Making sure that only the right individuals are able to access the right resources at the right time is at the core of identity and access management. Microsoft provides the tools and resources to properly secure, authenticate, and authorize Azure AD, Windows Server, and Microsoft 365.
Security, Compliance, and Identity
SC-900T00: Security, Compliance, and Identity Fundamentals | 1 Day
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
Ideal for: IT Administrators
Certification: Security, Compliance, and Identity Fundamentals
Exam: SC-900
SC-100T00: Microsoft Cybersecurity Architect | 4 Days
Cybersecurity ArchitectThis course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.
Ideal for: Administrators, Security Engineers, Solution Architects
Certification: Cybersecurity Architect
Exam: SC-100
SC-200T00: Microsoft Security Operations Analyst | 4 Days
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Ideal for: Security Engineer, Security Operations Analyst
Certification: Security Operations Analyst Associate
Exam: SC-200
SC-300T00: Microsoft Identity and Access Administrator | 4 Days
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies.
Ideal for: Administrators, Identity And Access Administrator
Certification: Identity and Access Administrator Associate
Exam: SC-300
SC-400T00: Microsoft Information Protection Administrator | 2 Days
Learn how to protect information in your Microsoft 365 deployment. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and more.
Ideal for: Admins, Information Protection Administrators
Certification: Information Protection Administrator Associate
Exam: SC-400
Azure Role-Based
AZ-500T00: Microsoft Azure Security Technologies | 4 Days
In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools.
Ideal for: Azure Security Engineers, IT Engineers
Certification: Azure Security Engineer Associate
Exam: AZ-500
Microsoft 365 Role-Based
MS-100T00: Microsoft 365 Identity and Services | 5 Days
This course covers three central elements of Microsoft 365 enterprise administration—Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management.
Ideal for: Administrators
Certification: Enterprise Administrator Expert
Exam: MS-100 and MS-101
MS-101T00: Microsoft 365 Mobility and Security | 5 Days
This course covers three central elements of Microsoft 365 enterprise administration—Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management.
Ideal for: Administrators
Certification: Enterprise Administrator Expert
Exam: MS-100 and MS-101
MS-500: Microsoft 365 Security Administrator | 4 Days
In this course you will learn how to secure user access to your organization's resources. Topics include user password protection, multi-factor authentication, how to enable Azure Identity Protection, use Azure AD Connect, and introduces you to conditional access in Microsoft 365.
Ideal for: Security Administrators
Certification: Security Administrator Associate
Exam: MS-500
Microsoft Endpoint Security
55348: Administering Microsoft Endpoint Configuration Manager | 5 Days
Administrators (EDAs)This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports.
Ideal for: Experienced IT Professionals and Enterprise Desktop