Course Details
LU1 Microsoft Security, Compliance, and Identity Fundamentals: Describe the concepts of security, compliance, and identity
Topic 1 Describe security and compliance concepts
- Describe the shared responsibility model
- Describe defense in depth
- Describe the Zero Trust model
- Describe encryption and hashing
- Describe governance, risk, and compliance (GRC) concepts
Topic 2 Describe identity concepts
- Define authentication and authorization
- Define identity as the primary security perimeter
- Describe the role of the identity provider
- Describe the concept of directory services and Active Directory
- Describe the concept of federation
LU2 Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft Entra
Topic 3 Describe the function and identity types of Microsoft Entra ID
- Describe Microsoft Entra ID
- Describe types of identities1
- Describe hybrid identity
- Describe external identities
Topic 4 Describe the authentication capabilities of Microsoft Entra ID
- Describe authentication methods
- Describe multifactor authentication
- Describe self-service password reset
- Describe password protection and management capabilities
Topic 5 Describe access management capabilities of Microsoft Entra ID
- Describe Conditional Access
- Describe Microsoft Entra roles and role-based access control (RBAC)
Topic 6 Describe the identity protection and governance capabilities of Microsoft Entra
- Describe Microsoft Entra ID Governance
- Describe access reviews
- Describe entitlement management
- Describe the capabilities of Privileged identity Management
- Describe Microsoft Entra ID Protection
- Describe Microsoft Entra Permissions Management
- Describe Microsoft Entra Verified ID
LU3 Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft security solutions
Topic 7 Describe core infrastructure security services in Azure
- Describe Azure DDoS protection
- Describe Azure Firewall
- Describe Web Application Firewall
- Describe network segmentation in Azure
- Describe Azure Network Security Groups
- Describe Azure Bastion
- Describe Azure Key Vault
Topic 8 Describe the security management capabilities in Azure
- Describe Microsoft Defender for Cloud
- Describe how security policies and initiatives improve cloud security posture
- Describe Cloud security posture management
- Describe the enhanced security of Microsoft Defender for Cloud
- Describe DevOps security management
Topic 9 Describe the capabilities in Microsoft Sentinel
- Define the concepts of SIEM and SOAR1 min
- Describe threat detection and mitigation capabilities in Microsoft Sentinel
- Describe Microsoft Security Copilot
Topic 10 Describe threat protection with Microsoft 365 Defender
- Describe Microsoft 365 Defender services
- Describe Microsoft Defender for Office 365
- Describe Microsoft Defender for Endpoint
- Describe Microsoft Defender for Cloud Apps
- Describe Microsoft Defender for Identity
- Describe Microsoft Defender Vulnerability Management
- Describe Microsoft Defender Threat Intelligence
- Describe the Microsoft 365 Defender portal
LU4 Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft compliance solutions
Topic 11 Describe Microsoft’s Service Trust portal and privacy capabilities
- Describe the offerings of the Service Trust portal
- Describe Microsoft's privacy principles
- Describe Microsoft Priva
Topic 12 Describe the compliance management capabilities in Microsoft Purview
- Describe the Microsoft Purview compliance portal
- Describe Compliance Manager
- Describe use and benefits of compliance score
Topic 13 Describe the information protection and data lifecycle management in Microsoft Purview
- Know your data, protect your data, and govern your data
- Describe the data classification capabilities of the compliance portal
- Describe sensitivity labels and policies
- Describe data loss prevention
- Describe retention policies and retention labels
- Describe records management
- Describe the Microsoft Purview unified data governance solution
Topic 14 Describe the insider risk capabilities in Microsoft Purview
- Describe insider risk management
- Describe communication compliance
Topic 15 Describe the eDiscovery and Audit capabilities in Microsoft Purview
- Describe the eDiscovery solutions in Microsoft Purview
- Describe the audit solutions in Microsoft Purview
Course Info
Prerequisite:
This course is for beginner. No prior knowledge on qoo10 is required.:
Software Requirement
Please register your Qoo10 account before the class. You need the following documents for sign up.
- Credit card to make payment to qoo10
- IC
- ank Account Details (for link to qoo10 account so that they can send you money)
HRDF Funding
Please refer to this video https://youtu.be/Kzpd-V1F9Xs
1- HRD Corp Grant Helper
How to submit grant applications for HRD Corp Claimable Courses
2- Employers are required to apply for the grant at least one week before training commences.
Employers must submit their applications with supporting documents, including invoices/quotations, trainer profiles, training schedule and course content.
3- First, Login to Employer’s e-TRIS account -https://etris.hrdcorp.gov.my
Second, Click Application
4- Click Grant on the left side under Applications
5- Click Apply Grant on the left side under Applications
6- Click Apply
7- Choose a Scheme Code and select HRD Corp Claimable Courses: Skim Bantuan Latihan Khas. Then, click Apply
8- Scheme Code represents all types of training that suit the requirements provided by HRD Corp. Below are the list of schemes offered by HRD Corp:
9- Select your Immediate Officer and click Next
10- Select a Training Provider, then click Next
11- Please select a training programme from the list, then key in all the required details and click Next
Select your desired training programme.
Give an explanation on why the participant is required to attend the training. E.g., related to their tasks/ career development, etc.
Explain the background and objective of this training.
Select a relevant focus area. For Employer-Specific Courses, select ‘Not Applicable’.
12- If the training programme is a micro-credential programme, you are required to complete these 3 fields. Save and click Next
Insert MiCAS Application number
13- Based on the nine (9) pillars listed below, HRD Corp Focus Area Courses are closely tied to support government initiatives towards nation building. As such, courses offered through the HRD Corp Focus Areas are designed to provide the workforce with skills required for current and future demands. Details of the focus areas are as follows:
14- Please select a Course Title and Type of Training
15- Select the correct type of training according to the actual type of training, or as mentioned in the training brochure:
16- Please key in the Training Location and click Next
17- Please select the Level of Certification and click Next
18- Please follow the instructions and key in trainee details
19- Click Add Batch, then click Save
20- Click Add Trainee Details
21- Please key in all the required details, then click Add
22- Click Add if there are more participants. Once done, click Save
23- Click Next
24- Please key in the course fees and allowance details, then click Save
25- Estimated cost includes the course fees/external trainer fees, allowances, and consumable training materials. Please comply with the HRD Corp Allowable Cost Matrix.
26- Select Upfront Payment to Training Provider and key in the percentage from 0% to 30%. Then, click Save and Next
27- Complete the declaration form and select a desired officer
28- Add all the required documents, then click Add Attachment. Then, click Save and Submit Application
29- Once the New Grant Application is successfully submitted, the Grant Officer will evaluate the application accordingly. The application may be queried if additional information is required.
The application status will be updated via the employer’s dashboard, email, and the e-TRiS inbox.
Job Roles
- IT Security Specialist
- Compliance Officer
- System Administrator
- Network Administrator
- Cybersecurity Analyst
- IT Manager
- Security Engineer
- Data Privacy Specialist
- IT Auditor
- Risk Management Specialist
- Security Consultant
- Information Security Officer
- IT Governance Specialist
- Cloud Security Specialist
- Identity and Access Management Specialist
Trainers
Agus Salim is a professional with more than 10 years of experience in Project Management, IT Solutions Management, and Systems Integration both in waterfall and agile methodology. He started out his career as a Web Developer before moving on to Business Analyst/Project Manager. He has strong leadership and the capability of leading a team with a proven ability to deliver projects with tight timelines. Besides his experiences in managing projects, he has good knowledge in Cybersecurity and hands-on experience in Next Generation Firewall such as Check Point. During his free time, he likes to explore Cloud Technology, especially on Microsoft Azure. Agus has obtained AZ-104, AZ-500 and other Microsoft certifications. I am also a ALCP certified trainer.