Duration:

1 Day

Audience:

Employees of federal, state and local governments; and businesses working with the government.

Course Description:

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions

Learning Objectives:

After completing this course, students will be able to:

  • Describe basic concepts of security, compliance, and identity.
  • Describe the concepts and capabilities of Microsoft identity and access management solutions.
  • Describe the capabilities of Microsoft security solutions.
  • Describe the compliance management capabilities in Microsoft

Course Outline

1 – DESCRIBE BASIC CONCEPTS OF SECURITY, COMPLIANCE, AND IDENTITY
  • Describe security concepts and methodologies.
  • Describe Microsoft security and compliance principles.
  • Module summary
  • After completing this module, students will be able to:
  • Describe security concepts and methodologies.
  • Explore the Service Trust Portal.
  • Know where to go to find and review Azure compliance documentation.
2 – DESCRIBE THE CONCEPTS AND CAPABILITIES OF MICROSOFT IDENTITY AND ACCESS MANAGEMENT SOLUTIONS
  • Describe identity concepts
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD
  • Describe the access management capabilities of Azure AD
  • Describe the identity protection and governance capabilities of Azure AD
  • Module summary
  • After completing this module, students will be able to:
  • Describe basic identity concepts.
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD.
  • Describe the access management capabilities of Azure AD.
  • Describe the identity protection and governance capabilities of Azure AD.
3 – DESCRIBE THE CAPABILITIES OF MICROSOFT SECURITY SOLUTIONS
  • Describe the basic security capabilities in Azure
  • Describe the security management capabilities of Azure
  • Describe the security capabilities of Azure Sentinel
  • Describe the threat protection capabilities of Microsoft 365
  • Describe the security management capabilities of Microsoft 365
  • Describe endpoint security with Microsoft Intune
  • Module summary
  • After completing this module, students will be able to:
  • Describe the basic security capabilities in Azure.
  • Describe the security management capabilities of Azure.
  • Describe the security capabilities of Azure Sentinel.
  • Describe the threat protection capabilities of Microsoft 365.
  • Describe the security management capabilities of Microsoft 365.
  • Describe endpoint security with Microsoft Intune.
4 – DESCRIBE THE CAPABILITIES OF MICROSOFT COMPLIANCE SOLUTIONS
  • Describe the compliance management capabilities in Microsoft
  • Describe the information protection and governance capabilities of Microsoft 365
  • Describe the insider risk capabilities in Microsoft 365
  • Describe the eDiscovery capabilities of Microsoft 365
  • Describe the audit capabilities of Microsoft 365
  • Describe the resource governance capabilities in Azure
  • Module summary
  • After completing this module, students will be able to:
  • Describe the compliance management capabilities in Microsoft.
  • Describe the information protection and governance capabilities of Microsoft 365.
  • Describe the insider risk capabilities in Microsoft 365.
  • Describe the eDiscovery capabilities of Microsoft 365.
  • Describe the audit capabilities of Microsoft 365
  • Describe the resource governance capabilities in Azure