Manage identity and access in Microsoft 365

via Microsoft Learn

Microsoft Learn

178 Courses


Overview

Enhance your organization's security by managing identity and access in Microsoft 365. This comprehensive course covers critical cybersecurity concepts and practices, enabling you to effectively protect your enterprise environment.

  • Module 1: Examine threat vectors and understand how hackers exploit users to access targets by executing malicious content.

    By the end of this module, you should be able to:

    • Describe techniques hackers use to compromise user accounts through email
    • Describe techniques hackers use to gain control over resources
    • Describe techniques hackers use to compromise data
    • Mitigate an account breach
    • Prevent an elevation of privilege attack
    • Prevent data exfiltration, data deletion, and data spillage
  • Module 2: Delve into the Zero Trust security model, its principles, and support in Microsoft 365.

    By the end of this module, you should be able to:

    • Describe the Zero Trust approach to security in Microsoft 365
    • Describe the principles and components of the Zero Trust security model
    • Describe the five steps to implementing a Zero Trust security model in your organization
    • Explain Microsoft's story and strategy around Zero Trust networking
  • Module 3: Learn about features in Microsoft 365 that protect against cyberthreats and monitor suspicious activities.

    By the end of this module, you should be able to:

    • Identify features of Microsoft Defender for Office 365 that enhance email security
    • Explain how Microsoft Defender for Identity identifies and investigates advanced threats
    • Explain how Microsoft Defender for Endpoint helps prevent and respond to advanced threats
    • Describe the benefits of Microsoft 365 Threat Intelligence
    • Describe how Microsoft Cloud App Security enhances visibility and control
  • Module 4: Understand how Microsoft Secure Score helps reduce risks to your data.

    By the end of this module, you should be able to:

    • Describe the benefits of Secure Score and analyzed services
    • Collect data using the Secure Score API
    • Identify gaps and actions to enhance security
    • Determine threat impact and risk mitigation
  • Module 5: Explore Privileged Identity Management to ensure appropriate user privileges.

    By the end of this module, you should be able to:

    • Manage, control, and monitor access to critical resources
    • Configure Privileged Identity Management
    • Review audit history of user assignments and activations
    • Implement Privileged Access Management for granular control
  • Module 6: Discover Azure Identity Protection and its role in safeguarding identities.

    By the end of this module, you should be able to:

    • Describe Azure Identity Protection (AIP) and protected identities
    • Enable default protection policies in AIP
    • Identify vulnerabilities and risk events detected by AIP
    • Plan cloud-based identity protection
    • Secure your Azure Active Directory environment

University: Microsoft Learn

Provider: Microsoft

Categories: Cybersecurity Courses

Syllabus


Taught by


Tags

united states