Making sure that only the right individuals are able to access the right resources at the right time is at the core of identity and access management. Microsoft provides the tools and resources to properly secure, authenticate, and authorize Azure AD, Windows Server, and Microsoft 365.

Security, Compliance, and Identity

SC-900T00: Security, Compliance, and Identity Fundamentals | 1 Day

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Ideal for: IT Administrators

Certification: Security, Compliance, and Identity Fundamentals

Exam: SC-900

SC-100T00: Microsoft Cybersecurity Architect | 4 Days

Cybersecurity ArchitectThis course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.

Ideal for: Administrators, Security Engineers, Solution Architects

Certification: Cybersecurity Architect

Exam: SC-100

SC-200T00: Microsoft Security Operations Analyst | 4 Days

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.

Ideal for: Security Engineer, Security Operations Analyst

Certification: Security Operations Analyst Associate

Exam: SC-200

SC-300T00: Microsoft Identity and Access Administrator | 4 Days

This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies.

Ideal for: Administrators, Identity And Access Administrator

Certification: Identity and Access Administrator Associate

Exam: SC-300

SC-400T00: Microsoft Information Protection Administrator | 2 Days

Learn how to protect information in your Microsoft 365 deployment. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and more.

Ideal for: Admins, Information Protection Administrators

Certification: Information Protection Administrator Associate

Exam: SC-400

Azure Role-Based

AZ-500T00: Microsoft Azure Security Technologies | 4 Days

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools.

Ideal for: Azure Security Engineers, IT Engineers

Certification: Azure Security Engineer Associate

Exam: AZ-500

Microsoft 365 Role-Based

MS-100T00: Microsoft 365 Identity and Services | 5 Days

This course covers three central elements of Microsoft 365 enterprise administration—Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management.

Ideal for: Administrators

Certification: Enterprise Administrator Expert

Exam: MS-100 and MS-101

MS-101T00: Microsoft 365 Mobility and Security | 5 Days

This course covers three central elements of Microsoft 365 enterprise administration—Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management.

Ideal for: Administrators

Certification: Enterprise Administrator Expert

Exam: MS-100 and MS-101

MS-500: Microsoft 365 Security Administrator | 4 Days

In this course you will learn how to secure user access to your organization's resources. Topics include user password protection, multi-factor authentication, how to enable Azure Identity Protection, use Azure AD Connect, and introduces you to conditional access in Microsoft 365.

Ideal for: Security Administrators

Certification: Security Administrator Associate

Exam: MS-500

Microsoft Endpoint Security

55348: Administering Microsoft Endpoint Configuration Manager | 5 Days

Administrators (EDAs)This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports.

Ideal for: Experienced IT Professionals and Enterprise Desktop