We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Microsoft Security, Compliance, and Identity Fundamentals

Concepts

Vlad Catrinescu

Microsoft Cloud solutions such as Microsoft 365 and Microsoft Azure are the leading enterprise cloud solutions in the world. In this course, you will learn about security concepts and methodologies that are foundational to Microsoft solutions.

Read more

Microsoft Cloud solutions such as Microsoft 365 and Microsoft Azure are the leading enterprise cloud solutions in the world. In this course, you will learn about security concepts and methodologies that are foundational to Microsoft solutions.

As more users work from home, coffee shops, and many other places outside the corporate network, security has become an even bigger concern for many organizations. In this course, Microsoft Security, Compliance, and Identity Fundamentals: Concepts, you will delve into the security methodologies and concepts that are foundational to Microsoft solutions. First, you will learn about the shared responsibility model, which is critical in understanding who protects what in a cloud world. Next, you will discover what the Zero Trust methodology is, and how embracing it can result in a more secure organization. Finally, you will explore identity concepts such as authentication and authorization, and the role of directory services in a network. When you are finished with this course, you will gain an understanding of the base concepts of security in the Microsoft Cloud. This exam also covers part of the objectives of the SC-900 certification.

Enroll now

What's inside

Syllabus

Course Overview
Cloud Computing: Who Secures What?
Security Concepts and Methodologies in the Microsoft Cloud
Identity Concepts in the Microsoft Cloud
Read more
Compliance Concepts in the Microsoft Cloud
Course Conclusion

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for professionals who are looking to strengthen their cloud security foundation
Instructed by Vlad Catrinescu, a recognized expert in Microsoft security solutions
Covers essential security concepts and methodologies for Microsoft 365 and Azure
Explores the shared responsibility model in cloud security, which is crucial for understanding the roles and responsibilities in securing cloud environments
Examines the Zero Trust methodology and its benefits in enhancing organizational security
Addresses identity concepts such as authentication, authorization, and the role of directory services

Save this course

Save Microsoft Security, Compliance, and Identity Fundamentals: Concepts to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Microsoft Security, Compliance, and Identity Fundamentals: Concepts. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Microsoft Security, Compliance, and Identity Fundamentals: Concepts will develop knowledge and skills that may be useful to these careers:
Security Architect
A Security Architect develops and implements security solutions to protect an organization's information assets, including computer networks, systems, and data. Understanding Microsoft Security can aid in designing and implementing robust security measures.
Identity and Access Management Engineer
An Identity and Access Management Engineer designs, implements, and maintains identity and access management systems to control who has access to an organization's resources. Understanding Microsoft Security can aid in managing and securing identities and access.
Security Engineer
A Security Engineer designs, implements, and maintains security systems to protect an organization's information assets. Expertise in Microsoft Security can help build a foundation for understanding security concepts and technologies.
Information Security Analyst
An Information Security Analyst safeguards computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you gain expertise in Microsoft Security, which can be applied to protecting computer networks and systems in this role.
Cloud Security Architect
A Cloud Security Architect designs and implements security solutions for cloud-based applications and infrastructure. Understanding Microsoft Security can assist in securing cloud environments and applications.
Data Security Analyst
A Data Security Analyst protects an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. Expertise in Microsoft Security can help build a foundation for understanding data security principles and practices.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains network security systems to protect an organization's computer networks and data from unauthorized access or attack. Knowledge of Microsoft Security can help in understanding how to secure networks and systems.
Security Consultant
A Security Consultant advises organizations on security best practices and helps them implement security measures to protect their information assets. Knowledge of Microsoft Security can provide a foundation for understanding security issues and solutions.
IT Auditor
An IT Auditor evaluates the effectiveness of an organization's computer systems and controls to ensure they are aligned with the organization's objectives and requirements. Knowledge of Microsoft Security can help provide insight into potential risks and vulnerabilities.
Security Manager
A Security Manager oversees an organization's security program and is responsible for developing and implementing security policies and procedures. Understanding Microsoft Security can help in managing and overseeing security initiatives.
Chief Information Security Officer
A Chief Information Security Officer (CISO) is responsible for an organization's overall security strategy and risk management. Knowledge of Microsoft Security can be valuable in developing and implementing security policies and procedures.
Compliance Auditor
A Compliance Auditor ensures that an organization's practices and procedures comply with regulatory requirements and industry standards. Knowledge of Microsoft Security can provide insights into security compliance and best practices.
Systems Administrator
A Systems Administrator manages and maintains an organization's computer systems and networks. Knowledge of Microsoft Security can assist in securing and maintaining these systems.
IT Manager
An IT Manager oversees an organization's IT department and is responsible for planning, implementing, and managing IT systems. Understanding Microsoft Security can aid in making informed decisions about security measures and strategies.
Digital Forensics Analyst
A Digital Forensics Analyst investigates and analyzes digital evidence to uncover and prevent computer crimes. Knowledge of Microsoft Security can provide a foundation for understanding the security implications and techniques involved in digital forensics.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Security, Compliance, and Identity Fundamentals: Concepts.
Delves deep into the Zero Trust methodology, providing insights into its implementation and benefits. Valuable for understanding Zero Trust in practice.
Provides a comprehensive overview of cloud security concepts, best practices, and real-world examples. Useful as a foundational reference.
A classic work in the field of security engineering, providing a rigorous and foundational exploration of security principles.
Covers the core concepts and technologies of identity management, including authentication, authorization, and identity federation. Provides a solid foundation for understanding identity concepts.
A comprehensive guide to cryptographic engineering, covering algorithms, protocols, and practical applications. Valuable for those seeking a deeper understanding of cryptography.
Provides guidance on planning, designing, and implementing a Security Operations Center (SOC), including best practices and case studies.
Provides detailed coverage of Azure Security Center, including its features, capabilities, and best practices. Valuable for those heavily invested in Azure.
Provides hands-on experience in malware analysis, including techniques for dissecting and understanding malicious code.
A valuable resource for those preparing for the CompTIA Security+ certification, covering the latest exam objectives.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Security, Compliance, and Identity Fundamentals: Concepts.
Microsoft 365 Security, Compliance, and Identity Concepts
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Microsoft Azure Solutions Architect: Implement a Hybrid...
Most relevant
Authorization and Managing Identity in Azure
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Microsoft SC-900 Exam Preparation and Practice
Most relevant
Security by Design Thinking for Cloud Architects
Most relevant
Cybersecurity Solutions and Microsoft Defender
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser