close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Microsoft Security Engineer Training

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (4 days)

Classroom (4 days)

Online Self-paced (32 hours)

Microsoft Cybersecurity Architect SC100 Course Outline

Within this Microsoft training course, you will learn the following modules:

Module 1: Build an overall security strategy and architecture

Learn how to build an overall security strategy and architecture.

Lessons

  • Introduction
  • Zero Trust overview
  • Develop Integration points in an architecture
  • Develop security requirements based on business goals
  • Translate security requirements into technical capabilities
  • Design security for a resiliency strategy
  • Design a security strategy for hybrid and multi-tenant environments
  • Design technical and governance strategies for traffic filtering and segmentation
  • Understand security for protocols
  • Exercise: Build an overall security strategy and architecture
  • Knowledge check
  • Summary

After completing this module, students will be able to:

  • Develop Integration points in an architecture
  • Develop security requirements based on business goals
  • Translate security requirements into technical capabilities
  • Design security for a resiliency strategy
  • Design security strategy for hybrid and multi-tenant environments
  • Design technical and governance strategies for traffic filtering and segmentation

Module 2: Design a security operations strategy

Learn how to design a security operations strategy.

Lessons

  • Introduction
  • Understand security operations frameworks, processes, and procedures
  • Design a logging and auditing security strategy
  • Develop security operations for hybrid and multi-cloud environments
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
  • Evaluate security workflows
  • Review security strategies for incident management
  • Evaluate security operations strategy for sharing technical threat intelligence
  • Monitor sources for insights on threats and mitigations

After completing this module, students will be able to:

  • Design a logging and auditing security strategy
  • Develop security operations for hybrid and multi-cloud environments.
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats and mitigations.

Module 3: Design an identity security strategy

Learn how to design an identity security strategy.

Lessons

  • Introduction
  • Secure access to cloud resources
  • Recommend an identity store for security
  • Recommend secure authentication and security authorization strategies
  • Secure conditional access
  • Design a strategy for role assignment and delegation
  • Define Identity governance for access reviews and entitlement management
  • Design a security strategy for privileged role access to infrastructure
  • Design a security strategy for privileged activities
  • Understand security for protocols

After completing this module, students will be able to:

  • Recommend an identity store for security.
  • Recommend secure authentication and security authorization strategies.
  • Secure conditional access.
  • Design a strategy for role assignment and delegation.
  • Define Identity governance for access reviews and entitlement management.
  • Design a security strategy for privileged role access to infrastructure.
  • Design a security strategy for privileged access.

Module 4: Evaluate a regulatory compliance strategy

Learn how to evaluate a regulatory compliance strategy.

Lessons

  • Introduction
  • Interpret compliance requirements and their technical capabilities
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Interpret compliance scores and recommend actions to resolve issues or improve security
  • Design and validate implementation of Azure Policy
  • Design for data residency Requirements
  • Translate privacy requirements into requirements for security solutions

After completing this module, students will be able to:

  • Interpret compliance requirements and their technical capabilities
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Interpret compliance scores and recommend actions to resolve issues or improve security
  • Design and validate implementation of Azure Policy
  • Design for data residency requirements
  • Translate privacy requirements into requirements for security solutions

Module 5: Evaluate security posture and recommend technical strategies to manage risk

Learn how to evaluate security posture and recommend technical strategies to manage risk.

Lessons

  • Introduction
  • Evaluate security postures by using benchmarks
  • Evaluate security postures by using Microsoft Defender for Cloud
  • Evaluate security postures by using Secure Scores
  • Evaluate security hygiene of Cloud Workloads
  • Design security for an Azure Landing Zone
  • Interpret technical threat intelligence and recommend risk mitigations
  • Recommend security capabilities or controls to mitigate identified risks

After completing this module, students will be able to:

  • Evaluate security postures by using benchmarks
  • Evaluate security postures by using Microsoft Defender for Cloud
  • Evaluate security postures by using Secure Scores
  • Evaluate security hygiene of Cloud Workloads
  • Design security for an Azure Landing Zone
  • Interpret technical threat intelligence and recommend risk mitigations
  • Recommend security capabilities or controls to mitigate identified risks

Module 6: Understand architecture best practices and how they are changing with the Cloud

Learn about architecture best practices and how they are changing with the Cloud.

Lessons

  • Introduction
  • Plan and implement a security strategy across teams
  • Establish a strategy and process for proactive and continuous evolution of a security strategy
  • Understand network protocols and best practices for network segmentation and traffic filtering

After completing this module, students will be able to:

  • Describe best practices for network segmentation and traffic filtering.
  • Plan and implement a security strategy across teams.
  • Establish a strategy and process for proactive and continuous evaluation of security strategy.

Module 7: Design a strategy for securing server and client endpoints

Learn how to design a strategy for securing server and client endpoints.

Lessons

  • Introduction
  • Specify security baselines for server and client endpoints
  • Specify security requirements for servers
  • Specify security requirements for mobile devices and clients
  • Specify requirements for securing Active Directory Domain Services
  • Design a strategy to manage secrets, keys, and certificates
  • Design a strategy for secure remote access
  • Understand security operations frameworks, processes, and procedures
  • Understand deep forensics procedures by resource type

After completing this module, students will be able to:

  • Specify security baselines for server and client endpoints
  • Specify security requirements for servers
  • Specify security requirements for mobile devices and clients
  • Specify requirements for securing Active Directory Domain Services
  • Design a strategy to manage secrets, keys, and certificates
  • Design a strategy for secure remote access
  • Understand security operations frameworks, processes, and procedures
  • Understand deep forensics procedures by resource type

Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services

Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.

Lessons

  • Introduction
  • Specify security baselines for PaaS services
  • Specify security baselines for IaaS services
  • Specify security baselines for SaaS services
  • Specify security requirements for IoT workloads
  • Specify security requirements for data workloads
  • Specify security requirements for web workloads
  • Specify security requirements for storage workloads
  • Specify security requirements for containers
  • Specify security requirements for container orchestration

After completing this module, students will be able to:

  • Specify security baselines for PaaS, SaaS and IaaS services
  • Specify security requirements for IoT, data, storage, and web workloads
  • Specify security requirements for containers and container orchestration

Module 9: Specify security requirements for applications

Learn how to specify security requirements for applications.

Lessons

  • Introduction
  • Understand application threat modeling
  • Specify priorities for mitigating threats to applications
  • Specify a security standard for onboarding a new application
  • Specify a security strategy for applications and APIs

After completing this module, students will be able to:

  • Specify priorities for mitigating threats to applications
  • Specify a security standard for onboarding a new application
  • Specify a security strategy for applications and APIs

Module 10: Design a strategy for securing data

Learn how to design a strategy for securing data.

Lessons

  • Introduction
  • Prioritize mitigating threats to data
  • Design a strategy to identify and protect sensitive data
  • Specify an encryption standard for data at rest and in motion

After completing this module, students will be able to:

  • Prioritize mitigating threats to data
  • Design a strategy to identify and protect sensitive data
  • Specify an encryption standard for data at rest and in motion

Show moredown

Who should attend this Microsoft training course?

IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.

  • Job role: Solution Architect
  • Preparation for exam: SC-100

Prerequisites

Before attending this course, students must have:

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.

Microsoft Cybersecurity Architect SC100 Course Overview

This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

What will you gain from taking this Microsoft training course:

  • Design a Zero Trust strategy and architecture.
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies.
  • Design security for infrastructure.
  • Design a strategy for data and applications.

Show moredown

What's included in this Microsoft training course?

  • Experienced Instructor
  • Labs

Show moredown

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (4 days)

Classroom (4 days)

Online Self-paced (32 hours)

Microsoft Security Operations Analyst SC200 Course Outline

Within this Microsoft training course, you will learn the following modules:

Module 1: Mitigate threats using Microsoft 365 Defender

Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender. Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization’s users, devices, and data. Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise.

Lessons

  • Introduction to Microsoft 365 threat protection
  • Mitigate incidents using Microsoft 365 Defender
  • Protect your identities with Azure AD Identity Protection
  • Remediate risks with Microsoft Defender for Office 365
  • Safeguard your environment with Microsoft Defender for Identity
  • Secure your cloud apps and services with Microsoft Defender for Cloud Apps
  • Respond to data loss prevention alerts using Microsoft 365
  • Manage insider risk in Microsoft 365

Lab: Mitigate threats using Microsoft 365 Defender

  • Explore Microsoft 365 Defender

After completing this module, students will be able to:

  • Explain how the threat landscape is evolving
  • Manage incidents in Microsoft 365 Defender
  • Conduct advanced hunting in Microsoft 365 Defender
  • Investigate alerts in Microsoft 365 Defender
  • Describe the investigation and remediation features of Azure Active Directory Identity Protection
  • Explain how Cloud Discovery helps you see what's going on in your organization

Module 2: Mitigate threats using Microsoft Defender for Endpoint

Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. Learn how Microsoft Defender for Endpoint can help your organization stay secure. Learn how to deploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security. Learn how to investigate incidents and alerts using Microsoft Defender for Endpoint. Perform advanced hunting and consult with threat experts. You will also learn how to configure automation in Microsoft Defender for Endpoint by managing environmental settings. Lastly, you will learn about your environment's weaknesses by using Threat and Vulnerability Management in Microsoft Defender for Endpoint.

Lessons

  • Protect against threats with Microsoft Defender for Endpoint
  • Deploy the Microsoft Defender for Endpoint environment
  • Implement Windows security enhancements with Microsoft Defender for Endpoint
  • Perform device investigations in Microsoft Defender for Endpoint
  • Perform actions on a device using Microsoft Defender for Endpoint
  • Perform evidence and entities investigations using Microsoft Defender for Endpoint
  • Configure and manage automation using Microsoft Defender for Endpoint
  • Configure for alerts and detections in Microsoft Defender for Endpoint
  • Utilize Vulnerability Management in Microsoft Defender for Endpoint

Lab: Deploy Microsoft Defender for Endpoint

  • Initialize Microsoft Defender for Endpoint
  • Onboard a Device
  • Configure Roles
  • Configure Device Groups

Lab: Mitigate Attacks with Micrsoft Defender for Endpoint

  • Simulated Attacks

After completing this module, students will be able to:

  • Define the capabilities of Microsoft Defender for Endpoint
  • Configure Microsoft Defender for Endpoint environment settings
  • Configure Attack Surface Reduction rules on Windows devices
  • Describe device forensics information collected by Microsoft Defender for Endpoint
  • Conduct forensics data collection using Microsoft Defender for Endpoint
  • Investigate user accounts in Microsoft Defender for Endpoint
  • Manage automation settings in Microsoft Defender for Endpoint
  • Manage indicators in Microsoft Defender for Endpoint
  • Describe Threat and Vulnerability Management in Microsoft Defender for Endpoint

Module 3: Mitigate threats using Microsoft Defender for Cloud

Use Microsoft Defender for Cloud, for Azure, hybrid cloud, and on-premises workload protection and security. Learn the purpose of Microsoft Defender for Cloud and how to enable it. You will also learn about the protections and detections provided by Microsoft Defender for Cloud for each cloud workload. Learn how you can add Microsoft Defender for Cloud capabilities to your hybrid environment.

Lessons

  • Plan for cloud workload protections using Microsoft Defender for Cloud
  • Connect Azure assets to Microsoft Defender for Cloud
  • Connect non-Azure resources to Microsoft Defender for Cloud
  • Manage your cloud security posture management
  • Explain cloud workload protections in Microsoft Defender for Cloud
  • Remediate security alerts using Microsoft Defender for Cloud

Lab: Mitigate threats using Microsoft Defender for Cloud

  • Enable Microsoft Defender for Cloud
  • Mitigate Attacks with Microsoft Defender for Cloud

After completing this module, students will be able to:

  • Describe Microsoft Defender for Cloud features
  • Explain which workloads are protected by Microsoft Defender for Cloud
  • Explain how Microsoft Defender for Cloud protections function
  • Configure auto-provisioning in Microsoft Defender for Cloud
  • Describe manual provisioning in Microsoft Defender for Cloud
  • Connect non-Azure machines to Microsoft Defender for Cloud
  • Describe alerts in Microsoft Defender for Cloud
  • Remediate alerts in Microsoft Defender for Cloud
  • Automate responses in Microsoft Defender for Cloud

Module 4: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

Write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Microsoft Sentinel. This module will focus on the most used operators. The example KQL statements will showcase security related table queries. KQL is the query language used to perform analysis on data to create analytics, workbooks, and perform hunting in Microsoft Sentinel. Learn how basic KQL statement structure provides the foundation to build more complex statements. Learn how to summarize and visualize data with a KQL statement provides the foundation to build detections in Microsoft Sentinel. Learn how to use the Kusto Query Language (KQL) to manipulate string data ingested from log sources.

Lessons

Construct KQL statements for Microsoft Sentinel

  • Analyze query results using KQL
  • Build multi-table statements using KQL
  • Work with data in Microsoft Sentinel using Kusto Query Language

Lab: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

  • Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

After completing this module, students will be able to:

  • Construct KQL statements
  • Search log files for security events using KQL
  • Filter searches based on event time, severity, domain, and other relevant data using KQL
  • Summarize data using KQL statements
  • Render visualizations using KQL statements
  • Extract data from unstructured string fields using KQL
  • Extract data from structured string data using KQL
  • Create Functions using KQL

Module 5: Configure your Microsoft Sentinel environment

Get started with Microsoft Sentinel by properly configuring the Microsoft Sentinel workspace. Traditional security information and event management (SIEM) systems typically take a long time to set up and configure. They're also not necessarily designed with cloud workloads in mind. Microsoft Sentinel enables you to start getting valuable security insights from your cloud and on-premises data quickly. This module helps you get started. Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements. As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Microsoft Sentinel.

Lessons

  • Introduction to Microsoft Sentinel
  • Create and manage Microsoft Sentinel workspaces
  • Query logs in Microsoft Sentinel
  • Use watchlists in Microsoft Sentinel
  • Utilize threat intelligence in Microsoft Sentinel

Lab: Configure your Microsoft Sentinel environment

  • Configure your Microsoft Sentinel environment

After completing this module, students will be able to:

  • Identify the various components and functionality of Microsoft Sentinel.
  • Identify use cases where Microsoft Sentinel would be a good solution.
  • Describe Microsoft Sentinel workspace architecture
  • Install Microsoft Sentinel workspace
  • Manage an Microsoft Sentinel workspace
  • Create a watchlist in Microsoft Sentinel
  • Use KQL to access the watchlist in Microsoft Sentinel
  • Manage threat indicators in Microsoft Sentinel
  • Use KQL to access threat indicators in Microsoft Sentinel

Module 6: Connect logs to Microsoft Sentinel

Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Microsoft Sentinel. The primary approach to connect log data is using the Microsoft Sentinel provided data connectors. This module provides an overview of the available data connectors. You will get to learn about the configuration options and data provided by Microsoft Sentinel connectors for Microsoft 365 Defender.

Lessons

  • Connect data to Microsoft Sentinel using data connectors
  • Connect Microsoft services to Microsoft Sentinel
  • Connect Microsoft 365 Defender to Microsoft Sentinel
  • Connect Windows hosts to Microsoft Sentinel
  • Connect Common Event Format logs to Microsoft Sentinel
  • Connect syslog data sources to Microsoft Sentinel
  • Connect threat indicators to Microsoft Sentinel

Lab: Connect logs to Microsoft Sentinel

  • Connect data to Microsoft Sentinel using data connectors
  • Connect Windows devices to Microsoft Sentinel using data connectors
  • Connect Linux hosts to Microsoft Sentinel using data connectors
  • Connect Threat intelligence to Microsoft Sentinel using data connectors

After completing this module, students will be able to:

  • Explain the use of data connectors in Microsoft Sentinel
  • Explain the Common Event Format and Syslog connector differences in Microsoft Sentinel
  • Connect Microsoft service connectors
  • Explain how connectors auto-create incidents in Microsoft Sentinel
  • Activate the Microsoft 365 Defender connector in Microsoft Sentinel
  • Connect Azure Windows Virtual Machines to Microsoft Sentinel
  • Connect non-Azure Windows hosts to Microsoft Sentinel
  • Configure Log Analytics agent to collect Sysmon events
  • Explain the Common Event Format connector deployment options in Microsoft Sentinel
  • Configure the TAXII connector in Microsoft Sentinel
  • View threat indicators in Microsoft Sentinel

Module 7: Create detections and perform investigations using Microsoft Sentinel

Detect previously uncovered threats and rapidly remediate threats with built-in orchestration and automation in Microsoft Sentinel. You will learn how to create Microsoft Sentinel playbooks to respond to security threats. You'll investigate Microsoft Sentinel incident management, learn about Microsoft Sentinel events and entities, and discover ways to resolve incidents. You will also learn how to query, visualize, and monitor data in Microsoft Sentinel.

Lessons

  • Threat detection with Microsoft Sentinel analytics
  • Automation in Microsoft Sentinel
  • Threat response with Microsoft Sentinel playbooks
  • Security incident management in Microsoft Sentinel
  • Identify threats with Entity behavior analytics in Microsoft Sentinel
  • Data normalization in Microsoft Sentinel
  • Query, visualize, and monitor data in Microsoft Sentinel
  • Manage content in Microsoft Sentinel

Lab: Create detections and perform investigations using Microsoft Sentinel

  • Modify a Microsoft Security rule
  • Create a Playbook
  • Create a Scheduled Query
  • Understand Detection Modeling
  • Conduct attacks
  • Create detections
  • Investigate incidents
  • Create workbooks

After completing this module, students will be able to:

  • Explain the importance of Microsoft Sentinel analytics.
  • Create rules from templates.
  • Manage rules with modifications.
  • Explain Microsoft Sentinel SOAR capabilities.
  • Create a playbook to automate an incident response.
  • Investigate and manage incident resolution.
  • Explain User and Entity Behavior Analytics in Microsoft Sentinel
  • Explore entities in Microsoft Sentinel
  • Visualize security data using Microsoft Sentinel workbooks.

Module 8: Perform threat hunting in Microsoft Sentinel

In this module, you'll learn to proactively identify threat behaviors by using Microsoft Sentinel queries. You'll also learn to use bookmarks and livestream to hunt threats. You will also learn how to use notebooks in Microsoft Sentinel for advanced hunting.

Lessons

  • Explain threat hunting concepts in Microsoft Sentinel
  • Threat hunting with Microsoft Sentinel
  • Use Search jobs in Microsoft Sentinel
  • Hunt for threats using notebooks in Microsoft Sentinel

Lab: Threat hunting in Microsoft Sentinel

  • Perform threat hunting in Microsoft Sentinel
  • Threat hunting using notebooks with Microsoft Sentinel

After completing this module, students will be able to:

  • Describe threat hunting concepts for use with Microsoft Sentinel
  • Define a threat hunting hypothesis for use in Microsoft Sentinel
  • Use queries to hunt for threats.
  • Observe threats over time with livestream.
  • Explore API libraries for advanced threat hunting in Microsoft Sentinel
  • Create and use notebooks in Microsoft Sentinel

Show moredown

Who should attend this Microsoft training course?

The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.

  • Job role: Security Engineer
  • Preparation for exam: SC-200

Prerequisites

  • Basic understanding of Microsoft 365
  • Fundamental understanding of Microsoft security, compliance, and identity products
  • Intermediate understanding of Microsoft Windows
  • Familiarity with Azure services, specifically Azure SQL Database and Azure Storage
  • Familiarity with Azure virtual machines and virtual networking
  • Basic understanding of scripting concepts.

Microsoft Security Operations Analyst SC200 Course Overview

Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

What will you gain from taking this Microsoft training course?

  • Explain how Microsoft Defender for Endpoint can remediate risks in your environment.
  • Administer a Microsoft Defender for Endpoint environment.
  • Configure Attack Surface Reduction rules on Windows devices.
  • Perform actions on a device using Microsoft Defender for Endpoint.
  • Investigate domains and IP addresses in Microsoft Defender for Endpoint.
  • Investigate user accounts in Microsoft Defender for Endpoint.
  • Configure alert settings in Microsoft 365 Defender.
  • Conduct hunting in Microsoft 365 Defender.
  • Manage incidents in Microsoft 365 Defender.
  • Explain how Microsoft Defender for Identity can remediate risks in your environment.
  • Investigate DLP alerts in Microsoft Defender for Cloud Apps.
  • Explain the types of actions you can take on an insider risk management cases.
  • Configure auto-provisioning in Microsoft Defender for Cloud Apps.
  • Remediate alerts in Microsoft Defender for Cloud Apps.
  • Construct KQL statements.
  • Filter searches based on event time, severity, domain, and other relevant data using KQL.
  • Extract data from unstructured string fields using KQL.
  • Manage a Microsoft Sentinel workspace.
  • Use KQL to access the watchlist in Microsoft Sentinel.
  • Manage threat indicators in Microsoft Sentinel.
  • Explain the Common Event Format and Syslog connector differences in Microsoft Sentinel.
  • Connect Azure Windows Virtual Machines to Microsoft Sentinel.
  • Configure Log Analytics agent to collect Sysmon events.
  • Create new analytics rules and queries using the analytics rule wizard.
  • Create a playbook to automate an incident response.
  • Use queries to hunt for threats.
  • Observe threats over time with livestream.

Show moredown

What's included within this Microsoft training course?

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (4 days)

Classroom (4 days)

Online Self-paced (32 hours)

Microsoft Identity and Access Administrator SC300 Course Outline

Module 1: Implement an Identity Management Solution

  • Implement Initial Configuration of Azure AD
  • Create, Configure, and Manage Identities
  • Implement and Manage External Identities
  • Implement and Manage Hybrid Identity

Lab:

  • Manage User Roles
  • Setting Tenant-Wide Properties
  • Assign Licenses to Users
  • Restore or Remove Deleted Users
  • Add Groups in Azure AD
  • Change Group License Assignments
  • Change User License Assignments
  • Configure External Collaboration
  • Add Guest Users to the Directory
  • Explore Dynamic Groups

Module 2: Implement an Authentication and Access Management Solution

  • Secure Azure AD User with MFA
  • Manage User Authentication
  • Plan, Implement and Administer Conditional Access
  • Manage Azure AD Identity Protection

Lab:

  • Configure Azure AD MFA Authentication Registration Policy
  • Enable Sign-In Risk Policy
  • Manage Azure AD Smart Lockout Values
  • Configure Authentication Session Controls
  • Implement Conditional Access Policies, Roles, and Assignments
  • Work with Security Defaults
  • Configure and Deploy Self-Service Password Reset (SSPR)
  • Enable Azure AD MFA

Module 3: Implement Access Management for Apps

  • Plan and Design the Integration of Enterprise for SSO
  • Implement and Monitor the Integration of Enterprise Apps for SSO
  • Implement App Registration

Lab:

  • Implement Access Management for Apps
  • Create a Custom Role to Management App Registration
  • Register an Application
  • Grant Tenant-Wide Admin Consent to an Application
  • Add App Roles to Applications and Receive Tokens

Module 4: Plan and Implement an Identity Governance Strategy

  • Plan and Implement Entitlement Management
  • Plan, Implement and Manage Access Reviews
  • Plan and Implement Privileged Access
  • Monitor and Maintain Azure AD

Lab:

  • Configure PIM for Azure AD Roles
  • Assign Azure AD Role in PIM
  • Assign Azure Resource Roles in PIM
  • Connect Data from Azure AD to Azure Sentinel
  • Create Access Reviews for Groups and Apps
  • Manage the Lifecycle of External Users with Azure AD Identity Governance
  • Add Terms of Use Acceptance Report
  • Create and Manage a Resource Catalogue with Azure AD Entitlement

Show moredown

Prerequisites

In this Microsoft Identity and Access Administrator SC300 course, delegates should have an understanding of:

  • Security best practices and industry security requirements include defence in depth, least privileged access, shared responsibility, and zero trust model.
  • Be familiar with identity concepts such as authentication, authorisation, and active directory.
  • Have some experience deploying Azure workloads.
  • Some experience with Windows and Linux operating systems and scripting languages is helpful.

Audience

This Microsoft Identity and Access Administrator SC300 course is suitable for anyone who wants to gain in-depth knowledge about identity solutions and access management systems for Azure-based solutions.

Microsoft Identity and Access Administrator SC300​ Course Overview

The Microsoft Identity and Access Administrator is responsible for implementing, designing, and operating an organisation's access and identity management systems with Azure AD (Azure Active Directory). They are also liable for managing tasks like giving secure authorisation and authentication access to enterprise applications. Microsoft Identity and Access Administrator benefit organisations in many ways, such as modernising identity solutions, implementing identity governance, and implementing hybrid identity solutions. Adding Identity and Access Management as a skill in your profiles will surely help you climb the ladder of success in terms of value and career opportunities.

Our 4-day Microsoft Identity and Access Administrator SC300 training course aims to provide delegates with a comprehensive knowledge of implementing identity management solutions. They will also learn about various essential topics such as managing user authentication, managing Azure AD identity protection, implementing App registration, registering an application, monitor and maintaining Azure AD, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training and will help you get a complete understanding of this course.

This training will also cover the following concepts:

  • Create, configure, and manage identities
  • Implement and manage hybrid identity
  • Secure Azure AD user with MFA
  • Plan and implement privileged access

At the end of this Microsoft Identity and Access Administrator SC300 Training course, delegates will be able to implement and manage external identities and hybrid identities. They will also be able to implement and monitor the integration of enterprise apps for SSO effectively.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (3 days)

Classroom (3 days)

Online Self-paced (24 hours)

Microsoft Information Protection Administrator SC400​ Course Outline

Module 1: Implement Information Protection in Microsoft 365

  • Introduction to Information Protection and Governance in Microsoft 365
  • Classify Data for Protection and Governance
  • Create and Manage Sensitive Information Types
  • Describe Microsoft 365 Encryption
  • Deploy Message Encryption in Office 365
  • Configure Sensitivity Labels
  • Apply and Manage Sensitivity Labels

Lab: Implement Information Protection

  • Assign Permissions for Compliance
  • Manage Office 365 Message Encryption
  • Manage Sensitive Information Types
  • Manage Trainable Classifiers
  • Manage Sensitivity Labels

Module 2: Implement Data Loss Prevention in Microsoft 365

Lessons

  • Prevent Data Loss in Microsoft 365
  • Implement Endpoint Data Loss Prevention
  • Configure DLP Policies for Microsoft Cloud App Security and Power Platform
  • Manage DLP Policies and Reports in Microsoft 365

Lab: Implement Data Loss Prevention

  • Manage DLP Policies
  • Manage Endpoint DLP
  • Test DLP Policies
  • Manage DLP Reports

Module 3: Implement Information Governance in Microsoft 365

Lessons

  • Govern Information in Microsoft 365
  • Manage Data Retention in Microsoft 365 Workloads
  • Manage Records in Microsoft 365

Lab: Implement Information Governance

  • Configure Retention Labels
  • Implement Retention Labels
  • Configure Service-Based Retention
  • Use eDiscovery for Recovery
  • Configure Records Management

Show moredown

Prerequisites

In this Microsoft Information Protection Administrator training course, delegates should have:

  • Foundational knowledge of Microsoft security and compliance technologies.
  • Basic knowledge of information protection concepts.
  • Understanding of cloud computing concepts.
  • Understanding of Microsoft 365 products and services.

Audience

This training course is ideal for anyone who wants to learn the implementation of information protection in organisations for better data protection.

Microsoft Information Protection Administrator SC400​ Course Overview

The Microsoft Information Protection Administrator plans and defines applicable requirements, tests IT processes and performs operations against controls and policies. Organisations also implement information protection in Microsoft 365 to protect their data against theft and accidental loss. The Information Protection Administrator prepares and implements controls that meet up organisational compliance needs. This training course will help you develop skills to manage records in Microsoft 365 for better task management in the system. Excelling in this Microsoft Information Protection Administrator training course will lead the delegates to many highly reputed designations.

The Knowledge Academy’s Microsoft Information Protection Administrator training course is designed to improve the delegates’ ability to develop learning skills regarding information protection and governance in Microsoft 365. During this 2-day training course, delegates will gain elaborated information about Microsoft 365 encryption and steps to deploy message encryption in Office 365. During this course, you will learn how to accomplish technical tasks such as information protection, data loss prevention, and information governance.

It also accommodates the delegates with more knowledgeable topics, such as:

  • Configure sensitivity labels
  • Prevent data loss in Microsoft 365
  • Apply and manage sensitivity labels
  • Manage endpoint DLP
  • Manage sensitivity labels

At the end of this training course, delegates will be able to classify data for protection and governance in Microsoft 365. Delegates will also be able to create and manage sensitive information types and configure sensitivity labels.

Our highly expert trainer with abundant knowledge will conduct this training course to help you work with Information Technology (IT) to implement technology that supports policies and controls necessary to address regulatory requirements for your organisation.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

accredited by

Our Microsoft training course is accredited by Microsoft

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Microsoft Security, Compliance, and Identity Fundamentals SC900 Course Outline

Within this Microsoft training course, you will learn the following modules:

Module 1: Describe the concepts of security, compliance, and identity.

Learn about core concepts that are foundational to security, compliance, and identity solutions, including shared responsibility, Zero Trust, data residency, the role of identity providers, and more.

Lessons

  • Describe security and compliance concepts
  • Describe identity concepts

After completing this module, students will be able to:

  • Describe security and compliance concepts.
  • Describe identity concepts.

Module 2: Describe the capabilities of Microsoft Azure Active Directory, part of Microsoft Entra

Azure Active Directory is the tool for identity and access management in the Microsoft Cloud. Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.

Lessons

  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD
  • Describe the access management capabilities of Azure AD
  • Describe the identity protection and governance capabilities of Azure AD

Lab: Explore Azure Active Directory

Lab: Explore Azure AD Authentication with self-service password reset

Lab: Explore access management in Azure AD with Conditional Access

Lab: Explore identity governance in Azure AD with Privileged Identity Management

After completing this module, students will be able to:

  • Describe the basic services and identity types of Azure AD.
  • Describe the authentication capabilities of Azure AD.
  • Describe the access management capabilities of Azure AD.
  • Describe the identity protection and governance capabilities of Azure AD.

Module 3: Describe the capabilities of Microsoft security solutions

Learn about Microsoft’s security solutions. Topics covered include network and platform capabilities of Azure, Azure security management with Microsoft Defender for Cloud, and Microsoft Sentinel. You’ll learn about threat protection with Microsoft 365 Defender.

Lessons

  • Describe the basic security capabilities in Azure
  • Describe the security management capabilities of Azure
  • Describe the security capabilities of Microsoft Sentinel
  • Describe the threat protection capabilities of Microsoft 365 Defender

Lab: Explore Microsoft Defender for Cloud Apps

Lab: Explore Microsoft Sentinel

Lab: Explore Microsoft Defender for Cloud

Lab: Explore Azure Network Security Groups (NSGs)

Lab: Explore the Microsoft 365 Defender portal

After completing this module, students will be able to:

  • Describe the basic security capabilities in Azure.
  • Describe the security management capabilities of Azure.
  • Describe the security capabilities of Microsoft Sentinel.
  • Describe the threat protection capabilities of Microsoft 365 Defender.

Module 4: Describe the capabilities of Microsoft compliance solutions

Learn about Microsoft’s Service Trust Portal and privacy at Microsoft. You’ll learn about Microsoft Purview, a comprehensive set of solutions that help you govern, protect, and manage your entire data estate. You’ll also learn about Azure resource governance capabilities.

Lessons

  • Describe the Service Trust Portal and privacy at Microsoft
  • Describe the compliance management capabilities of Microsoft Purview
  • Describe information protection and data lifecycle management in Microsoft Purview
  • Describe the insider risk capabilities in Microsoft Purview
  • Describe the eDiscovery and audit capabilities of Microsoft Purview
  • Describe the resource governance capabilities in Azure

Lab: Explore the Core eDiscovery workflow

Lab: Explore Azure Policy

Lab: Explore the Service Trust Portal

Lab: Explore the Microsoft Purview compliance portal & Compliance Manager

Lab: Explore sensitivity labels in Microsoft Purview

Lab: Explore insider risk management in Microsoft Purview

After completing this module, students will be able to:

  • Describe the Service Trust Portal and privacy at Microsoft.
  • Describe the compliance management capabilities of Microsoft Purview.
  • Describe information protection and data lifecycle management in Microsoft Purview.
  • Describe the insider risk capabilities in Microsoft Purview.
  • Describe the eDiscovery and audit capabilities of Microsoft Purview.
  • Describe the resource governance capabilities in Azure

Show moredown

Prerequisites

For attending this Microsoft Security, Compliance, and Identity Fundamentals SC900 course, it will be beneficial if delegates have:

  • Prior understanding of networking and cloud computing concepts.
  • Prior IT knowledge or any general experience working in an IT environment.
  • Prior understanding of Microsoft Azure and Microsoft 365.

Audience

This Microsoft Security, Compliance, and Identity Fundamentals SC900 training course is designed for anyone who wants to gain in-depth knowledge about Security, Compliance, and Identity (SCI) across cloud-based and related Microsoft services.

Microsoft Security, Compliance, and Identity Fundamentals SC900​ Course Overview

Microsoft's Security, Compliance, and Identity (SCI) solution is developed to permit organisations to be more resilient and agile by integrating platforms, clouds, and services and assist in strengthening the security of cloud workloads and streamlining security management. This Microsoft Security, Compliance, and Identity Fundamentals SC900 is designed to provide individuals with the skills required for threat protection with Microsoft 365 defender and Microsoft 365 security management and Azure resources governance capabilities. Skills gained from this course will help learners to achieve higher job posts such as technical specialist, security architect, and many more reputed job profiles.

Our 1-day Microsoft Security, Compliance, and Identity Fundamentals SC900 Training course aims to provide delegates with a comprehensive knowledge of security, compliance, and identity. They will also learn about various essential topics such as authentication capabilities, access management capabilities, security capabilities, compliance management capabilities, insider risk capabilities, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training and help delegates get a comprehensive understanding using Microsoft Security, Compliance, and Identity (SCI).

This training will also cover the following concepts:

  • Security and compliance concepts and methodologies
  • Services and identity types of Azure AD
  • Security capabilities of Azure sentinel
  • eDiscovery and audit capabilities of Microsoft 365
  • Resource governance capabilities in Azure

At the end of this Microsoft Security, Compliance, and Identity Fundamentals SC900 course, delegates will be able to easily identify the protection and governance capabilities of Azure AD. They will also be able to do information protection and governance capabilities of Microsoft 365.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Microsoft Security Workshop: Implementing PowerShell Security Best Practices 40555A Training Course Outline

Module 1: PowerShell Fundamentals

  • Overview of Windows PowerShell
  • PowerShell Editions and Versions
  • Running PowerShell

Module 2: PowerShell Operational Security

  • Managing Local Script Execution
  • Managing Remote Execution Capabilities of Windows PowerShell
  • Managing Remote Execution Capabilities of PowerShell Core
  • Language Mode

Module 3: Implementing PowerShell-based Security

  • Windows PowerShell DSC
  • Just Enough Administration (JEA)
  • Windows PowerShell Auditing and Logging

Module 4: Windows PowerShell-based Exploits and their Mitigation

  • Windows PowerShell-Based Attacks
  • Windows PowerShell-Based Security Tools
  • Summary of Windows PowerShell Security-Related Technologies

Lab: Implementing Windows PowerShell Security

  • Implement Windows PowerShell Logging by Using DSC
  • Carry Out a Windows PowerShell-Based Exploit
  • Implement Just Enough Administration

Show moredown

Microsoft Security Workshop: Implementing PowerShell Security Best Practices 40555A Training Course Overview

Windows PowerShell is a scripting language, command-line shell, and scripting platform based on the Microsoft.NET Framework. Attending this Microsoft Security Workshop: Implementing PowerShell Security Best Practices 40555A training course will give delegates a comprehensive knowledge about PowerShell fundamentals, including its architectural design, its editions and versions, and basics of interacting with PowerShell. This obtained information will lead you to attain various designations such as senior technical leaders, dynamics CRM developers, Microsoft dynamics, data engineers, and many other designations.

The Knowledge Academy’s 1-day Microsoft Security Workshop: Implementing PowerShell Security Best Practices 40555A training course is designed to enlighten the delegates to provide an overview of Windows PowerShell-based security-related technologies. During this training course, delegates will acquire information to manage remote execution of PowerShell core. They will also learn to manage the remote execution capabilities of Windows PowerShell.

It also accommodates the delegates with other knowledgeable concepts, such as:

  • Windows PowerShell DSC
  • Carry out a windows PowerShell-based exploit
  • Implement just enough administration
  • Windows PowerShell-based attacks

At the end of this training course, delegates will be able to implement Windows PowerShell logging by using DSC that provides a set of PowerShell language extensions. They will also be able to get a summary of Windows PowerShell security-related technologies and handle PowerShell operational security. Our highly expert trainer with abundant knowledge has curated this training course that enables the delegates to automate the administration of the Windows operating system and applications that run on Windows.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Experienced Instructor

Show moredown

Not sure which course to choose?

Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on 01344203999 or Enquire.

Microsoft Security Engineer Training FAQs

FAQ's

Professionals who hold Microsoft Security Engineer Training are more likely to obtain more excellent job prospects, higher pay and get better job profiles in organisations as compared to their uncertified peers.
Security Engineers are in charge of screening and testing security software and monitoring systems and networks for security breaches and intrusions.
 Yes, The Knowledge Academy is accredited by Microsoft to provide these Microsoft Security Engineer Training courses.
During the Microsoft Security Operations Analyst SC200 training course, you will learn various essential topics such as how to query, visualise, and monitor data in Azure sentinel, etc. You will also learn to connect Windows hosts to Azure sentinel, respond to data loss prevention alerts, manage insider risk in Microsoft 365, etc.
The Microsoft Identity and Access Administrator SC300 training course provides you with a comprehensive knowledge of implementing identity management solutions. You will also learn about various essential topics such as managing Azure AD identity protection, registering an application, monitoring and maintaining Azure AD, etc.
The Knowledge Academy is the Leading global training provider for Microsoft Security Engineer Training.
The price for Microsoft Security Engineer Training certification in the United Kingdom starts from £.

Why we're the go to training provider for you

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

We are accredited by PeopleCert on behalf of AXELOS

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Microsoft Security Engineer Training