Learn how Microsoft safeguards customer data
- Offered byMicrosoft
Learn how Microsoft safeguards customer data at Microsoft Overview
Duration | 6 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Learn how Microsoft safeguards customer data at Microsoft Course details
- Understand Microsoft 365 governance
- Understand Microsoft 365 risk management
- Understand Microsoft 365 cloud architecture
- Understand Microsoft 365 security incident management
- Understand Microsoft 365 identity and access management
- Understand Microsoft 365 audit logging and monitoring
- Understand Microsoft 365 vulnerability management and security monitoring
- Understand Microsoft 365 resiliency and continuity
- Understand Microsoft 365 security development and operation
- Understand Microsoft 365 encryption
- Understand Microsoft 365 privacy
- Understand Microsoft 365 subprocessor management
- Understand Microsoft datacenter security
- Learn how Microsoft safeguards customer data is designed for people in audit, compliance, risk, and legal roles who seek an overall understanding of Microsoft 365’s fundamental security and privacy practices to safeguard their customer data
- Learn how Microsoft implements organization-wide security and privacy governance to support the secure operation of Microsoft 365 services and maintain compliance with regulatory requirements and customer commitments
- Learn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers and the Microsoft 365 environment
- Learn how the architecture of Microsoft 365 implements security and privacy features to protect customers who use Microsoft 365 multi-tenant services
Learn how Microsoft safeguards customer data at Microsoft Curriculum
Understand Microsoft 365 governance
Introduction to Microsoft 365 governance
Understand Microsoft 365's organizational structure
Learn about the Microsoft policy framework
Understand the Microsoft security policy and standards program
Explore the Microsoft 365 information security policy
Understand Microsoft personnel security governance
Summary and knowledge check
Understand Microsoft 365 risk management
Introduction to Microsoft 365 risk management
Microsoft Enterprise Risk Management (ERM)
Microsoft 365 Risk Management overview
Understand risk identification and risk assessment
Understand risk response, monitoring, and reporting
Summary and knowledge check
Understand Microsoft 365 cloud architecture
Introduction to Microsoft 365 architecture
Explore the security principles of Microsoft 365 architecture
Understand network, service, and tenant isolation in Microsoft 365
Understand how Microsoft defends from DoS attacks
Understand Microsoft 365 resiliency
Explore how Microsoft 365 performs architecture validation
Summary and knowledge check
Understand Microsoft 365 security incident management
Introduction to Microsoft 365 security incident management
Understand Microsoft 365 incident response phase 1 - preparation
Understand Microsoft 365 incident response phase 2 - detection and analysis
Understand Microsoft 365 incident response phase 3 - containment, eradication, and recovery
Understand Microsoft 365 incident response phase 4 - post-incident activity
Understand customer notification process
Summary and knowledge check
Understand Microsoft 365 identity and access management
Introduction to Microsoft 365 identity and access management
Recognize Microsoft managed account types
Explore tools and technologies used for access control within Microsoft 365
Understand the prerequisites for service team account creation
Understand privileged access
Understand Microsoft Purview Customer Lockbox
Explore access control management during employee transfer and termination
Summary and knowledge check
Understand Microsoft 365 audit logging and monitoring
Introduction to Microsoft 365 audit logging and monitoring
Understand Microsoft 365 log collection
Learn about Microsoft 365 log protection and retention
Explore Microsoft 365 log analysis and reporting
Summary and knowledge check
Understand Microsoft 365 vulnerability management and security monitoring
Introduction to Microsoft 365 vulnerability management and security monitoring
Understand machine state scanning in Microsoft 365
Understand patch management and anti-malware
Understand vulnerability and configuration scanning
Understand Microsoft 365 security monitoring
Explore attack simulation and penetration testing
Summary and knowledge check
Understand Microsoft 365 resiliency and continuity
Introduction to Microsoft 365 resiliency and continuity
Understand engineering for resilience
Explore Microsoft's Enterprise Business Continuity Management (EBCM) program
Understand BCM assessment activities
Explore the BCM planning phase
Understand BCP capability validation
Understand availability monitoring and capacity planning
Summary and knowledge check
Understand Microsoft 365 security development and operation
Introduction to Microsoft 365 security development and operation
Understand Microsoft developer security training requirements
Learn about security and privacy by design
Explore SDL security tool automation
Understand application penetration testing
Learn how security and privacy reviews support secure deployment
Explore Microsoft 365's safe deployment process (SDP)
Understand open source security at Microsoft
Summary and knowledge check
Understand Microsoft 365 encryption
Introduction to Microsoft 365 encryption
Learn how BitLocker encrypts data-at-rest
Understand service encryption in Microsoft Purview
Explore customer key management using Customer Key
Learn how data is encrypted in-transit
Summary and knowledge check
Understand Microsoft 365 privacy
Introduction to privacy
Learn key privacy terms and categories of data
Understand data lifecycle
Understand data lifecycle - collection
Understand data lifecycle - processing
Understand data lifecycle - third party sharing
Understand data lifecycle - retention
Understand data lifecycle - destruction
Learn roles and responsibilities
Explore GDPR
Summary and knowledge check
Understand Microsoft 365 subprocessor management
Introduction to Microsoft 365 subprocessor management
Understand Microsoft subprocessor requirements
Explore subprocessor access controls requirements
Understand Microsoft 365 additional subprocessor requirements
Understand subprocessor onboarding and monitoring
Understand subprocessor offboarding
Summary and knowledge check
Understand Microsoft datacenter security
Introduction to Microsoft datacenter security
Architecture and infrastructure
Risk management
Environmental safeguards
Physical security
Asset management
Data bearing device security
Business continuity and disaster recovery
Summary and knowledge check