Microsoft Security, Compliance, and Identity Fundamentals: 1 Day Workshop

NETCOM LEARNING

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Objectives

• Describe basic concepts of security, compliance, and identity.
• Describe the concepts and capabilities of Microsoft identity and access management solutions.
• Describe the capabilities of Microsoft security solutions.
• Describe the compliance management capabilities in Microsoft.

Target Audience

• The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
• Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

Prerequisites

Required

• General understanding of networking and cloud computing concepts.
• General IT knowledge or any general experience working in an IT environment.
• General understanding of Microsoft Azure and Microsoft 365.

Agenda

• Describe basic concepts of security, compliance, and identity

1. Describe security and compliance concepts and methodologies
2. Describe identity concepts

• Describe the concepts and capabilities of Microsoft identity and access management solutions

1. Describe the basic services and identity types of Azure AD
2. Describe the authentication capabilities of Azure AD
3. Describe the access management capabilities of Azure AD
4. Describe the identity protection and governance capabilities of Azure AD
5. Lab: Explore Azure Active Directory
6. Lab: Explore Azure AD Authentication with self- service password rese
7. Lab: Explore access management in Azure AD with Conditional Access
8. Lab: Explore identity governance in Azure AD with Privileged Identity Management

• Describe the capabilities of Microsoft security solutions

1. Describe the basic security capabilities in Azure
2. Describe the security management capabilities of Azure
3. Describe the security capabilities of Azure Sentinel
4. Describe the threat protection capabilities of Microsoft 365
5. Describe the security management capabilities of Microsoft 365
6. Describe endpoint security with Microsoft Intune
7. Lab: Explore Azure Network Security Groups (NSGs)
8. Lab: Explore Azure Security Center
9. Lab: Explore Azure Sentinel
10. Lab: Explore Microsoft Cloud App Security
11. Lab: Explore the Microsoft 365 Defender portal
12. Lab: Explore Microsoft Intune

• Describe the capabilities of Microsoft compliance solutions

1. Describe the compliance management capabilities in Microsoft
2. Describe the information protection and governance capabilities of Microsoft 365
3. Describe the insider risk capabilities in Microsoft 365
4. Describe the eDiscovery and audit capabilities of Microsoft 365
5. Describe the resource governance capabilities in Azure
6. Lab: Explore the Service Trust Portal
7. Lab: Explore the Microsoft 365 compliance center & Compliance Manager
8. Lab: Explore sensitivity labels in Microsoft 365
9. Lab: Explore Insider Risk Management in Microsoft 365
10. Lab: Explore Insider Risk Management in Microsoft 365
11. Lab: Explore Azure Policy
https://store-images.s-microsoft.com/image/apps.4846.646c147e-8de5-447d-af94-b9c978102559.12215876-cd03-43a6-b21f-be1b04e45391.e709f3ac-6e45-4fa9-aedc-d25ce0671a47
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.4846.646c147e-8de5-447d-af94-b9c978102559.12215876-cd03-43a6-b21f-be1b04e45391.e709f3ac-6e45-4fa9-aedc-d25ce0671a47
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.4846.646c147e-8de5-447d-af94-b9c978102559.12215876-cd03-43a6-b21f-be1b04e45391.e709f3ac-6e45-4fa9-aedc-d25ce0671a47