Security Training + Certification Guide
Security Training + Certification Guide
Table of
Microsoft Virtual Training Days
contents Microsoft Security Virtual Training Days
Grow in role
Azure administrators start here Choose additional paths that best fit your role and projects
Grow in role
Grow in role
Start here | Choose a starting point based on your current role No matter where you begin, complete your journey with this additional path
certifications
Microsoft Certified
Microsoft Certified Identity and Access Administrator Associate
Azure Security Engineer Associate The Identity and Access Administrator may be a single individual or a
Azure Security Engineers implement security controls and member of a larger team. This role collaborates with many other roles in
threat protection, manage identity and access, and protect data, the organization to drive strategic identity projects to modernize identity
applications, and networks in cloud and hybrid environments as part solutions, to implement hybrid identity solutions, and to implement
of an end-to-end infrastructure. identity governance.
Open doors to new career possibilities. Choose the certification that’s right for you,
based on the recommended skills, knowledge, and experience for each exam.
Whether you’re a business stakeholder, new or Azure Security Engineers implement security controls The Microsoft Security Operations Analyst
existing IT professional, or a student who has an and threat protection, manage identity and access, collaborates with organizational stakeholders to
interest in Microsoft Security, compliance, and and protect data, applications, and networks in cloud secure information technology systems for the
identity (SCI) solutions, this certification can help you and hybrid environments as part of an end-to-end organization. Their goal is to reduce organizational
familiarize yourself with the fundamentals of SCI infrastructure. risk by rapidly remediating active attacks in the
across cloud-based and related Microsoft services. environment, advising on improvements to threat
protection practices, and referring violations of
organizational policies to appropriate stakeholders.
• Describe the concepts of security, compliance, and • Manage identity and access • Mitigate threats using Microsoft 365 Defender
identity • Secure networking • Mitigate threats using Microsoft Defender for Cloud
• Describe the capabilities of Microsoft Azure Active • Secure compute, storage, and databases • Mitigate threats using Microsoft Sentinel
Directory, part of Microsoft Entra • Manage security operations
• Describe the capabilities of Microsoft Security
solutions
• Describe the capabilities of Microsoft compliance
solutions
Microsoft Security, Compliance, and Identity certifications Drive success with certifications
The identity and access administrator designs, The Information Protection Administrator defines Cybersecurity architects are essential for helping
implements, and operates an organization’s identity applicable requirements and tests IT processes and organizations design and evolve their cybersecurity
and access management systems by using Azure operations against those policies and controls. They strategy to help protect a company’s mission and
Active Directory (Azure AD). They configure and are responsible for creating policies and rules for business processes across all aspects of their
manage authentication and authorization of content classification, data loss prevention, enterprise architecture.
identities for users, devices, Azure resources, and governance, and protection.
applications to ensure that identity is verified
explicitly to support Zero Trust principles.
• Implement identities in Azure AD • Implement information protection • Design solutions that align with security best
• Implement authentication and access management • Implement DLP practices and priorities
• Implement access management for applications • Implement data lifecycle and records management • Design security operations, identity, and compliance
• Plan and implement identity governance in Azure AD Monitor and investigate data and activities by using capabilities
Microsoft Purview • Design security solutions for infrastructure
• Manage insider and privacy risk in Microsoft 365 • Design security solutions for applications and data
The journey to Microsoft Certified: Get started at
Security, Compliance, and Identity Fundamentals aka.ms/SecurityCerts_Fundamentals
Start here
Decide if this is the right
certification for you Get trained Build confidence Get recognized
This certification is targeted Skills outline guides Take a practice exam Pass Exam SC-900 to earn
to those looking to this certification.
SC-900 Microsoft Learn
familiarize themselves with
Practice Assessment SC-900
the fundamentals of security,
compliance, and identity Self-paced training
(SCI) across cloud-based and Skills measured:
related Microsoft services. Microsoft Learn
• Describe the concepts of
security, compliance, and
identity
Instructor-led training
Course SC-900: Microsoft • Describe the capabilities of
Microsoft Azure Active Microsoft Certified:
Security, Compliance, and Identity Security, Compliance, and Identity Fundamentals
Fundamentals (1 day) Directory, part of Microsoft
Entra Whether you’re a business stakeholder, new or
• Describe the capabilities of existing IT professional, or a student who has an
Virtual events interest in Microsoft security, compliance, and
Microsoft Security solutions
Microsoft Virtual Training Days identity (SCI) solutions, this certification can help you
• Describe the capabilities of familiarize yourself with the fundamentals of SCI
First, make sure your skills are Microsoft compliance solutions across cloud-based and related Microsoft services.
up to date.
Start here
Decide if this is the right
certification for you Get trained Build confidence Get recognized Continue to grow
This certification is a good fit if Skills outline guides Take a practice exam Pass Exam AZ-500 to earn Explore this resource next
your responsibilities include: this certification.
AZ-500 Microsoft Learn • Microsoft Azure Well-
• Maintaining security posture. Practice Assessment AZ-500 Architected Framework
• Identifying and remediating Self-paced training
vulnerabilities by using a variety Skills measured:
Microsoft Learn
of security tools. • Manage identity and access
• Implementing threat protection. • Secure networking
Instructor-led training
• Responding to security incident • Secure compute, storage, and
escalations. Course AZ-500: Microsoft Azure Microsoft Certified:
Security Technologies (4 days) databases
Azure Security Engineer Associate
• Manage security operations
Azure Security Engineers implement
Virtual events security controls and threat protection,
Microsoft Virtual Training Days manage identity and access, and protect
data, applications, and networks in cloud
and hybrid environments as part of an
end-to-end infrastructure.
First, make sure your skills are
up to date.
Start here
Decide if this is the right
certification for you Get trained Build confidence Get recognized Apply skills
This certification is a good fit if Skills outline guides Take a practice exam Pass Exam SC-200 to earn Cloud Games on Microsoft Learn
your responsibilities include: this certification.
SC-200 Microsoft Learn
• Collaborating with organizational Practice Assessment SC-200
stakeholders to secure
information technology systems Self-paced training Skills measured:
Microsoft Learn • Mitigate threats using
• Identifying and remediating Microsoft 365 Defender
vulnerabilities
• Mitigate threats using
• Advising on improvements to Instructor-led training
Microsoft Defender for
threat protection practices Course SC-200: Microsoft Security Cloud Microsoft Certified:
• Investigating, responding to, and Operations Analyst Security Operations Analyst Associate
• Mitigate threats using
hunting for threats (4 days)
Microsoft Sentinel
Microsoft 365 Security Administrators
proactively secure Microsoft 365
Virtual events enterprise and hybrid environments,
Microsoft Virtual Training Days implement and manage security and
compliance solutions, respond to
threats, and enforce data governance.
Start here
Decide if this is the right
certification for you Get trained Build confidence Get recognized Apply skills
This certification is a good fit if Skills outline guides Take a practice exam Pass Exam SC-300 to earn Cloud Games on Microsoft Learn
your responsibilities include: this certification.
SC-300 Microsoft Learn
• Designing, implementing, and Practice Assessment SC-300
operating an organization’s
identity and access management Self-paced training Skills measured:
systems Microsoft Learn
• Implement identities in Azure AD
• Providing secure authentication
and authorization access to • Implement authentication and
Instructor-led training access management
enterprise applications
Course SC-300: Microsoft Identity • Implement access management Microsoft Certified:
• Troubleshooting, monitoring, and and Access Administrator
reporting of an identity and for applications Identity and Access
(4 days) Administrator Associate
access environment • Plan and implement identity
governance in Azure AD The Identity and Access Administrator may be a single
Virtual events individual or a member of a larger team. This role
Microsoft Virtual Training Days collaborates with many other roles in the organization
to drive strategic identity projects to modernize identity
solutions, to implement hybrid identity solutions, and
to implement identity governance.
First, make sure your skills are up to date. Additional resources
Microsoft Security Technical
Need to update your skills in identity and Products featured
Content Library
access administration?
Identity and Access Administrator Azure Active Directory on Tech • Azure Active Directory
Associate training on Microsoft Learn. Community
Start here
Decide if this is the right
certification for you Get trained Build confidence Get recognized Apply skills
This certification is a good fit if Skills outline guides Take a practice exam Pass Exam SC-400 to earn Cloud Games on Microsoft Learn
your responsibilities include: this certification.
SC-400 Microsoft Official
• Planning and implement controls Practice Test SC-400
to meet organizational compliance
needs Self-paced training Skills measured:
Microsoft Learn • Implement information
• Translating requirements and protection
compliance controls into technical • Implement DLP
implementation • Implement data lifecycle and
Instructor-led training
• Implementing technology records management Monitor
Course SC-400: Microsoft and investigate data and Microsoft Certified:
sufficiently address regulatory Information Protection
requirements activities by using Microsoft Information Protection Administrator Associate
Administrator (4 days) Purview
• Defining requirements, testing IT The Information Protection Administrator defines
• Manage insider and privacy risk
processes and operations to create applicable requirements and tests IT processes and
in Microsoft 365
Virtual events operations against those policies and controls. They are
policies and rules for content
classification, data loss prevention, Microsoft Virtual Training Days responsible for creating policies and rules for content
governance, and protection classification, data loss prevention, governance, and
protection.
Start here
Decide if this is the right
certification for you Get trained Build confidence Get recognized Apply skills
This certification is a good fit if Skills outline guides Explore more Pass Exam SC-100 to earn Cloud Games on Microsoft Learn
your responsibilities include: this certification.
SC-100 Cybersecurity Architect Expert
• Helping organizations design Online Collection
and evolve their cybersecurity
strategy. Self-paced training
Microsoft Learn Take a practice exam
• Helping to protect a company's
mission and business processes Microsoft Official
across all aspects of their Practice Test SC-100
Instructor-led training
enterprise architecture.
Course SC-100: Microsoft Skills measured: Microsoft Certified:
Cybersecurity Architect (4 days) Cybersecurity Architect Expert
• Design solutions that align with
security best practices and Cybersecurity architects continuously
Virtual events priorities collaborate with leaders and practitioners in
Microsoft Virtual Training Days IT security, privacy, and other roles across an
• Design security operations,
organization to plan and implement a
identity, and compliance
cybersecurity strategy that meets the
capabilities
business needs of an organization.
• Design security solutions for
infrastructure
• Design security solutions for
Products featured
applications and data
Not right for you? Additional resources
• Microsoft Azure • Microsoft 365 Defender
Browse all Microsoft 365 certifications Microsoft Docs • Azure Active Directory • Microsoft Sentinel • Microsoft Defender for Cloud
Stay connected