Welcome to our monthly blog series featuring the latest Security, Compliance, and Identity content updates on Microsoft Learn. This month, we’re highlighting newly refreshed content that can prepare you to take our https://docs.microsoft.com/learn/certifications/browse/?resource_type=certification&products=azure%2Cm365&terms=SC-&expanded=azure%2Cm365?WT.mc_id=Security_blog-wwl exams. We’re also sharing details and dates for upcoming Microsoft Security Virtual Training days.
Microsoft 365 Security Administration
This four-part learning path series will prepare you for https://docs.microsoft.com/learn/certifications/exams/ms-500?WT.mc_id=Security_blog-wwl. In these learning paths, you will learn how to:
- https://docs.microsoft.com/learn/paths/implement-manage-identity-access/?WT.mc_id=Security_blog-wwl: Implement and manage identity and access
- https://docs.microsoft.com/learn/paths/implement-manage-threat-protection/?WT.mc_id=Security_blog-wwl: Implement and manage threat protection
- https://docs.microsoft.com/learn/paths/implement-manage-information-protection/?WT.mc_id=Security_blog-wwl: Implement and manage information protection
- https://docs.microsoft.com/learn/paths/manage-governance-compliance-features-microsoft-365/?WT.mc_id=Security_blog-wwl: Manage Governance and Compliance Features in Microsoft 365
Microsoft Security Operations Analyst
These learning paths will prepare you for https://docs.microsoft.com/learn/certifications/exams/sc-200?WT.mc_id=Security_blog-wwl. These eight learning paths teach you how to:
- https://docs.microsoft.com/learn/paths/sc-200-mitigate-threats-using-microsoft-defender-for-endpoint/?WT.mc_id=Security_blog-wwl: Mitigate threats using Microsoft Defender for Endpoint
- https://docs.microsoft.com/learn/paths/sc-200-mitigate-threats-using-microsoft-365-defender/?WT.mc_id=Security_blog-wwl: Mitigate threats using Microsoft 365 Defender
- https://docs.microsoft.com/learn/paths/sc-200-mitigate-threats-using-azure-defender/?WT.mc_id=Security_blog-wwl: Mitigate threats using Microsoft Defender for Cloud
- https://docs.microsoft.com/learn/paths/sc-200-utilize-kql-for-azure-sentinel/?WT.mc_id=Security_blog-wwl: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
- https://docs.microsoft.com/learn/paths/sc-200-configure-azure-sentinel-environment/?WT.mc_id=Security_blog-wwl: Configure your Microsoft Sentinel environment
- https://docs.microsoft.com/learn/paths/sc-200-connect-logs-to-azure-sentinel/?WT.mc_id=Security_blog-wwl: Connect logs to Microsoft Sentinel
- https://docs.microsoft.com/learn/paths/sc-200-create-detections-perform-investigations-azure-sentinel/?WT.mc_id=Security_blog-wwl: Create detections and perform investigations using Microsoft Sentinel
- https://docs.microsoft.com/learn/paths/sc-200-perform-threat-hunting-azure-sentinel/?WT.mc_id=Security_blog-wwl: Perform threat hunting in Microsoft Sentinel
Microsoft Identity and Access Administrator
This four-part learning path series will prepare you for https://docs.microsoft.com/learn/certifications/exams/sc-300?WT.mc_id=Security_blog-wwl and provide instruction on how to:
- https://docs.microsoft.com/learn/paths/implement-identity-management-solution/?WT.mc_id=Security_blog-wwl: Implement an identity management solution
- https://docs.microsoft.com/learn/paths/implement-authentication-access-management-solution/?WT.mc_id=Security_blog-wwl: Implement an Authentication and Access Management solution
- https://docs.microsoft.com/learn/paths/implement-access-management-for-apps/?WT.mc_id=Security_blog-wwl: Implement Access Management for Apps
- https://docs.microsoft.com/learn/paths/plan-implement-identity-governance-strategy/?WT.mc_id=Security_blog-wwl: Plan and Implement an identity governance strategy
Microsoft Information Protection Administrator
In this three-part learning path series for https://docs.microsoft.com/learn/certifications/exams/sc-400?WT.mc_id=Security_blog-wwl, you will learn how to:
- https://docs.microsoft.com/learn/paths/implement-information-protection/?WT.mc_id=Security_blog-wwl: Implement Information Protection in Microsoft 365
- https://docs.microsoft.com/learn/paths/implement-data-loss-prevention/?WT.mc_id=Security_blog-wwl: Implement Data Loss Prevention
- https://docs.microsoft.com/learn/paths/implement-information-governance/?WT.mc_id=Security_blog-wwl: Implement Information Governance in Microsoft 365
Microsoft Virtual Training Days
Microsoft Virtual Training Days are free, in-depth, virtual training events that guide you toward the many possibilities for career and organizational impact today and tomorrow. With weekly events to match every skill level, this is your opportunity to grow your technical skills and gain the confidence to navigate what’s ahead. Save the date for these upcoming https://mvtd.events.microsoft.com/?securityevent=allsecurity:
- https://mktoevents.com/Microsoft+Event/321828/157-GQE-382?WT.mc_id=Security_blog-wwl
- March 24 and 25, 2pm EST
- https://mktoevents.com/Microsoft+Event/325585/157-GQE-382?WT.mc_id=Security_blog-wwl
- April 4 and 5, 10am PST
- https://mktoevents.com/Microsoft+Event/324947/157-GQE-382?WT.mc_id=Security_blog-wwl
- April 13 and 14, 11am PST
- https://mktoevents.com/Microsoft+Event/325238/157-GQE-382?WT.mc_id=Security_blog-wwl
- April 18 and 19, 10am EST
Let us know how you use these updated resources on your Security, Compliance, and Identity certification journey and share your biggest takeaways from our virtual training days!