAPABILITIES OF MICROSOFT COMPLIANCE SOLUTIONS
- Describe the compliance management capabilities in Microsoft
- Describe the information protection and governance capabilities of Microsoft 365
- Describe the insider risk capabilities in Microsoft 365
- Describe the eDiscovery capabilities of Microsoft 365
- Describe the audit capabilities of Microsoft 365
- Describe the resource governance capabilities in Azure
- Module summary
- After completing this module, students will be able to:
- Describe the compliance management capabilities in Microsoft.
- Describe the information protection and governance capabilities of Microsoft 365.
- Describe the insider risk capabilities in Microsoft 365.
- Describe the eDiscovery capabilities of Microsoft 365.
- Describe the audit capabilities of Microsoft 365
- Describe the resource governance capabilities in Azure