Microsoft
Microsoft Logo

Learn how Microsoft safeguards customer data 

  • Offered byMicrosoft

Learn how Microsoft safeguards customer data
 at 
Microsoft 
Overview

Duration

6 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

Learn how Microsoft safeguards customer data
 at 
Microsoft 
Course details

What are the course deliverables?
  • Understand Microsoft 365 governance
  • Understand Microsoft 365 risk management
  • Understand Microsoft 365 cloud architecture
  • Understand Microsoft 365 security incident management
  • Understand Microsoft 365 identity and access management
  • Understand Microsoft 365 audit logging and monitoring
  • Understand Microsoft 365 vulnerability management and security monitoring
  • Understand Microsoft 365 resiliency and continuity
  • Understand Microsoft 365 security development and operation
  • Understand Microsoft 365 encryption
  • Understand Microsoft 365 privacy
  • Understand Microsoft 365 subprocessor management
  • Understand Microsoft datacenter security
More about this course
  • Learn how Microsoft safeguards customer data is designed for people in audit, compliance, risk, and legal roles who seek an overall understanding of Microsoft 365’s fundamental security and privacy practices to safeguard their customer data
  • Learn how Microsoft implements organization-wide security and privacy governance to support the secure operation of Microsoft 365 services and maintain compliance with regulatory requirements and customer commitments
  • Learn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers and the Microsoft 365 environment
  • Learn how the architecture of Microsoft 365 implements security and privacy features to protect customers who use Microsoft 365 multi-tenant services

Learn how Microsoft safeguards customer data
 at 
Microsoft 
Curriculum

Understand Microsoft 365 governance

Introduction to Microsoft 365 governance

Understand Microsoft 365's organizational structure

Learn about the Microsoft policy framework

Understand the Microsoft security policy and standards program

Explore the Microsoft 365 information security policy

Understand Microsoft personnel security governance

Summary and knowledge check

Understand Microsoft 365 risk management

Introduction to Microsoft 365 risk management

Microsoft Enterprise Risk Management (ERM)

Microsoft 365 Risk Management overview

Understand risk identification and risk assessment

Understand risk response, monitoring, and reporting

Summary and knowledge check

Understand Microsoft 365 cloud architecture

Introduction to Microsoft 365 architecture

Explore the security principles of Microsoft 365 architecture

Understand network, service, and tenant isolation in Microsoft 365

Understand how Microsoft defends from DoS attacks

Understand Microsoft 365 resiliency

Explore how Microsoft 365 performs architecture validation

Summary and knowledge check

Understand Microsoft 365 security incident management

Introduction to Microsoft 365 security incident management

Understand Microsoft 365 incident response phase 1 - preparation

Understand Microsoft 365 incident response phase 2 - detection and analysis

Understand Microsoft 365 incident response phase 3 - containment, eradication, and recovery

Understand Microsoft 365 incident response phase 4 - post-incident activity

Understand customer notification process

Summary and knowledge check

Understand Microsoft 365 identity and access management

Introduction to Microsoft 365 identity and access management

Recognize Microsoft managed account types

Explore tools and technologies used for access control within Microsoft 365

Understand the prerequisites for service team account creation

Understand privileged access

Understand Microsoft Purview Customer Lockbox

Explore access control management during employee transfer and termination

Summary and knowledge check

Understand Microsoft 365 audit logging and monitoring

Introduction to Microsoft 365 audit logging and monitoring

Understand Microsoft 365 log collection

Learn about Microsoft 365 log protection and retention

Explore Microsoft 365 log analysis and reporting

Summary and knowledge check

Understand Microsoft 365 vulnerability management and security monitoring

Introduction to Microsoft 365 vulnerability management and security monitoring

Understand machine state scanning in Microsoft 365

Understand patch management and anti-malware

Understand vulnerability and configuration scanning

Understand Microsoft 365 security monitoring

Explore attack simulation and penetration testing

Summary and knowledge check

Understand Microsoft 365 resiliency and continuity

Introduction to Microsoft 365 resiliency and continuity

Understand engineering for resilience

Explore Microsoft's Enterprise Business Continuity Management (EBCM) program

Understand BCM assessment activities

Explore the BCM planning phase

Understand BCP capability validation

Understand availability monitoring and capacity planning

Summary and knowledge check

Understand Microsoft 365 security development and operation

Introduction to Microsoft 365 security development and operation

Understand Microsoft developer security training requirements

Learn about security and privacy by design

Explore SDL security tool automation

Understand application penetration testing

Learn how security and privacy reviews support secure deployment

Explore Microsoft 365's safe deployment process (SDP)

Understand open source security at Microsoft

Summary and knowledge check

Understand Microsoft 365 encryption

Introduction to Microsoft 365 encryption

Learn how BitLocker encrypts data-at-rest

Understand service encryption in Microsoft Purview

Explore customer key management using Customer Key

Learn how data is encrypted in-transit

Summary and knowledge check

Understand Microsoft 365 privacy

Introduction to privacy

Learn key privacy terms and categories of data

Understand data lifecycle

Understand data lifecycle - collection

Understand data lifecycle - processing

Understand data lifecycle - third party sharing

Understand data lifecycle - retention

Understand data lifecycle - destruction

Learn roles and responsibilities

Explore GDPR

Summary and knowledge check

Understand Microsoft 365 subprocessor management

Introduction to Microsoft 365 subprocessor management

Understand Microsoft subprocessor requirements

Explore subprocessor access controls requirements

Understand Microsoft 365 additional subprocessor requirements

Understand subprocessor onboarding and monitoring

Understand subprocessor offboarding

Summary and knowledge check

Understand Microsoft datacenter security

Introduction to Microsoft datacenter security

Architecture and infrastructure

Risk management

Environmental safeguards

Physical security

Asset management

Data bearing device security

Business continuity and disaster recovery

Summary and knowledge check

Learn how Microsoft safeguards customer data
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
4 hours
Intermediate
Free
5 hours
Beginner
Free
1 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

Learn how Microsoft safeguards customer data
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...