Errata, updates & book support
Chapter 1 Describe the concepts of security, compliance, and identity
Skill 1-1: Security and compliance concepts and methodologies
Identity as the primary security perimeter
What are federation services and identity providers?
Chapter 2 Microsoft Identity and Access Management Solutions
Skill 2-1: Define the basic identity services and identity types of Azure AD
Describe what Azure Active Directory is
Describe what hybrid identity is
Describe Azure AD identities (users, devices, groups, and service principals/applications)
Describe the different external identity types (guest users)
Skill 2-2: Describe the authentication capabilities of Azure AD
Describe the different authentication methods
Describe password protection and management capabilities
Describe self-service password reset
Describe multifactor authentication
Describe Windows Hello for Business and passwordless credentials
Skill 2-3: Describe the access management capabilities of Azure AD
Describe what conditional access is
Describe uses and benefits of conditional access
Describe the benefits of Azure AD roles
Skill 2-4: Describe the identity protection and governance capabilities of Azure AD
Describe what identity governance is
Describe what entitlement management and access reviews are
Describe the capabilities of PIM
Describe Azure AD Identity Protection
Chapter 3 Capabilities of Microsoft security solutions
Skill 3-1: Basic security capabilities in Azure
Skill 3-2: Security Management capabilities in Azure
Cloud workload protection with Azure Defender
Cloud security posture management capabilities
Skill 3-3: Security capabilities in Azure Sentinel
What is Security Information and Event Management (SIEM)?
What is security orchestration, automation, and response (SOAR)?
What is extended detection and response (XDR)?
Skill 3-4: Threat protection with Microsoft 365 Defender
Describe Microsoft 365 Defender services
Describe Microsoft Defender for Identity
Describe Microsoft Defender for Office 365
Describe Microsoft Defender for Endpoint
Describe Microsoft Cloud App Security
Skill 3-5: Security management capabilities of Microsoft 365
Describe the Microsoft 365 Security Center
Describe how to use Microsoft Secure Score
Explore security reports and dashboards
Describe incidents and incident management capabilities
Skill 3-6: Endpoint security with Microsoft Intune
Endpoint security with Intune and Microsoft Endpoint Manager admin center
Chapter 4 Describe the capabilities of Microsoft compliance solutions
Skill 4-1: Common compliance needs
Skill 4-2: Information protection and governance
Data classification capabilities
Content Explorer and Activity Explorer
Microsoft 365 audit capabilities