Microsoft 365 and Azure Security Bootcamp

Unlock the power of Microsoft 365 and Azure with our Security Bootcamp, designed for IT security professionals aiming to enhance their skills in identity protection, threat management, and data governance.

Course Thumbnail

Essential Skills Gained

Checkmark

Enhance security postures using Microsoft 365 and Azure tools

Checkmark

Identify and remediate vulnerabilities effectively

Checkmark

Implement robust security strategies in hybrid environments

Checkmark

Manage identity, information, and threat protection efficiently

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • Security Administrators
  • Identity Protection Specialists
  • Threat Management Professionals
  • Data Governance Experts

Description

During this class, the attendees will acquire skills and knowledge related to security controls, security postures and the proper identification and remediation of vulnerabilities by using available tools in Microsoft 365 and Azure.

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Module 1: Identity and Access

  1. Configure Azure Active Directory for Azure Workloads and Subscriptions

  2. Configure Azure AD Privileged Identity Management

  3. Configure Security for an Azure Subscription

Module 2: Microsoft 365 Threat Management

  1. Security in Microsoft 365

  2. Advanced Threat Protection

  3. Threat Management

  4. Cloud Application Security

Module 3: Information Protection

  1. Information Protection

  2. Data Loss Prevention

  3. Compliance in Microsoft 365

  4. Archiving and Retention

  5. Content Search and Investigation

Module 4: Platform Protection

  1. Understand Cloud Security

  2. Build a Network

  3. Secure Network

  4. Implement Host Security

  5. Implement Platform Security

  6. Implement Subscription Security

  7. Configure Security Services

  8. Configure Security Policies by Using Azure Security Center

  9. Manage Security Alerts

Module 5: Data and Applications

  1. Configure Security Policies to Manage Data

  2. Configure Security for Data Infrastructure

  3. Configure Encryption for Data at Rest

  4. Understand Application Security

  5. Implement Security for Application Lifecycle

  6. Secure Applications

  7. Configure and Manage Azure Key Vault

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.