Security
Learning
Learning Paths
Get started with Microsoft Copilot for Security.
Levels: Beginner
Roles: Student, Security Engineer, Security Operations Analyst, Business User, Business Owner
Modules
Configure Security Information and Event Management (SIEM) operations using Microsoft Sentinel
Levels: Intermediate
Roles: Security Operations Analyst
Modules
Explore network traffic filtering with Network Security Group, set up Microsoft Defender for Cloud, create a Log Analytics workspace, configure Log Analytics agent integration, Azure Key Vault networking, and connect an Azure SQL server using Azure Private Endpoint in the Azure portal. Enhance cloud security effectively.
Levels: Intermediate
Roles: Administrator, Security Engineer
Modules
- Filter network traffic with a network security group using the Azure portal
- Create a Log Analytics workspace for Microsoft Defender for Cloud
- Set up Microsoft Defender for Cloud
- Configure and integrate a Log Analytics agent and workspace in Defender for Cloud
- Configure Azure Key Vault networking settings
- Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal
Use Microsoft Purview to discover, classify, and protect sensitive data in your organization. This learning path aligns with exam SC-200: Microsoft Security Operations Analyst.
Levels: Intermediate
Roles: Security Operations Analyst
Modules
- Respond to data loss prevention alerts using Microsoft 365
- Manage insider risk in Microsoft Purview
- Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview Standard
- Investigate threats using audit in Microsoft 365 Defender and Microsoft Purview (Premium)
- Investigate threats with Content search in Microsoft Purview
Learn about the Microsoft Learn for Educators program and how to best deliver its content to your students. Prepare to deliver Microsoft’s security solutions, SC-900 Microsoft Security, Compliance, and Identity Fundamentals in academic program.
Levels: Beginner
Roles: Higher Education Educator
Modules
- Introduction to Microsoft Learn for Educators program
- Onboard to Microsoft Learn for Educators program
- Microsoft Learn for Educators Course Preparation
- Microsoft Learn for Educators course planning
- Learn best practices from Microsoft Technical Trainers
- Get tips and tricks for teaching SC- 300: Microsoft Identity and Access Administrator
- Microsoft Learn for Educators preparing for course delivery
- Microsoft Learn for Educators student certification
Microsoft Security, Compliance, and Identity Fundamentals: Describe the concepts of security, compliance, and identity
Levels: Beginner
Roles: Business User, Student
Modules
Prepare to teach AZ-500 Microsoft Azure Security Technologies
Levels: Advanced
Roles: Higher Education Educator
Modules
- Introduction to Microsoft Learn for Educators program
- Onboard to Microsoft Learn for Educators program
- Microsoft Learn for Educators Course Preparation
- Microsoft Learn for Educators course planning
- Learn best practices from Microsoft Technical Trainers
- Get tips and tricks for teaching AZ-500 Microsoft Azure Security Technologies
- Microsoft Learn for Educators preparing for course delivery
- Microsoft Learn for Educators student certification
This learning path takes you through the four main phases of threat modeling, explains the differences between each data-flow diagram element, walks you through the threat modeling framework, recommends different tools and gives you a step-by-step guide on creating proper data-flow diagrams.
Levels: Beginner, Intermediate
Roles: Administrator, Developer, DevOps Engineer, Solution Architect, Security Engineer
Modules
- Introduction to threat modeling
- Create a threat model using data-flow diagram elements
- Provide context with the right depth layer
- Approach your data-flow diagram with the right threat model focus
- Use a framework to identify threats and find ways to reduce or eliminate risk
- Prioritize your issues and apply security controls
- Use recommended tools to create a data-flow diagram
Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft Azure Active Directory, part of Microsoft Entra
Levels: Beginner
Roles: Business User, Student
Modules
Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft compliance solutions
Levels: Beginner
Roles: Business User, Student
Modules
- Describe the Service Trust Portal and privacy at Microsoft
- Describe the compliance management capabilities in Microsoft Purview
- Describe information protection and data lifecycle management in Microsoft Purview
- Describe insider risk capabilities in Microsoft Purview
- Describe the eDiscovery and audit capabilities of Microsoft Purview
- Describe resource governance capabilities in Azure
This learning path deals with securing your Azure resources. After completing the learning path, you’ll be able to determine if your Azure IaaS workloads have any security vulnerabilities, and remediate those potential security vulnerabilities.
Levels: Intermediate
Roles: Administrator, Solution Architect, Technology Manager
Modules
- Audit the security of Windows Server IaaS Virtual Machines
- Manage Azure updates
- Create and implement application allowlists with adaptive application control
- Configure BitLocker disk encryption for Windows IaaS Virtual Machines
- Implement change tracking and file integrity monitoring for Windows IaaS VMs
- Implement Windows Server IaaS VM network security
Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft security solutions
Levels: Beginner
Roles: Business User, Student
Modules