close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Microsoft Security Engineer Training

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (4 days)

Classroom (4 days)

Online Self-paced (32 hours)

Microsoft Identity and Access Administrator SC300 Course Outline

Module 1: Implement an Identity Management Solution

  • Implement Initial Configuration of Azure AD
  • Create, Configure, and Manage Identities
  • Implement and Manage External Identities
  • Implement and Manage Hybrid Identity

Lab:

  • Manage User Roles
  • Setting Tenant-Wide Properties
  • Assign Licenses to Users
  • Restore or Remove Deleted Users
  • Add Groups in Azure AD
  • Change Group License Assignments
  • Change User License Assignments
  • Configure External Collaboration
  • Add Guest Users to the Directory
  • Explore Dynamic Groups

Module 2: Implement an Authentication and Access Management Solution

  • Secure Azure AD User with MFA
  • Manage User Authentication
  • Plan, Implement and Administer Conditional Access
  • Manage Azure AD Identity Protection

Lab:

  • Configure Azure AD MFA Authentication Registration Policy
  • Enable Sign-In Risk Policy
  • Manage Azure AD Smart Lockout Values
  • Configure Authentication Session Controls
  • Implement Conditional Access Policies, Roles, and Assignments
  • Work with Security Defaults
  • Configure and Deploy Self-Service Password Reset (SSPR)
  • Enable Azure AD MFA

Module 3: Implement Access Management for Apps

  • Plan and Design the Integration of Enterprise for SSO
  • Implement and Monitor the Integration of Enterprise Apps for SSO
  • Implement App Registration

Lab:

  • Implement Access Management for Apps
  • Create a Custom Role to Management App Registration
  • Register an Application
  • Grant Tenant-Wide Admin Consent to an Application
  • Add App Roles to Applications and Receive Tokens

Module 4: Plan and Implement an Identity Governance Strategy

  • Plan and Implement Entitlement Management
  • Plan, Implement and Manage Access Reviews
  • Plan and Implement Privileged Access
  • Monitor and Maintain Azure AD

Lab:

  • Configure PIM for Azure AD Roles
  • Assign Azure AD Role in PIM
  • Assign Azure Resource Roles in PIM
  • Connect Data from Azure AD to Azure Sentinel
  • Create Access Reviews for Groups and Apps
  • Manage the Lifecycle of External Users with Azure AD Identity Governance
  • Add Terms of Use Acceptance Report
  • Create and Manage a Resource Catalogue with Azure AD Entitlement

Show moredown

Prerequisites

In this Microsoft Identity and Access Administrator SC300 course, delegates should have an understanding of:

  • Security best practices and industry security requirements include defence in depth, least privileged access, shared responsibility, and zero trust model.
  • Be familiar with identity concepts such as authentication, authorisation, and active directory.
  • Have some experience deploying Azure workloads.
  • Some experience with Windows and Linux operating systems and scripting languages is helpful.

Audience

This Microsoft Identity and Access Administrator SC300 course is suitable for anyone who wants to gain in-depth knowledge about identity solutions and access management systems for Azure-based solutions.

Microsoft Identity and Access Administrator SC300​ Course Overview

The Microsoft Identity and Access Administrator is responsible for implementing, designing, and operating an organisation's access and identity management systems with Azure AD (Azure Active Directory). They are also liable for managing tasks like giving secure authorisation and authentication access to enterprise applications. Microsoft Identity and Access Administrator benefit organisations in many ways, such as modernising identity solutions, implementing identity governance, and implementing hybrid identity solutions. Adding Identity and Access Management as a skill in your profiles will surely help you climb the ladder of success in terms of value and career opportunities.

Our 4-day Microsoft Identity and Access Administrator SC300 training course aims to provide delegates with a comprehensive knowledge of implementing identity management solutions. They will also learn about various essential topics such as managing user authentication, managing Azure AD identity protection, implementing App registration, registering an application, monitor and maintaining Azure AD, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training and will help you get a complete understanding of this course.

This training will also cover the following concepts:

  • Create, configure, and manage identities
  • Implement and manage hybrid identity
  • Secure Azure AD user with MFA
  • Plan and implement privileged access

At the end of this Microsoft Identity and Access Administrator SC300 Training course, delegates will be able to implement and manage external identities and hybrid identities. They will also be able to implement and monitor the integration of enterprise apps for SSO effectively.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (2 days)

Classroom (2 days)

Online Self-paced (16 hours)

Microsoft Information Protection Administrator SC400​ Course Outline

Module 1: Implement Information Protection in Microsoft 365

  • Introduction to Information Protection and Governance in Microsoft 365
  • Classify Data for Protection and Governance
  • Create and Manage Sensitive Information Types
  • Describe Microsoft 365 Encryption
  • Deploy Message Encryption in Office 365
  • Configure Sensitivity Labels
  • Apply and Manage Sensitivity Labels

Lab: Implement Information Protection

  • Assign Permissions for Compliance
  • Manage Office 365 Message Encryption
  • Manage Sensitive Information Types
  • Manage Trainable Classifiers
  • Manage Sensitivity Labels

Module 2: Implement Data Loss Prevention in Microsoft 365

Lessons

  • Prevent Data Loss in Microsoft 365
  • Implement Endpoint Data Loss Prevention
  • Configure DLP Policies for Microsoft Cloud App Security and Power Platform
  • Manage DLP Policies and Reports in Microsoft 365

Lab: Implement Data Loss Prevention

  • Manage DLP Policies
  • Manage Endpoint DLP
  • Test DLP Policies
  • Manage DLP Reports

Module 3: Implement Information Governance in Microsoft 365

Lessons

  • Govern Information in Microsoft 365
  • Manage Data Retention in Microsoft 365 Workloads
  • Manage Records in Microsoft 365

Lab: Implement Information Governance

  • Configure Retention Labels
  • Implement Retention Labels
  • Configure Service-Based Retention
  • Use eDiscovery for Recovery
  • Configure Records Management

Show moredown

Prerequisites

In this Microsoft Information Protection Administrator training course, delegates should have:

  • Foundational knowledge of Microsoft security and compliance technologies.
  • Basic knowledge of information protection concepts.
  • Understanding of cloud computing concepts.
  • Understanding of Microsoft 365 products and services.

Audience

This training course is ideal for anyone who wants to learn the implementation of information protection in organisations for better data protection.

Microsoft Information Protection Administrator SC400​ Course Overview

The Microsoft Information Protection Administrator plans and defines applicable requirements, tests IT processes and performs operations against controls and policies. Organisations also implement information protection in Microsoft 365 to protect their data against theft and accidental loss. The Information Protection Administrator prepares and implements controls that meet up organisational compliance needs. This training course will help you develop skills to manage records in Microsoft 365 for better task management in the system. Excelling in this Microsoft Information Protection Administrator training course will lead the delegates to many highly reputed designations.

The Knowledge Academy’s Microsoft Information Protection Administrator training course is designed to improve the delegates’ ability to develop learning skills regarding information protection and governance in Microsoft 365. During this 2-day training course, delegates will gain elaborated information about Microsoft 365 encryption and steps to deploy message encryption in Office 365. During this course, you will learn how to accomplish technical tasks such as information protection, data loss prevention, and information governance.

It also accommodates the delegates with more knowledgeable topics, such as:

  • Configure sensitivity labels
  • Prevent data loss in Microsoft 365
  • Apply and manage sensitivity labels
  • Manage endpoint DLP
  • Manage sensitivity labels

At the end of this training course, delegates will be able to classify data for protection and governance in Microsoft 365. Delegates will also be able to create and manage sensitive information types and configure sensitivity labels.

Our highly expert trainer with abundant knowledge will conduct this training course to help you work with Information Technology (IT) to implement technology that supports policies and controls necessary to address regulatory requirements for your organisation.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (4 days)

Classroom (4 days)

Online Self-paced (32 hours)

Microsoft Security Operations Analyst SC200​ Course Outline

Module 1: Mitigate Threats Using Microsoft Defender

  • Introduction to Threat Protection with Microsoft 365
  • Mitigate Incidents Using Microsoft 365 Defender
  • Remediate Risks with Microsoft Defender for Office 365
  • Microsoft Defender for Identity
  • Azure AD Identity Protection
  • Microsoft Cloud App Security
  • Respond to Data Loss Prevention Alerts
  • Manage Insider Risk in Microsoft 365

Lab: Mitigate Threats Using Microsoft Defender

  • Explore Microsoft 365 Defender

Module 2: Mitigate Threats Using Microsoft 365 Defender for Endpoint

  • Protect Against Threats with Microsoft Defender for Endpoint
  • Deploy the Microsoft Defender for Endpoint Environment
  • Implement Windows 10 Security Enhancements
  • Perform Device Investigations
  • Perform Actions on a Device
  • Perform Evidence and Entities Investigations
  • Configure for Alerts and Detections
  • Manage Insider Risk in Microsoft 365
  • Utilise Threat and Vulnerability Management

Lab: Mitigate Threats Using Microsoft 365 Defender for Endpoint

  • Deploy Microsoft Defender for Endpoint
  • Mitigate Attacks Using Defender for Endpoint

Module 3: Mitigate Threats Using Azure Defender

  • Plan for Cloud Workload Protections Using Azure Defender
  • Explain Cloud Workload Protections in Azure Defender
  • Connect Azure Assets to Azure Defender
  • Connect Non-Azure Resources to Azure Defender
  • Remediate Security Alerts Using Azure Defender

Lab: Mitigate Threats Using Azure Defender

  • Deploy Azure Defender
  • Mitigate Attacks with Azure Defender

Module 4: Create Queries for Azure Sentinel Using Kusto Query Language (KQL)

  • Construct KQL Statements for Azure Sentinel
  • Analyse Query Results Using KQL
  • Build Multi-Table Statements Using KQL
  • Work with Data in Azure Sentinel Using Kusto Query Language

Lab: Create Queries for Azure Sentinel Using Kusto Query Language (KQL)

  • Construct Basic KQL Statements
  • Analyse Query Results Using KQL
  • Build Multi-Table Statements in KQL
  • Work with String Data in KQL

Module 5: Configure Your Azure Sentinel Environment

  • Introduction to Azure Sentinel
  • Create and Manage Azure Sentinel Workspaces
  • Query Logs in Azure Sentinel
  • Use Watchlists in Azure Sentinel
  • Utilise Threat Intelligence in Azure Sentinel

Lab: Configure Your Azure Sentinel Environment

  • Create an Azure Sentinel Workspace
  • Create a Watchlist
  • Create a Threat Indicator

Module 6: Connect Logs to Azure Sentinel

  • Connect Data to Azure Sentinel Using Data Connectors
  • Connect Microsoft Services to Azure Sentinel
  • Connect Microsoft 365 Defender to Azure Sentinel
  • Connect Windows Hosts to Azure Sentinel
  • Connect Common Event Format Logs to Azure Sentinel
  • Connect Syslog Data Sources to Azure Sentinel
  • Connect Threat Indicators to Azure Sentinel

Lab: Connect Logs to Azure Sentinel

  • Connect Data to Azure Sentinel Using Data Connectors
  • Connect Windows Devices to Azure Sentinel Using Data Connectors
  • Connect Linux Hosts to Azure Sentinel Using Data Connectors
  • Connect Threat Intelligence to Azure Sentinel Using Data Connectors

Module 7: Create Detections and Perform Investigations Using Azure Sentinel

  • Threat Detection with Azure Sentinel Analytics
  • Threat Response with Azure Sentinel Playbooks
  • Security Incident Management in Azure Sentinel
  • Use Entity Behaviour Analytics in Azure Sentinel
  • Query, Visualise, and Monitor Data in Azure Sentinel

Lab: Create Detections and Perform Investigations Using Azure Sentinel

  • Activate a Microsoft Security Rule
  • Create a Playbook
  • Create a Scheduled Query
  • Understand Detection Modelling
  • Conduct Attacks
  • Create Detections
  • Investigate Incidents
  • Create Workbooks

Module 8: Perform Threat Hunting in Azure Sentinel

  • Threat Hunting with Azure Sentinel
  • Hunt for Threats Using Notebooks in Azure Sentinel

Lab: Threat Hunting in Azure Sentinel

  • Perform Threat Hunting in Azure Sentinel
  • Threat Hunting Using Notebooks with Azure Sentinel

Show moredown

Prerequisites

To attend this Microsoft Security Operations Analyst SC200 training course, delegates should have a basic to intermediate understanding of Microsoft 365, Windows 10, Microsoft security, compliance, and identity products, familiarity with Azure services, Azure VMs and virtual networking, and scripting concepts.

Audience

This Microsoft Security Operations Analyst SC200 training course is ideal for anyone who wants to gain in-depth knowledge of cyber threat mitigation technologies. However, this training will be more beneficial for:

  • Microsoft Security Operations Analysts
  • Security Engineers

Microsoft Security Operations Analyst SC200​ Course Overview

Microsoft Security Operations Analysts collaborate with stakeholders of organisations to secure the organisation's IT infrastructure. Their goal is to reduce corporate risk by rapidly addressing current workplace attacks, consulting on threat prevention methods, and notifying relevant stakeholders about policy violations. Studying the Microsoft Security Operations Analyst SC200 training course will help learners effectively configure attack surface reduction rules on Windows 10 devices and observe threats over time with livestream. It will help individuals to manage automation settings and indicators in Microsoft Defender for the endpoint. Attending this training will help learners to expand their skills and to undertake a variety of tremendous job opportunities. 

This 4-day Microsoft Security Operations Analyst SC200 training course covers all the essential topics by which delegates will become familiar with Microsoft Azure sentinel, Azure defender, and Microsoft 365 defender concepts. During this training, delegates will learn about the creation of queries for Azure sentinel by using Kusto Query Language (KQL). They will also learn about how to configure alerts and detections, manage insider risk in Microsoft 365, utilise threat and vulnerability management, connect Windows hosts to Azure sentinel, connect threat indicators to Azure sentinel, and many more. Our highly professional trainer with years of experience teaching Microsoft courses will conduct this training course and help delegates gain a comprehensive understanding of investigating, responding to, and hunting for threats using Microsoft 365 defender, Microsoft Azure sentinel, Azure defender, and third-party security products.

This training will cover various essential topics, such as:

  • Microsoft defender for identity
  • Connect non-Azure resources to Azure defender
  • Connect Microsoft 365 defender to Azure sentinel
  • Azure AD identity protection
  • Perform device investigations

After attending this Microsoft Security Operations Analyst SC200 training course, delegates will be able to conduct advanced hunting in Microsoft 365 defender and investigate alerts in Microsoft defender. They will also be able to perform evidence and entities investigations.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Microsoft Security, Compliance, and Identity Fundamentals SC900​ Course Outline

Module 1: Concepts of Security, Compliance, and Identity

  • Security and Compliance Concepts and Methodologies
  • Identity Concepts

Module 2: Concepts and Capabilities of Microsoft Identity and Access Management Solutions

  • Services and Identity Types of Azure AD
  • Authentication Capabilities of Azure AD
  • Access Management Capabilities of Azure AD
  • Identity Protection and Governance Capabilities of Azure AD

Lab:

  • Explore Azure Active Directory
  • Explore Azure AD Authentication with Self- Service Password Rese
  • Explore Access Management in Azure AD with Conditional Access
  • Explore Identity Governance in Azure AD with Privileged Identity Management

Module 3: Capabilities of Microsoft Security Solutions

  • Security Capabilities in Azure
  • Security Management Capabilities of Azure
  • Security Capabilities of Azure Sentinel
  • Threat Protection Capabilities of Microsoft 365
  • Security Management Capabilities of Microsoft 365
  • Endpoint Security with Microsoft Intune

Lab:

  • Explore Microsoft Cloud App Security
  • Explore Azure Sentinel
  • Explore Azure Security Centre
  • Explore Azure Network Security Groups (NSGs)
  • Explore the Microsoft 365 Defender Portal
  • Explore Microsoft Intune

Module 4: Capabilities of Microsoft Compliance Solutions

  • Compliance Management Capabilities in Microsoft
  • Information Protection and Governance Capabilities of Microsoft 365
  • Insider Risk Capabilities in Microsoft 365
  • eDiscovery and Audit Capabilities of Microsoft 365
  • Resource Governance Capabilities in Azure

Lab:

  • Explore Azure Policy
  • Explore Insider Risk Management in Microsoft 365
  • Explore the Service Trust Portal
  • Explore the Microsoft 365 compliance Centre and Compliance Manager
  • Explore Sensitivity Labels in Microsoft 365
  • Explore Insider Risk Management in Microsoft 365

Show moredown

Prerequisites

For attending this Microsoft Security, Compliance, and Identity Fundamentals SC900 course, it will be beneficial if delegates have:

  • Prior understanding of networking and cloud computing concepts.
  • Prior IT knowledge or any general experience working in an IT environment.
  • Prior understanding of Microsoft Azure and Microsoft 365.

Audience

This Microsoft Security, Compliance, and Identity Fundamentals SC900 training course is designed for anyone who wants to gain in-depth knowledge about Security, Compliance, and Identity (SCI) across cloud-based and related Microsoft services.

Microsoft Security, Compliance, and Identity Fundamentals SC900​ Course Overview

Microsoft's Security, Compliance, and Identity (SCI) solution is developed to permit organisations to be more resilient and agile by integrating platforms, clouds, and services and assist in strengthening the security of cloud workloads and streamlining security management. This Microsoft Security, Compliance, and Identity Fundamentals SC900 is designed to provide individuals with the skills required for threat protection with Microsoft 365 defender and Microsoft 365 security management and Azure resources governance capabilities. Skills gained from this course will help learners to achieve higher job posts such as technical specialist, security architect, and many more reputed job profiles.

Our 1-day Microsoft Security, Compliance, and Identity Fundamentals SC900 Training course aims to provide delegates with a comprehensive knowledge of security, compliance, and identity. They will also learn about various essential topics such as authentication capabilities, access management capabilities, security capabilities, compliance management capabilities, insider risk capabilities, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training and help delegates get a comprehensive understanding using Microsoft Security, Compliance, and Identity (SCI).

This training will also cover the following concepts:

  • Security and compliance concepts and methodologies
  • Services and identity types of Azure AD
  • Security capabilities of Azure sentinel
  • eDiscovery and audit capabilities of Microsoft 365
  • Resource governance capabilities in Azure

At the end of this Microsoft Security, Compliance, and Identity Fundamentals SC900 course, delegates will be able to easily identify the protection and governance capabilities of Azure AD. They will also be able to do information protection and governance capabilities of Microsoft 365.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

Not sure which course to choose?

Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on 01344767900 or Enquire.

What our customers are saying

Frequently asked questions

FAQ's

Professionals who hold Microsoft Security Engineer Training are more likely to obtain more excellent job prospects, higher pay and get better job profiles in organisations as compared to their uncertified peers.
Security Engineers are in charge of screening and testing security software and monitoring systems and networks for security breaches and intrusions.
 Yes, The Knowledge Academy is accredited by Microsoft to provide these Microsoft Security Engineer Training courses.
During the Microsoft Security Operations Analyst SC200 training course, you will learn various essential topics such as how to query, visualise, and monitor data in Azure sentinel, etc. You will also learn to connect Windows hosts to Azure sentinel, respond to data loss prevention alerts, manage insider risk in Microsoft 365, etc.
The Microsoft Identity and Access Administrator SC300 training course provides you with a comprehensive knowledge of implementing identity management solutions. You will also learn about various essential topics such as managing Azure AD identity protection, registering an application, monitoring and maintaining Azure AD, etc.
The Knowledge Academy is the Leading global training provider in the world for Microsoft Security Engineer Training.
The price for Microsoft Security Engineer Training certification in the United Kingdom starts from £.

Why we're the go to training provider for you

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

We are accredited by PeopleCert on behalf of AXELOS

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Microsoft Security Engineer Training