Logo Microsoft Azure

Security, Compliance and Identity Associate

Trainings-ID:
SCIA

Wichtige Information

Inhalt des Trainings

Die technische Fachkraft für Azure Sicherheit implementiert, verwaltet und überwacht die Sicherheit für Ressourcen in Azure sowie in Multicloud- und Hybridumgebungen als Teil der umfassenden Infrastruktur. Zu den Aufgaben gehören das Verwalten des Sicherheitsstatus, Identifizieren und Beheben von Sicherheitsrisiken, Durchführen von Bedrohungsmodellierungen und das Implementieren des Bedrohungsschutzes. Zudem können sie auf Eskalationen von Sicherheitsincidents reagieren. Microsoft Information Protection-Administratoren planen und implementieren Kontrollen, die Informationsschutz- und Governanceanforderungen der Organisation erfüllen. Dabei kommen Information Protection-Dienste von Microsoft 365 zum Einsatz. Diese Personen sind für die technische Implementierung von Anforderungen und Kontrollen für den Informationsschutz verantwortlich.

Detail-Inhalte


AZ-900 Praxis+ Microsoft Azure Fundamentals
  • Describe Core Azure Concepts
  • Describe Core Azure Services
  • Describe Core Solutions and Management Tools on Azure
  • Describe general Security and Network Security Features
  • Describe Identity, Governance, Privacy and Compliance Features
  • Describe Azure Cost Management and Service Level Agreements
SC-900 Microsoft Security, Compliance and Identity Fundamentals
  • Describe security and compliance concepts
  • Describe identity concepts
  • Describe the function and identity types of Microsoft Entra ID
  • Describe the authentication capabilities of Microsoft Entra ID
  • Describe access management capabilities of Microsoft Entra ID
  • Describe the identity protection and governance capabilities of Microsoft Entra
  • Describe core infrastructure security services in Azure
  • Describe the security management capabilities in Azure
  • Describe the capabilities in Microsoft Sentinel
  • Describe threat protection with Microsoft 365 Defender
  • Describe Microsoft’s Service Trust portal and privacy capabilities
  • Describe the compliance management capabilities in Microsoft Purview
  • Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview
  • Describe the insider risk capabilities in Microsoft Purview
  • Describe the eDiscovery and Audit capabilities in Microsoft Purview
SC-300 Microsoft Identity and Access Administrator
  • Erkunden der Identität und Microsoft Entra ID
  • Implementieren der Erstkonfiguration von Microsoft Entra ID
  • Erstellen, Konfigurieren und Verwalten von Id
  • Implementieren der Zugriffsverwaltung für Azure-Ressourcen
  • Planen und Entwerfen der Integration von Unternehmens-Apps für SSO
  • Implementieren und Überwachen der Integration von Unternehmens-Apps für einmaliges Anmelden
  • Implementieren der App-Registrierung
  • Planen und Implementieren der Berechtigungsverwaltung
  • Planen, Implementieren und Verwalten der Zugriffsüberprüfung
  • Planen und Implementieren von privilegiertem Zugriff
  • Überwachen und Verwalten von Microsoft Entra ID
SC-200 Microsoft Security Operations Analyst
  • Introduction to Microsoft 365 threat protection
  • Mitigate incidents using Microsoft 365 Defender
  • Protect your identities with Azure AD Identity Protection
  • Remediate risks with Microsoft Defender for Office 365
  • Safeguard your environment with Microsoft Defender for Identity
  • Secure your cloud apps and services with Microsoft Defender for Cloud Apps
  • Respond to data loss prevention alerts using Microsoft 365
  • Manage insider risk in Microsoft Purview
  • Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview Standard
  • Investigate threats using audit in Microsoft 365 Defender and Microsoft Purview (Premium)
  • Investigate threats with Content search in Microsoft Purview
  • Protect against threats with Microsoft Defender for Endpoint
  • Deploy the Microsoft Defender for Endpoint environment
  • Implement Windows security enhancements with Microsoft Defender for Endpoint
  • Perform device investigations in Microsoft Defender for Endpoint
  • Perform actions on a device using Microsoft Defender for Endpoint
  • Perform evidence and entities investigations using Microsoft Defender for Endpoint
  • Configure and manage automation using Microsoft Defender for Endpoint
  • Configure for alerts and detections in Microsoft Defender for Endpoint
  • Utilize Vulnerability Management in Microsoft Defender for Endpoint
  • Plan for cloud workload protections using Microsoft Defender for Cloud
  • Connect Azure assets to Microsoft Defender for Cloud
  • Connect non-Azure resources to Microsoft Defender for Cloud
  • Manage your cloud security posture management
  • Explain cloud workload protections in Microsoft Defender for Cloud
  • Remediate security alerts using Microsoft Defender for Cloud
  • Construct KQL statements for Microsoft Sentinel
  • Analyze query results using KQL
  • Build multi-table statements using KQL
  • Work with data in Microsoft Sentinel using Kusto Query Language
  • Introduction to Microsoft Sentinel
  • Create and manage Microsoft Sentinel workspaces
  • Query logs in Microsoft Sentinel
  • Use watchlists in Microsoft Sentinel
  • Utilize threat intelligence in Microsoft Sentinel
  • Connect data to Microsoft Sentinel using data connectors
  • Connect Microsoft services to Microsoft Sentinel
  • Connect Microsoft 365 Defender to Microsoft Sentinel
  • Connect Windows hosts to Microsoft Sentinel
  • Connect Common Event Format logs to Microsoft Sentinel
  • Connect syslog data sources to Microsoft Sentinel
  • Connect threat indicators to Microsoft Sentinel
  • Threat detection with Microsoft Sentinel analytics
  • Automation in Microsoft Sentinel
  • Security incident management in Microsoft Sentinel
  • Identify threats with Behavioral Analytics
  • Data normalization in Microsoft Sentinel
  • Query, visualize, and monitor data in Microsoft Sentinel
  • Manage content in Microsoft Sentinel
  • Explain threat hunting concepts in Microsoft Sentinel
  • Threat hunting with Microsoft Sentinel
  • Use Search jobs in Microsoft Sentinel
  • Hunt for threats using notebooks in Microsoft Sentinel
SC-400 Microsoft Information Protection Administrator
  • Introduction to information protection and data lifecycle management in Microsoft Purview
  • Classify data for protection and governance
  • Create and manage sensitive information typesUnderstand Microsoft 365 encryption
  • Deploy Microsoft Purview Message Encryption
  • Protect information in Microsoft Purview
  • Apply and manage sensitivity labels
  • Prevent data loss in Microsoft Purview
  • Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
  • Manage data loss prevention policies and reports in Microsoft 365
  • Manage the data lifecycle in Microsoft Purview
  • Manage data retention in Microsoft 365 workloads
  • Manage records in Microsoft Purview
  • Explore compliance in Microsoft 365
  • Search for content in the Microsoft Purview compliance portal
  • Manage Microsoft Purview eDiscovery (Standard)
  • Manage Microsoft Purview eDiscovery (Premium)
  • Manage Microsoft Purview Audit (Standard)
  • Prepare Microsoft Purview Communication Compliance
  • Manage insider risk in Microsoft Purview
  • Implement Microsoft Purview Information Barriers
  • Manage regulatory and privacy requirements with Microsoft Priva
  • Implement privileged access management
  • Manage Customer Lockbox
Security SkillBoost
  • Tag 1
    • Überblick Microsoft Cloud Security Stack
    • Aufbau von Konnektoren und Konfiguration erster Security Tools
  • Tag 2
    • Konfiguration der Microsoft 365 Defender- Produktfamilie inkl. den Microsoft Defender for Cloud
  • Tag 3
    • Etablierung einer Data Loss Prevention und Information Protection
    • Etablierung von Governance- und Compliance-Richtlinien
  • Tag 4
    • Allgemeine Vertiefung des Microsoft 365 Tenants

Scrum Foundation für Scrum Master und Product Owner
  • Prinzipien und zugrundeliegende Theorie von Scrum
  • Überblick über das Scrum Team
  • Scrum Events
  • Scrum Artefakte
  • Die Rolle des Scrum Master
  • Die Rolle des Product Owner
  • Theorie-Input & Erfahrungslernen
  • Vorbereitung auf die Zertifizierungen
Allgemeine Vertiefung des Microsoft 365 Tenants

Enthaltene Module

Downloads

Terminanfrage

Ab  11.080,-*

*Preis pro Teilnehmer*in ohne Zusatzoptionen, exkl. MwSt.

Sie haben Fragen?

Ihr ETC Support

Kontaktieren Sie uns!

+43 1 533 1777-99

Hidden
Hidden
Hidden

Lernformen im Überblick

Mehr darüber