Microsoft Cloud Security Workshop

Building a foundation of trust and security 

27 August 2021 | 9.30am - 12.30pm | FOC LIVE VIRTUAL

1. Overview of New Security Training and Certifications – The SC Series 

  • Why SC Series? 
  • What are the roadmaps? 
  • Who should attend in general? 

2. Quick Preview of Each Courses

  • Overview of all the modules in each training 
  • Demo on the security features described in Azure/Microsoft365 

 

Courses Covered in the Preview 

SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals 

Are you looking to familiarize yourselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services and demonstrate to others that you have that knowledge?  

The new Microsoft Security Fundamentals training is for you. 

SC-200T00: Microsoft Security Operations Analyst 

Do you collaborate with organizational stakeholders to secure information technology systems for the organization and reduce organizational risk by rapidly remediating active attacks in the environment? Do you advise on improvements to threat protection practices and refer violations of organizational policies to appropriate stakeholders? Do you investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products?  

Welcome to the world of Security Operations Analyst. 

SC-300T00: Microsoft Identity and Access Administrator 

Do you design, implement, and operate an organization’s identity and access management systems by using Azure AD? Do you manage tasks such as providing secure authentication and authorization access to enterprise applications? Do you troubleshoot, monitor, and report the identity and access environment? 

If so, you are the right person to be taking the new Microsoft Identity and Access training.

SC-400T00: Microsoft Information Protection Administrator 

Do you plan and implement controls that meet organizational compliance needs? Do you translate requirements and compliance controls into technical implementation and assist organizational control owners to become and stay compliant? Do you work with stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization? Do you define applicable requirements, test IT processes and operations against those policies and controls, and create policies and rules for content classification, data loss prevention, governance, and protection? 

If so, it sounds like you’re an Information Protection Administrator 

© 2021 TRAINOCATE MALAYSIA SDN BHD. ALL RIGHTS RESERVED

CONNECT WITH US