We may earn an affiliate commission when you visit our partners.
Vlad Catrinescu

In this course you will learn the security solutions Microsoft offers for Microsoft 365 and Azure.

Read more

In this course you will learn the security solutions Microsoft offers for Microsoft 365 and Azure.

With most of your content and services now in the cloud, it’s imperative that you use the right security tools to mitigate risk and detect and remediate breaches before they cause any harm to your organization. In this course, Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions, you will first learn about the Azure security capabilities to protect your IaaS and PaaS workloads. Next, you will discover Microsoft Sentinel, a cloud-native SIEM and SOAR platform. Finally, you will learn how Microsoft 365 Defender can protect your identities, as well as email and documents. When you are finished with this course, you will gain an understanding of the security solutions in the Microsoft cloud and how they can help keep an organization safe. This course also covers part of the objectives of the SC-900 certification.

Enroll now

What's inside

Syllabus

Course Overview
Infrastructure Security Services in Microsoft Azure
Security Management Capabilities in Microsoft Azure
Threat Detection and Mitigation with Microsoft Sentinel
Read more
Introduction to Microsoft Defender XDR
Extended Detection and Response with Microsoft Defender XDR
Discover and Control Shadow IT with Defender for Cloud Apps
Course Conclusion

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines security solutions for Microsoft 365 and Azure
Covers part of the objectives of the SC-900 certification
Teaches how to use security tools to mitigate risk in the cloud

Save this course

Save Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions with these activities:
Review Network Security Best Practices
Solidify your understanding of fundamental network security concepts and best practices.
Browse courses on network security
Show steps
  • Revise principles of network segmentation and access control
  • Review common network security threats and vulnerabilities
  • Explore best practices for firewall configuration and management
Explore Microsoft's Azure Security Center
Familiarize yourself with Azure's central security hub to manage and monitor your cloud security posture.
Browse courses on Azure Security Center
Show steps
  • Visit the Azure Security Center portal
  • Navigate through its dashboard and explore the available tools
  • Review the security recommendations and alerts
Configure Security Policies in Azure
Reinforce your understanding of Azure security by implementing and customizing security policies.
Browse courses on Azure Security Policies
Show steps
  • Create a new security policy in Azure
  • Configure rules for threat detection and prevention
  • Test and validate your security policy
Five other activities
Expand to see all activities and additional details
Show all eight activities
Join an Azure Security Community
Engage with security professionals in the Azure community to share knowledge and best practices.
Browse courses on Networking
Show steps
  • Join Azure security-related groups on LinkedIn or other platforms
  • Attend Azure security meetups and webinars
  • Participate in online forums and discussions
Implement Microsoft Sentinel for Threat Detection
Enhance your security monitoring capabilities by setting up Microsoft Sentinel to aggregate and analyze security data.
Browse courses on Microsoft Sentinel
Show steps
  • Create a Microsoft Sentinel workspace
  • Connect your data sources to Sentinel
  • Configure alerts and incident response playbooks
Develop a Security Incident Response Plan
Create a comprehensive plan to guide your response to security incidents and minimize their impact.
Browse courses on Incident Management
Show steps
  • Define the roles and responsibilities of team members
  • Establish communication and notification protocols
  • Develop procedures for incident detection, investigation, and containment
Develop a Security Awareness Training Module
Create training materials to educate your team on cybersecurity best practices and common security risks.
Show steps
  • Identify the key security topics to cover
  • Develop interactive and engaging training content
  • Test and deliver the training module to your team
Contribute to an Open-Source Security Project
Engage with the open-source community and contribute to projects that align with the course content.
Browse courses on Open Source
Show steps
  • Identify open-source security projects of interest
  • Review the project's documentation and codebase
  • Contribute code, documentation, or other support to the project

Career center

Learners who complete Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is responsible for identifying and mitigating risks to an organization's computer systems. This course can help you become an Information Security Analyst by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to protect your organization from cyberattacks and data breaches.
Security Architect
A Security Architect designs and implements security measures to protect an organization's computer systems. This course can help you become a Security Architect by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to design and implement security measures that will protect your organization from cyberattacks and data breaches.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. This course can help you become a Security Consultant by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to provide advice and guidance to organizations on how to improve their security posture.
Cloud Security Engineer
A Cloud Security Engineer designs and implements security measures to protect an organization's cloud computing environment. This course can help you become a Cloud Security Engineer by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to design and implement security measures that will protect your organization's cloud computing environment.
Cybersecurity Analyst
A Cybersecurity Analyst investigates and responds to cybersecurity incidents. This course can help you become a Cybersecurity Analyst by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to investigate and respond to cybersecurity incidents.
IT Security Manager
An IT Security Manager oversees the security of an organization's computer systems and network. This course can help you become an IT Security Manager by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to oversee the security of your organization's computer systems and network.
Security Analyst
A Security Analyst monitors and analyzes security data to identify threats and vulnerabilities. This course can help you become a Security Analyst by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to monitor and analyze security data to identify threats and vulnerabilities.
Security Engineer
A Security Engineer designs and implements security measures to protect an organization's computer systems and network. This course can help you become a Security Engineer by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to design and implement security measures that will protect your organization's computer systems and network.
Risk Manager
A Risk Manager identifies and assesses risks to an organization's assets. This course can help you become a Risk Manager by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to identify and assess risks to your organization's assets.
Compliance Manager
A Compliance Manager ensures that an organization complies with relevant laws and regulations. This course can help you become a Compliance Manager by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge will help you to ensure that your organization complies with relevant laws and regulations.
Forensic Analyst
A Forensic Analyst investigates and analyzes evidence to identify and apprehend criminals. This course may be useful for you if you want to become a Forensic Analyst by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge may help you to investigate and analyze evidence to identify and apprehend criminals.
Vulnerability Analyst
A Vulnerability Analyst identifies and assesses vulnerabilities in an organization's computer systems and network. This course may be useful for you if you want to become a Vulnerability Analyst by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge may help you to identify and assess vulnerabilities in your organization's computer systems and network.
Systems Engineer
A Systems Engineer designs and implements computer systems and networks. This course may be useful for you if you want to become a Systems Engineer by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge may help you to design and implement computer systems and networks.
Network Engineer
A Network Engineer designs and implements computer networks. This course may be useful for you if you want to become a Network Engineer by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge may help you to design and implement computer networks.
Data Analyst
A Data Analyst analyzes data to identify trends and patterns. This course may be useful for you if you want to become a Data Analyst by teaching you about the security solutions Microsoft offers for Microsoft 365 and Azure. You will learn about Azure security capabilities, Microsoft Sentinel, and Microsoft 365 Defender. This knowledge may help you to analyze data to identify trends and patterns.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions.
Provides a comprehensive overview of cryptography, covering fundamental concepts, algorithms, and protocols. It valuable resource for anyone looking to gain a deep understanding of cryptography and its applications in security.
Provides a captivating account of a real-life cyber espionage case, offering insights into the nature of cyber attacks and the human element involved. It valuable resource for anyone interested in the history and psychology of cybersecurity.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions.
Microsoft 365 Security, Compliance, and Identity Concepts
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Microsoft 365 Security Management Fundamentals
Most relevant
Microsoft Azure Management Tools and Security Solutions
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Microsoft 365 Administration: Managing Security Using...
Most relevant
Cybersecurity Solutions and Microsoft Defender
Most relevant
Manage Security Operations
Most relevant
Microsoft Security, Compliance, and Identity Fundamentals...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser