0% found this document useful (0 votes)
227 views43 pages

Security, Compliance and Identity Partner Enablement Resource Guide

The document provides information about upcoming security training and resources for Microsoft partners, including: - An overview of the Security, Compliance, Identity Enablement Guide for partners which provides news, training, events, workshops, certifications, and exams. - Details about upcoming virtual and in-person security events like the Microsoft Security Summit, Security Cloud Week, and Days of the Defenders to help partners build skills. - Announcements of new resources like the updated Microsoft Cybersecurity Reference Architectures and security workshops to help partners assess security postures and plan strategies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
227 views43 pages

Security, Compliance and Identity Partner Enablement Resource Guide

The document provides information about upcoming security training and resources for Microsoft partners, including: - An overview of the Security, Compliance, Identity Enablement Guide for partners which provides news, training, events, workshops, certifications, and exams. - Details about upcoming virtual and in-person security events like the Microsoft Security Summit, Security Cloud Week, and Days of the Defenders to help partners build skills. - Announcements of new resources like the updated Microsoft Cybersecurity Reference Architectures and security workshops to help partners assess security postures and plan strategies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Last updated: May 2, 2022

Next planned update: June 1, 2022


Access the latest partner-facing version here:
https://aka.ms/scipartnerenablement
Security, Compliance, Identity
Enablement Guide for Partners
Introduction
With the speed at which technology is evolving, attracting candidates
with modern, in-demand skill sets can be challenging as prospects look
for opportunities with the right culture, compensation, and growth
potential. Increasing competition for talent means everything about your
practice is evaluated, including your company’s reputation, leadership,
values, location, and social engagement.
Security is a complex field—there is no shortage of skilling options
available to partner security teams. The challenge has often been
choosing the relevant ones and accessing them in one place.
Leverage this guide to find a simplified view of the key upcoming training
opportunities available to partners, training resources for the role-based
exams, learning journeys across Security, and other key resources to
support you and your organization on your skilling journey.
Be sure to check back frequently — new resources will be added as they
are made available across our various platforms and channels.
Table of contents
Security Enablement for Partners

Top Upcoming Certifications Recommended Additional Change


news training and exams trainings resources log
Top news
Microsoft Security Summit | May 12
The Microsoft The Microsoft Security Summit kicks
Security off with comments from Satya Nadella,
Summit will be Vasu Jakkal, and Charlie Bell. Satya,
delivered Vasu, and Charlie will be joined by
virtually May various security experts as they share
12 from 9 AM the latest innovations in Security,
to 12 PM PT. Compliance, and Identity.
Attendees will
learn how
Microsoft
solutions can Register now: May 12, 9 AM PT
help their
organizations
The Microsoft Security Summit consists of four tracks including Security, Compliance, Identity,
deliver end-to-
and Threat Intelligence. Each track includes three technical deep dive sessions in which
end security. security experts will share product announcements and demonstrate product innovations. All
sessions will be accompanied by a live chat Q&A in which attendees can have their questions
answered by an expert.
Build your skills your way
Security Cloud Week for Partners, May 16-20, 2022

Discover Microsoft Security During Security Cloud Week, you will:


solutions capabilities • Start your certification preparation with instructor-led
exam prep and hands-on labs designed to help you
Cyberattacks are a daily threat to businesses attain role-based certifications.
around the world, and the demand for skilled • Learn about the business value of Security through
professionals is growing. Security Cloud Week for keynote sessions.
Partners is designed for technical professionals to • Learn about the capabilities of Microsoft Security,
discover how Microsoft Security, Compliance, and Compliance, and Identity solutions.
Identity solutions can meet these threats. • Skill up on your own time through a choice of on-
demand and live training, offered at the time of day
This modular, five-day virtual training experience
that works best for you.
allows learners to build their Security skills through
• Ask questions, and certified trainers will answer. An
a choice of instructor-led courses, on-demand
exclusive Teams channel will be available every day.
labs, live Q&A, and offline Q&A during the hours
that best fit into their busy schedules.

Two live training sessions will be offered each day


of the event and will start at different times Registration will open soon for Security Cloud ,
depending on your location. All sessions are which is offered live in three time zones:
recorded for on-demand playback for up to 30 Seattle (UTC minus-8 hours), London (UTC 0), Beijing (UTC+8)
days after the event, with a variety of closed
caption language options available.
Days of the Defenders
In-person security events begin May 17-18, 2022

Build your security Discover answers to common customer questions


knowledge and skills
Reserve your spot for a Days of These workshop will help
the Defenders live, in-person you understand how to
event where you can gain the position, design, and plan
knowledge and tools to for common scenarios
successfully have security with Microsoft Defender
discussions with your customers. for Cloud, Microsoft
These two-day events offer Sentinel, and Microsoft
participants a fast-paced, demo- 365 Defender workloads.
intensive experience.

Choose from the


following cities:
• Las Colinas, Texas
• May 17-18 | 9 AM – 4 PM CT
• Irvine, California Registration is now open. Space is limited to the first 100
• May 24-25 | 9 AM – 4 PM PT participants, and registration is on a first-come, first-served basis.
• Fort Lauderdale, Florida
Sign up today for this live, in-person event to receive training on how
• June 7-8 | 9 AM – 4 PM ET
to successfully discuss different security technologies.
Dive deeper at the Microsoft Canada
monthly Security and SecOps series
Meet your host Two chances to increase
your knowledge
❖ The SecOps Deep Dive series is a monthly
webinar for Microsoft partners aimed at
enhancing SecOps skills and providing
products insights.
❖ The What’s New in Microsoft Security
series brings you highlights of the latest in
Senior Cloud Microsoft security to help you deliver and
Solutions Architect sustain a secure customer environment.
Sameh Younis
focuses on helping
Microsoft security
partners enhance
their security
practices,
Dates for the SecOps and Security sessions will be
architectures, announced soon for this month’s sessions.
technical skills and
security operations.
Securing the channel: journey to zero trust

Implement zero- “Cybersecurity continues to be


one of the top challenges of
trust principles our digital age and Microsoft
to help protect partners play an important role
in securing cloud
customers and transformations.”
organizations ➢ Read more in the “Securing the
channel: journey to zero trust” blog
Learn how to implement a zero-trust post.
security architecture that protects ➢ Watch the three-part "Securing the
and better secures environments and channel: journey to zero trust" video
customers. series.
The Security, Compliance, Identity
Partner Enablement Guide
Welcome to the April edition of the Security,
Compliance, and Identity
Partner Enablement Guide.
This guide is your source for the latest Security,
Compliance, and Identity information, including:
• News
• Training
• Events
• Workshops
• Certifications
• Exams
The storytelling and flow components in this
guide are designed to help partner
individuals, practice leads, and learning and
development leads better understand how to
navigate and leverage this guide.

Hope you enjoy and find this helpful!

David Branscome
Microsoft Cybersecurity Reference Architectures

We are excited to announce an update


to the Microsoft Cybersecurity
Reference Architectures (MCRA). The
MCRA describes Microsoft cybersecurity
capabilities. The diagrams describe how
Microsoft security capabilities integrate
with Microsoft platforms and third-party
platforms such as Microsoft 365,
Microsoft Azure, third-party apps such
as ServiceNow and Salesforce, and third-
party platforms such as Amazon Web
Services (AWS) and Google Cloud
Platform (GCP).

View the update and download the file


here.
Assess your security posture and uncover risks to
your current environment

Microsoft Security, Compliance,


Receive customized reports and document your
security strategy for key stakeholders

Identity Workshops Leverage Microsoft cybersecurity experts to


realize the benefits of the latest tools

Choose from our portfolio of Microsoft-funded targeted Build a plan with actionable steps to accelerate
your security journey
workshops to advance the end-to-end security strategy of your
organization

Security Up to $5,000 per workshop Threat protection & Hybrid cloud security
Up to $2,500 per workshop for Microsoft Sentinel Identity Up to $5,000 per workshop

Threat protection workshop • Understand customers’ security goals and objectives. Securing identities • Use Secure Score and application discovery tools to
Creates customer intent for • Identify security threats using a Microsoft 365 E5 trial. workshop help customers gain visibility into their current identity
purchasing and/or deploying • Provide an overview of the Microsoft Security end-to- Helps customers assess the estates.
advanced Microsoft Security end story. maturity of their identity estates. • Work together with your customers to define clear next
products. • Showcase product capabilities through newly designed, steps and the best ways to mitigate risks.
rich demos.
Compliance Up to $5,000 per workshop

Microsoft Sentinel • Showcase the Microsoft Sentinel experience.


• Identify active threats across identity, email, and data, in Discover sensitive data • Uncover data risks in the customer’s environment.
workshop • Build customer confidence and mitigate risk through
both on-premises and cloud environments. workshop
Creates customer intent for data-driven analytics and visualization.
• Demonstrate automated response to threats. Provides customers with
deploying and adopting Microsoft • Identify compliance solutions in Microsoft 365 that
• Gather information to build a business case for a examples of privacy and
Sentinel. reduce privacy and regulatory risks and help meet
production deployment of Microsoft Sentinel. regulatory risks in data within
Modern Work environments. compliance expectations.
Hybrid cloud security • Use Azure Defender to identify active threats on
targeted hybrid workloads. Manage and investigate • Uncover risky user activities in the customer’s
workshop environment.
• Demonstrate investigation and response to threats. risk workshop
Creates customer intent for • Discover privacy, policy, and regulatory risks by
• Discover vulnerabilities on existing hybrid workloads Provides customers with
purchasing and adopting Azure evaluating user communications inside an organization.
and explain how to reduce attack surface area. examples of potential data leaks
Defender, Azure Security Center, • Help customers better understand, prioritize, and
• Provide guidance for production implementation of and data theft within their
and Microsoft network security mitigate identified privacy and regulatory risks.
Azure Security Center, including Azure Defender. Modern Work environments.
products.
Upcoming training
Attend an event
Virtual Training Days—for Partners and Customers
Start

As the workplace evolves, Microsoft is dedicated to providing the tools to


empower you and your organization to achieve great things, along with the
technical training you need to make it happen from anywhere.

Dive in deep Improve your skills Explore Microsoft We make it accessible


Microsoft Virtual Training With weekly events to match products Many of our events offer
Days are free, in-depth, virtual every skill level, this is your Discover your potential and closed captioning in over 20
training events that guide you opportunity to grow your maximize your time with languages. Please visit the
toward the many possibilities technical skills and gain the accelerated virtual event event registration page you
for career and organizational confidence to navigate what’s offerings covering a range of are interested in attending to
impact today and tomorrow. ahead. technical topics for Microsoft confirm what closed
Azure, Microsoft 365, captioning languages are
Dynamics 365, Power available
Platform, and Security.
Security Virtual Training Days
Attend the following Security Virtual Training Day events

Duration
Event Title Date Registration Link
(Hours)
Virtual Modernize Security and Defend Against Threats Register Now – Multiple Dates & Time Zones
Training Days
Protect Data and Manage Risk Varies based on languages Register Now – Multiple Dates & Time Zones
on Security
Security, Compliance, and Identity Fundamentals and time zone. Register Now – Multiple Dates & Time Zones
Zero Trust Register Now – Multiple Dates & Time Zones
Partner Events

Webinars Sales Play and Product Virtual Training Series on


Deep Dives Exams
Partner webinars are free, topic-focused Partner sales play and product deep dives are Virtual Training Series on exams are free, in-
events that provide you with the latest free, in-depth, virtual training events focused depth, virtual training events focused on
updates on go to partner opportunity, market on Microsoft’s sales plays, products, and providing guidance for partners on how to
programs, product updates, and best services. study for and pass Microsoft exams.
practices.
These events can include a variety of topics This series is complementary to the content
Webinars are typically one to two hours in ranging from sales, pre-sales, and technical on Microsoft Learn. They are typically
length and delivered by Microsoft experts. content. Deep dives are typically delivered two delivered two hours a day, in multiple time
to three hours a day over multiple days and zones, over multiple days by Microsoft
delivered by Microsoft experts. They are learning partners. They are posted for on-
posted for on-demand consumption post demand consumption post event.
event.
Partner Events
Attend the following Security events created for partners

Duration
Event Title Date Registration Link
Partner (Hours)
Webinars Unboxing Defender for Business – a Deeper Look at Capabilities,
1 5 May Register now, 9:00AM PT
with Demo and Q&A

Duration
Sales Play and Event Title Date Registration Link
(Hours)
Product Deep
Dives Coming soon

http://aka.ms/enablevts https://aka.ms/trainingcenter
Partner Events
Attend the following security events created for partners

Duration
Event Title Date Registration Link
(Hours)
Cloud Week
Security Cloud Week for Partners Varies May 2022 Registration link available soon!

Duration
Event Title Date Registration Link
(Hours)
Microsoft Security, Compliance, and Identity Fundamentals (SC-
8 - Watch On-Demand
900)
Virtual
Microsoft Security Operations Analyst (SC-200) 10 - Watch On-Demand
Training Series
on Exams Microsoft Identity & Access Administrator (SC-300) 8 - Watch On-Demand

Microsoft Purview Information Protection (SC-400) 8 - Watch On-Demand

Microsoft 365 Security Administrator (MS-500) 10 - Watch On-Demand

http://aka.ms/enablevts https://aka.ms/trainingcenter
Certifications and
exams
Showcase your achievements and
skills
Security, Compliance, Identity Certifications and Exams This page lists the certifications
and exams that are
recommended for partners
looking to build and extend
their Microsoft security,
compliance, and identity
Fundamental Certifications Associate Certifications practices.

The Microsoft Security,


Microsoft Security, Compliance, and Microsoft Cybersecurity Architect (beta) Compliance, and Identity
Azure Security Engineer (AZ-500)
Identity Fundamentals (SC-900) (SC-100) certification portfolio includes
the following certifications:
Training includes • NEW! Exam is available Training includes
register here
• 7 hours of Microsoft Learn content • 32 hours of Microsoft Learn content • Microsoft Security,
• 8 hours of exam prep instructor training • 4-day instructor-led training (English, Compliance, and Identity
• 1-day virtual training day Microsoft Security Operations Analyst Japanese, Chinese (Simplified), Korean)
Fundamentals
(SC-200)
• Microsoft Security
Training includes Operations Analyst
• 30 hours of Microsoft Learn content
Microsoft 365 Security Administrator • Microsoft Identity and
• 10 hours of exam prep instructor training
Associate (MS-500) Access Administrator
• 4-day instructor-led training (English, • Microsoft Purview
Japanese, Chinese (Simplified), Korean) Training includes
Information Protection
• 14 hours of Microsoft Learn content
Administrator
• 10 hours of exam prep instructor training
Microsoft Identity and Access • Azure Security Engineer
• 4-day instructor-led training (English)
Administrator (SC-300) • Microsoft 365 Security
Training includes Administrator
• 12 hours of Microsoft Learn content
• 8 hours of exam prep instructor training *Azure Network Engineer Associate
• 4-day instructor-led training (English, (AZ-700) *Azure Network Engineer
Japanese, Chinese (Simplified), Korean) Associate is categorized in the
Training includes Azure certification portfolio and
• 10 hours of Microsoft Learn content is also relevant to our partners.
Microsoft Purview Information • Exam prep instructor training not available
Protection Administrator (SC-400)
Go here for the latest
Training includes certification roadmap Microsoft
• 10 hours of Microsoft Learn content training and certifications
• 8 hours of exam prep instructor training
Microsoft training and certifications • 2-days of instructor-led training (English,
Japanese, Chinese (Simplified), Korean)
Recommended
trainings
Find recommended skilling
pathways
Identity
Threat
and Access
Protection
Management

Cloud
Compliance
Security
Every security professional aspires to be an expert when it comes to creating the
best end-to-end security environment—from identity and access management, to
threat protection, to cloud security, to compliance. But getting there takes education
and experience.

• Grow your knowledge


• Start at your current skill level
• Advance at your own pace

Fundamental Intermediate Advanced


Available Learning Journeys
Identity and Access Management Learning Journey Targeted for those who
design, implement, and
operate an organization’s
identity and access
management systems using
Azure Active Directory.
Fundamental Intermediate Advanced
• User who designs,
implements, and operates
Attend an event: Security, Compliance, SC-300 part 1: Implement an identity Other training resources: an organization’s identity
Identity Fundamentals management solution and access management
Virtual Training Day MS Learn Microsoft Defender for Identity Ninja systems by using Azure
Course, Self-Guided Blog AD.

• Manages tasks such as


SC-900 part 1: Describe the concepts of SC-300 part 2: Implement an providing secure
security, compliance, and identity Authentication and Access Management authentication and
MS Learn solution authorization access to
MS Learn enterprise applications.

• Drives strategic identity


projects to modernize
SC-300 part 3: Implement Access identity solutions and to
Management for Apps implement hybrid identity
MS Learn solutions and identity
governance.

Relevant partner roles:


SC-300 part 4: Plan and implement an
identity governance strategy • Security administrator
MS Learn
• Azure AD administrator
• Identity consultant
• Identity architect
Complete exam study & Complete exam study &
get certified! get certified!

Security, Compliance, Identity


Fundamentals (SC-900)
Microsoft Identity and Access
Administrator (SC-300) Recommended Certifications
Legend < Microsoft learning path 4 YouTube playlist ◉ Interactive guide

Identity and Access Management Additional Resources


Fundamental Intermediate Advanced

Overview Azure Active Directory (AD) Microsoft Endpoint Manager Azure Active Directory (AD)
Fundamentals of Microsoft 365 Identity and Access Management Deep Dive < Managing Microsoft 365 Mobility and Security < App Proxy—Integrated Windows
Security + Compliance < Protection Identity and Access < Manage Devices by Using Microsoft Intune < Authentication ◉
Intro to Security in Microsoft 365 < Azure AD Secure Hybrid Access with F5 ◉
Manage Identities and Governance < Manage Apps by Using Microsoft Intune <
Manage Security with Microsoft 365 < Enable B2B Collaboration in Azure AD ◉
Enable a Combined MFA and SSPR Registration
Microsoft 365 Identity and Services < Zero Trust
Experience in Azure AD ◉ Migrate to Cloud Authentication Using
Configuration and Management4 Resource Center Staged Rollout in Azure AD ◉
Zero Trust
Manage and Integrate Apps Securely4 Enable Header-Based Authentication to
Principals and Overview On-Premises Applications with Azure
Secure Remote Work4 AD Application Proxy ◉
Azure Active Directory (AD) Enable Integrated Windows Authentication
Manage Identity and Access in Azure AD < to On-Premises Applications with Azure Microsoft Endpoint Manager
AD Application Proxy ◉ Manage Devices with Microsoft
Azure AD Authentication Fundamentals4
Configure Conditional Access in Azure AD ◉ Endpoint Manager ◉
Finding the Right Identity Strategy for Your
Manage Guest User Access in Azure AD Manage Apps with Microsoft
Organization with Azure AD4
for B2B Collaboration ◉ Endpoint Manager ◉
Microsoft Endpoint Manager Integrate SaaS Applications with Azure AD ◉
Microsoft Endpoint Manager Fundamentals <

Identity certifications SC-300, SC-900


Threat Protection Learning Journey Targeted for security
operational professionals
that design and manage
their threat protection and
response systems.

Fundamental Intermediate Advanced • User who collaborates


with organizational
stakeholders to secure
SC-900 part 1: Describe the concepts of SC-200 part 1: Mitigate threats using Other training resources: information technology
security, compliance, and identity Microsoft Defender for Endpoint systems.
MS Learn MS Learn
Microsoft Defender for Endpoint Ninja
Course, Self-guided blog • Goal is to reduce
organizational risk by
Microsoft 365 Defender Ninja Course, rapidly remediating active
SC-900 part 3: Describe the capabilities of Self-guided blog
SC-200 part 2: Mitigate threats using attacks in the
Microsoft security solutions Microsoft 365 Defender Microsoft Defender for Cloud Apps Ninja environment.
MS Learn MS Learn Course, Self-guided blog
Microsoft Azure Defender for IoT Ninja
• Advises on improvements
Course, Self-guided blog to threat protection
practices.
Microsoft Defender for Identity Ninja
SC-200 part 3: Mitigate threats using Course, Self-guided blog • Refers violations of
Azure Defender organizational policies to
Microsoft Defender for Office Ninja
MS Learn appropriate stakeholders.
Course, Self-guided blog

Relevant partner roles:

• Coming soon
Security Community Technical Webinars,
Stay updated

Complete exam study Complete exam study


and get certified! and get certified!

Security, Compliance, Identity


Fundamentals (SC-900)
Microsoft Security Operations
Analyst (SC-200) Recommended certifications
Microsoft Sentinel Learning Journey Targeted for security
operational professionals
that design and manage
their threat protection and
response systems.

Fundamental Intermediate Advanced • User who collaborates


with organizational
stakeholders to secure
SC-900 part 1: Describe the concepts of SC-200 part 4: Create queries for Microsoft Other training resources: information technology
security, compliance, and identity Sentinel using Kusto Query Language (KQL) systems.
MS Learn MS Learn
Microsoft Sentinel Ninja Course, Self-
guided blog • Goal is to reduce
organizational risk by
SC-900 part 3: Describe the capabilities of SC-200 part 5: Configure your Microsoft rapidly remediating active
Microsoft security solutions Sentinel environment Microsoft Sentinel Notebooks Ninja attacks in the
MS Learn MS Learn Course, Self-guided blog environment.

• Advises on improvements
Security Community Technical Webinars, to threat protection
SC-200 part 6: Connect logs to Microsoft
Stay updated practices.
Sentinel
MS Learn
• Refers violations of
organizational policies to
appropriate stakeholders.
SC-200 part 7: Create detections and
perform investigations using Microsoft
Relevant partner roles:
Sentinel
MS Learn
• SOC analyst

SC-200 part 8: Perform threat hunting in • Security operations team


Microsoft Sentinel
MS Learn • SIEM/XDR team

Complete exam study & Complete exam study &


get certified! get certified!

Security, Compliance, Identity


Fundamentals (SC-900)
Microsoft Security Operations
Analyst (SC-200) Recommended certifications
Cloud Security Learning Journey
Targeted for individuals who
manage the security of their
Azure and third-party
software as a service (SaaS)
cloud environments.
• Users who plan and
implement controls to
Fundamental Intermediate Advanced
meet organizational
security and compliance
needs.
Manage security with Microsoft 365 Safeguard multi-cloud apps and resources Configure Microsoft Cloud App Security • Those responsible for
MS Learn with cloud security solutions from for advanced scenarios
translating requirements,
Microsoft MS Learn
and security and
MS Learn
compliance controls into
technical implementation.
• Those who help
AZ-500 part 1: Secure your cloud AZ-500 Part 4: Implement virtual machine Other training resources:
organizational control
applications in Azure host security in Azure
owners manage cloud
MS Learn MS Learn Microsoft Defender for Cloud Ninja security for Microsoft and
Training Self-guided blog third-party platforms
Microsoft Defender for Cloud Apps Ninja according to
Course, Self-guided blog organizational
AZ-500 part 2: Implement resource AZ-500 Part 5: Manage identity and access requirements.
management security in Azure in Azure Active Directory Azure Network Security Ninja Training
• Those who create policies
MS Learn MS Learn Self-guided blog
and rules for data loss
Security Community Technical Webinars prevention, IaaS/PaaS
Stay updated security, virtual
networking security and
AZ-500 part 3: Implement network AZ-500 part 6: Manage security operations governance, and
security in Azure in Azure protection of cloud
MS Learn MS Learn assets.

Relevant partner roles:


• Azure administrators
• Security teams
Complete exam study & • Data security owners
get certified! • Cloud Architects
• Implementation
Azure Security Engineer
(AZ-500) Recommended certifications consultants
Legend < Microsoft learning path 4 YouTube playlist ◉ Interactive guide

Security Additional Resources


Fundamental Intermediate Advanced

Overview Microsoft 365 Defender Microsoft Defender for Identity Microsoft Sentinel
Fundamental Knowledge of Microsoft 365 Microsoft Defender: Extended Detection Identify Attacks ◉ Microsoft Sentinel Ninja Training
Security and Compliance Capabilities < and Response (XDR)4 Investigate Attacks ◉ Detect Unknown Threats with User
Intro to Security in Microsoft 365 < Threat Protection Technical Deep-Dive < and Entity Behavior Analytics
Manage Security with Microsoft 365 < Defend Against Threats with Microsoft Threat Protection < Microsoft Defender For Endpoint
Investigate and Remediate Threats ◉ Microsoft Defender
Azure Security Fundamentals < Protect Your Organization with Microsoft 365 Defender ◉
Threat Vulnerability Management ◉ Improve SecOps with Microsoft Sentinel,
Stop Attacks & Reduce Operations Workloads by 50%
SIEM + XDR Cloud-Native SIEM
Microsoft Defender for Endpoint Ninja Training
SIEM + XDR Announcement Azure Security Center Web Shell Attack Deep Dive
Azure Security Center < Microsoft Defender for Office 365
Microsoft Defender Microsoft 365 Defender
How to Effectively Perform an Azure Security Center PoC < Microsoft Defender for Office 365 <
Intro to Threat Protection with Microsoft 365 < Microsoft 365 Defender Ninja Training
Protect Your Hybrid Cloud with Azure Security Center ◉ Safeguard Your Organization with
Azure Defender Overview Microsoft Defender for Office 365 ◉ Best Practices for Hunting Across Domains
Resolve Threats with Azure Security Center <
Microsoft Sentinel Design a Holistic Monitoring Strategy on Azure Microsoft Sentinel Azure Security Center
Deploy Microsoft Sentinel and Connect Data Sources < Implement Virtual Machine Host Security in Azure < Modernize Your SOC with Microsoft Sentinel ◉ Azure Security Center Ninja Training
Introduction to Microsoft Sentinel​ < Improve Your Cloud Security Posture with Deploy Microsoft Sentinel and Connect
Azure Security Center < Microsoft Defender for Endpoint
Microsoft Sentinel Overview Data Sources <
Microsoft Defender for Endpoint
Microsoft Sentinel Video Overview Implement Windows Server Hybrid Cloud Ninja Training
Management, Monitoring, and Security <
Deploy Microsoft Sentinel and Connect Data Sources <
Improve SecOps with Microsoft Sentinel, Microsoft Cloud App Security
Top 10 Best Practices for Azure Security 4 Your Cloud-Native SIEM Microsoft Cloud App Security Ninja
Microsoft Defender for Cloud Training
Microsoft Cloud App Security
Azure Security Center Overview Configure Microsoft Cloud App Security for
Detect Threats and Protect Information in Advanced Scenarios <
Identify Security Threats with Azure Security Center < Cloud Apps Using Microsoft Cloud App
Protect Against Security Threats on Azure < Security <
Detect Threats & Manage Alerts ◉
Microsoft Defender for Cloud Apps
Discover, Protect, and Control Apps ◉
Secure Cloud Apps Using Microsoft Cloud App Security <
Safeguard Multi-cloud Apps and Resources
Discover and Manage Cloud App Usage with Microsoft Cloud App Security ◉ with Cloud Security Solutions <
Protect and Control Information with Microsoft Cloud App Security ◉
Automate Alerts Management with Microsoft Power Automate and Cloud App Security ◉
Security certifications: SC-900, SC-200
Information Protection & Governance Learning Journey Targeted for those who plan
and implement controls
that meet organizational
compliance needs.

• User who plans and


Fundamental Intermediate Advanced implements controls that
meet organizational
compliance needs.
SC-900 part 1: Describe the concepts of SC-400 part 1: Implement Information Microsoft 365 Advanced eDiscovery
security, compliance, and identity Protection in Microsoft 365 Ninja Course • Responsible for
MS Learn MS Learn Self-guided blog translating requirements
and compliance controls
Microsoft Purview Information into technical
Protection Ninja Course implementation.
SC-900 part 4: Describe the capabilities of SC-400 part 2: Implement Data Loss Self-guided blog
Microsoft compliance solutions Prevention • Assists organizational
MS Learn MS Learn Microsoft Defender for Cloud Apps Ninja control owners to
Course,
become and stay
Self-guided blog
compliant.
Compliance Manager Ninja course
SC-400 part 3: Implement Information Self-Guided blog
• Creates policies and rules
Governance in Microsoft 365
for content classification,
MS Learn M365 Compliance One-Stop-Shop (OSS) data loss prevention,
Self-guided site governance, and
protection.

Relevant partner roles:

• Compliance teams
• Data security teams
• Cloud architects
• Implementation
Complete exam study & Complete exam study & consultants
get certified! get certified!

Security, Compliance, Identity


Fundamentals (SC-900)
Microsoft Purview Information
Protection Administrator (SC-400) Recommended Certifications
Legend < Microsoft learning path 4 YouTube playlist ◉ Interactive guide

Compliance Additional Resources


Fundamental Intermediate Advanced

Microsoft 365 Compliance Information Protection and Governance Discover & Respond Compliance Ecosystem
Be a Risk Management Hero4 Information Protection and Governance4 Advanced eDiscovery and Advanced Audit < Security and Compliance4
Supercharge Information Protection Protect Sensitive Data with Microsoft Discover & Respond4
and Governance4 Information Protection ◉ Conduct Forensic Investigations with eDiscovery
Don’t Lose Sleep Over Insider Risks4 Information Protection & Governance < Advanced Audit in Microsoft 365 ◉ Become a Microsoft 365 Advanced
eDiscovery Ninja
Simplify and Extend Compliance
Beyond Microsoft 3654 Insider Risk Management Compliance Management
Manage Internal Risk in Microsoft 365 < Reduce Risk with Microsoft Purview Compliance Microsoft Purview Information Protection
Safeguard Customer Data Manager < Ninja
Minimize Internal Risks ◉
Simplify Compliance and Reduce Risks4 MIP Ninja
Learn How Microsoft Safeguards Insider Risk Management4
Customer Data <
Minimize Communication Risks ◉ Microsoft Defender for Cloud Apps Ninja
Priva API and Integration
Implement Privileged Access Management ◉ Course
Microsoft Priva (Privacy Privacy Integration Blog Cloud Apps Ninja
Management) Graph API Integration with Subject Rights request
General Availability Announcement Compliance Manager Ninja course
Introducing Privacy Management for Compliance Manager Ninja
Microsoft 365
Microsoft Mechanics Video M365 Compliance One-Stop-Shop (OSS)
Self-guided site
Priva Management for Microsoft 365
Product Page
Priva Trial Playbook Insider risk
Insider Risk Management Ninja

Communications
Communication Compliance Ninja

Information Protection and Governance certifications SC-400, SC-900


Additional resources
Find additional resources to
support you on your journey
Identity and endpoint workshops

Transition to cloud Endpoint management Securing identities

Methodology Introduce the value of Microsoft 365, Assess customers IT estate by using Assess customers identity security posture
highlighting scenarios to enable work from Microsoft Endpoint Manager, Intune, using Secure Score and application
anywhere securely, including Microsoft Azure AD, Autopilot, and Endpoint discovery assessments. Provide
Teams, securing mobile access, analytics. Provide recommendations on recommendations to mitigate risk.
foundational identity, and security. the best way to manage endpoints.

Outcome Create intent for purchasing and deploying Create intent for moving from Office 365 to Create intent to migrate from AD FS* to
Microsoft 365 E3. Microsoft 365. managed identities, from third-party
Identity provider to Azure AD* and
migrating application identity to Azure AD*

Customer Customers without Office 365 or Microsoft 1000+ Exchange Online PAU* 800+ AADP PAU*
eligibility 365 AND >300 PCIB* 20%+ Teams usage 5%+ AADP usage
Customers on Office 365 with: 20%+ Exchange Online usage
1000+ Exchange Online paid available <40% Intune usage
units (PAU)*
<20% Teams usage

Funding Up to $5,000 per workshop Up to $5,000 per workshop Up to $5,000 per workshop

*PCIB – Personal Computer Installed Base


aka.ms/PartnerAccelerators *PAU – Paid Available Units
*AD FS – Active Directory Federation Services
*AADP – Azure Active Directory Premium
*Azure AD – Azure Active Directory
Security workshops

Threat protection Microsoft Sentinel Hybrid cloud security

Methodology Discover threats in a customer’s M365 Discover threats in a customer’s M365 Discover threats and vulnerabilities in a
cloud environment by using the Threat cloud environment by using Microsoft customer’s Azure, hybrid, and multi-cloud
Check license, and provide Sentinel and Threat Check license, and environment. Provide recommendations to
recommendations to mitigate threat. provide recommendations to mitigate mitigate.
threat.

Outcome Create intent for purchasing and deploying Create intent for purchasing and deploying Create intent for purchasing and deploying
M365 E5 Security. Microsoft Sentinel. Azure Defender and Network Security
products.

Customer 800+ AADP PAUs* 800+ AADP* paid available units (PAU*) Annual Azure consumption for servers,
eligibility 250+ monthly active units (MAU) for EXO, 250+ MAU* for EXO*, SPO*, or Teams SQL, and storage must be >$150,000 USD.
SPO, or Teams Azure Defender consumption is <4% of
total Azure consumption.

Funding Up to $5,000 per workshop Up to $2,500 per workshop Up to $5,000 per workshop

*PAU – Paid Available Units


*MAU – Monthly Active Usage
*EXO – Exchange Online
aka.ms/PartnerAccelerators *SPO – SharePoint Online
*AADP – Azure Active Directory Premium
*Azure AD – Azure Active Directory
Compliance workshops

Discover sensitive data Manage and investigate risk

Objective Discover sensitive data in the customers environment using Discover insider risk in a customer’s data by using the Data Risk
the Data Risk Check License, and provide recommendations Check license, and provide recommendations to mitigate risk.
to mitigate risk.

Outcome Create intent for purchasing and deploying E5 Compliance. Create intent for purchasing and deploying E5 Compliance.

Customer 800+ AADP* paid available units (PAU*) 800+ AADP paid available units (PAU*)
eligibility 250+ monthly active units (MAU*) for EXO*, SPO*, or Teams 250+ monthly active units (MAU*) for EXO*, SPO*, or Teams

Funding Up to $5,000 per workshop Up to $5,000 per workshop

*PAU – Paid Available Units


*MAU – Monthly Active Usage
*EXO – Exchange Online
*SPO – SharePoint Online
*AADP – Azure Active Directory Premium
aka.ms/PartnerAccelerators
Developed to ensure customers have the skilling and learning resources
available to stay educated in the world of complex cybersecurity attacks.

No matter a customer's role or experience level, the Microsoft Security Technical


Content Library enables you to support our customers, helping them grow their
skills and learn how to utilize the full breadth of Microsoft Security solutions.

• Use search filters


• Access content based on your needs
• Start learning today

Click here to access the


Microsoft Security Technical
Content Library.
Help your customers learn, get Microsoft certified, and join other security professionals
in the online Microsoft Security community. They can participate in discussions about
additional training and enablement, find key role resources, and more.

Join Certifications Resources Follow Us

Microsoft 365 Security, Compliance & Identity SC-900: Microsoft Security, Compliance, Microsoft Security Technical Content Library Microsoft Security on Twitter
Partners Yammer Community and Identity Fundamentals Microsoft Security website Microsoft Azure Active Directory on Twitter
Security, Compliance, and Identity – SC-100: Microsoft Cybersecurity Architect (beta)
Azure website Microsoft Security on LinkedIn
Microsoft Tech Community
SC-200: Microsoft Security Operations Analyst Microsoft Security blog Microsoft Security YouTube channel
SC-300: Microsoft Identity and Access
Security documentation
Administrator
Microsoft Sentinel documentation
SC-400: Microsoft Purview Information
Protection Administrator Microsoft Learn for Security, Compliance,
and Identity
MS-900: Microsoft 365 Fundamentals
MS-500: Microsoft 365 Security Administration
AZ-900: Azure Fundamentals
AZ-500: Microsoft Azure Security Technologies
AZ-700: Designing and Implementing Microsoft
Azure Networking Solutions
Secure Remote Work Practice Development Playbook

Playbook Table of Contents


About this Playbook Operationalize
Market Opportunity Implement a Solution Delivery Process
Partner Practice Development Framework Accessibility and Digital Inclusion
Building a Teams Practice
Define Your Strategy Identity and Access Management (IAM)
Define the Practice Focus Device Deployment and Management
Benefits of Secure Remote Work Virtual Desktop Solutions
Understanding the Secure Remote Work Opportunity Key Contracts and Practice Tools
Teams Meetings, Calling, and Devices Use CRM to Grow the Business
Secure Remote Work Commercial Marketplace
Windows Virtual Desktop Customer Support
Define and Design the Solution Offer Support Options from Microsoft
Understanding Project-Based Services Support Ticket Setup and Tracking
Understanding Managed Services Troubleshooting Resources
Understanding Intellectual Property
Define Vertical Offerings Go to Market and Close Deals
Product Licensing and Strategy Options Buyer Engagement
Microsoft Programs Consultative Selling and Technical Pre-Sales
Define a Pricing Strategy Microsoft Technology Centers
Pre-Sales, Post-Sales, and Support Architecture Design Session (ADS)
Sales Compensation Planning Set Up Social Offerings
Awareness Internal customer and Advanced Specializations
Competencies
Hire & Train
Building Your Team Four emails in .OFT Three emails to share
Optimize and Grow
Role Descriptions format for you to send with customers, enabling
Partnering with Microsoft
Recruiting Resources Best Practices
to customers to make easy internal sharing
Preparing and Training Technical Staff
Certifications them aware of the with links to the self-
program and encourage guided skilling resources.
their participation.
https://aka.ms/remoteworkplaybook
Security Practice Development Playbook

Playbook Table of Contents


About this Playbook Hire & Train
The Security Opportunity Hire, Build, and Train Your Team
Job Descriptions
Define Your Strategy Recruiting Resources
Define Your Practice Focus Training & Readiness
Understanding the Security Practice Competencies & Certifications
Understanding Project Based Services
Deploy Microsoft Intune Operationalize
Deploy Microsoft Sentinel Implement a Solution Delivery Process
Deploy Azure Information Protection Define Customer Support Program & Process
Understanding and Accelerating Your Managed Service Manage and Support and Azure Deployment
Model Support Ticket Setup and Tracking
Understanding Intellectual Property Integrate Into a Marketplace
Define Vertical Offerings Implement Intellectual Property Offerings
Define Your Pricing Strategy Setup Social Offerings
Identify Partnership Opportunities Create Engagement Checklists & Templates
Define Engagement Process
Stay Informed on Security & Compliance Go to Market and Close Deals
Calculate Your Azure Practice Costs Marketing to the Security Buyer
Identify Potential Customers Consultative Selling and Technical Pre-Sales
Identify Solution Marketplace Platform Architecture Design Session
Implement Proofs of Concept
To provide feedback, email: Optimize and Manage
[email protected] Understanding Customer Lifetime Value

https://aka.ms/cloudsecurityplaybook
Change log
Stay updated on changes to this
resource
Change log
Month of May
• Added the Days of the Defenders page
• Added the Microsoft Canada Security page
Week of Mar 18
• Added the Securing the channel: journey to zero trust page.
• Added the Secure All the Things page.
• Added the Security Days page.
Week of Feb 18
• Added the Microsoft Priva page.
• Added the May Security Cloud Week page.
Week of Jan 18:
• Partner Events: added multiple webinars
• Added David Branscome biography page
Week of Dec 16:
• Top News: added Security Cloud Week slide & registration
• Partner Events: added Security Cloud Week registration
Week of Nov 11:
• Partner Events: added Elevate your Customers’ Security with Microsoft Defender for Business
Week of Nov 1:
• Information Protection & Governance Learning Journey: added Microsoft Purview Information Protection Ninja course
Thank you!

You might also like