YoVDO

Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft security solutions

Offered By: Microsoft via Microsoft Learn

Tags

Information Technology Courses Network Security Courses Microsoft Intune Courses Endpoint Security Courses Security Management Courses Azure Security Courses Virtual Machine Security Courses Microsoft Sentinel Courses

Course Description

Overview

  • Module 1: Describe basic security capabilities in Azure
  • After completing this module, you will be able to:

    • Learn how Azure security capabilities can protect the network
    • Learn how Azure can protect your VMs
    • Learn how encryption on Azure can protect your data
  • Module 2: Describe security management capabilities of Azure
  • After completing this module, you will be able to:

    • Describe the security management capabilities of Azure
    • Describe the benefits and use cases of Azure Defender
    • Learn about security baselines
  • Module 3: Describe security capabilities of Microsoft Sentinel
  • After completing this module, you will be able to:

    • Understand the concepts of SIEM, SOAR, and XDR
    • Describe the role of SIEM to provide integrated threat protection
    • Describe the capabilities of Sentinel
  • Module 4: Describe threat protection with Microsoft 365 Defender
  • After completing this module, you will be able to:

    • Describe the services of Microsoft 365 Defender
    • Describe how Microsoft 365 Defender provides integrated protection against sophisticated attacks
  • Module 5: Describe security management capabilities of Microsoft 365
  • After completing this module, you will be able to:

    • Describe the security management capabilities of Microsoft 365
    • Explore the security reports and dashboards in the Microsoft 365 Security Center
    • Describe incident management capabilities of Microsoft 365
  • Module 6: Describe endpoint security with Microsoft Intune
  • After completing this module, you will be able to:

    • Describe how to manage endpoint security with Microsoft Intune
    • Explore the Microsoft Endpoint Manager admin portal

Syllabus

  • Module 1: Describe basic security capabilities in Azure
    • Introduction
    • Describe Azure Network Security groups
    • Describe Azure DDoS protection
    • Describe what is Azure Firewall
    • Describe what is Azure Bastion
    • Describe what is Web Application Firewall
    • Describe ways Azure encrypts data
    • Knowledge check
    • Summary and resources
  • Module 2: Describe security management capabilities of Azure
    • Introduction
    • Describe Cloud security posture management
    • Describe Microsoft Defender for Cloud
    • Describe secure score in Microsoft Defender for Cloud
    • Describe the enhanced security of Microsoft Defender for Cloud
    • Describe security baselines for Azure
    • Knowledge check
    • Summary and resources
  • Module 3: Describe security capabilities of Microsoft Sentinel
    • Introduction
    • Define the concepts of SIEM, SOAR, XDR
    • Describe how Microsoft Sentinel provides integrated threat protection
    • Understand Sentinel costs
    • Knowledge check
    • Summary and resources
  • Module 4: Describe threat protection with Microsoft 365 Defender
    • Introduction
    • Describe Microsoft 365 Defender services
    • Describe Microsoft Defender for Identity
    • Describe Microsoft Defender for Office 365
    • Describe Microsoft Defender for Endpoint
    • Describe Microsoft Defender for Cloud Apps
    • Knowledge check
    • Summary and resources
  • Module 5: Describe security management capabilities of Microsoft 365
    • Introduction
    • Describe and explore the Microsoft 365 Defender portal
    • Describe how to use Microsoft Secure Score
    • Explore security reports and dashboards
    • Describe incidents capabilities
    • Knowledge check
    • Summary and resources
  • Module 6: Describe endpoint security with Microsoft Intune
    • Introduction
    • Describe what is Intune
    • Describe endpoint security with Intune
    • Knowledge check
    • Summary and resources

Tags

Related Courses

Check Point Jump Start: Harmony Endpoint Security
Checkpoint via Coursera
Check Point Jump Start: Harmony Endpoint Security
Checkpoint via edX
Deploy Secure Endpoints for Users with ChromeOS
Google Cloud via Coursera
Systems and Application Security
(ISC)² via Coursera
Cybersecurity Architecture
IBM via Coursera