Overview
Enhance your organization's security by managing identity and access in Microsoft 365. This comprehensive course covers critical cybersecurity concepts and practices, enabling you to effectively protect your enterprise environment.
-
Module 1: Examine threat vectors and understand how hackers exploit users to access targets by executing malicious content.
By the end of this module, you should be able to:
- Describe techniques hackers use to compromise user accounts through email
- Describe techniques hackers use to gain control over resources
- Describe techniques hackers use to compromise data
- Mitigate an account breach
- Prevent an elevation of privilege attack
- Prevent data exfiltration, data deletion, and data spillage
-
Module 2: Delve into the Zero Trust security model, its principles, and support in Microsoft 365.
By the end of this module, you should be able to:
- Describe the Zero Trust approach to security in Microsoft 365
- Describe the principles and components of the Zero Trust security model
- Describe the five steps to implementing a Zero Trust security model in your organization
- Explain Microsoft's story and strategy around Zero Trust networking
-
Module 3: Learn about features in Microsoft 365 that protect against cyberthreats and monitor suspicious activities.
By the end of this module, you should be able to:
- Identify features of Microsoft Defender for Office 365 that enhance email security
- Explain how Microsoft Defender for Identity identifies and investigates advanced threats
- Explain how Microsoft Defender for Endpoint helps prevent and respond to advanced threats
- Describe the benefits of Microsoft 365 Threat Intelligence
- Describe how Microsoft Cloud App Security enhances visibility and control
-
Module 4: Understand how Microsoft Secure Score helps reduce risks to your data.
By the end of this module, you should be able to:
- Describe the benefits of Secure Score and analyzed services
- Collect data using the Secure Score API
- Identify gaps and actions to enhance security
- Determine threat impact and risk mitigation
-
Module 5: Explore Privileged Identity Management to ensure appropriate user privileges.
By the end of this module, you should be able to:
- Manage, control, and monitor access to critical resources
- Configure Privileged Identity Management
- Review audit history of user assignments and activations
- Implement Privileged Access Management for granular control
-
Module 6: Discover Azure Identity Protection and its role in safeguarding identities.
By the end of this module, you should be able to:
- Describe Azure Identity Protection (AIP) and protected identities
- Enable default protection policies in AIP
- Identify vulnerabilities and risk events detected by AIP
- Plan cloud-based identity protection
- Secure your Azure Active Directory environment
University: Microsoft Learn
Provider: Microsoft
Categories: Cybersecurity Courses