Welcome to our monthly blog series featuring the latest https://docs.microsoft.com/learn/topics/sci?wt.mc_id=security_2minrcp_blog_wwl content updates on Microsoft Learn. This month, we’re highlighting a new module focused on how to create device configuration profiles using Microsoft Endpoint Manager along with content to prepare you for our Azure Security Engineer Associate certification exam and our new Cybersecurity Architect Expert exam.
Create device configuration profiles using Microsoft Endpoint Manager
https://www.microsoft.com/security/business/microsoft-endpoint-manager helps you protect the devices that people in your organization use to stay productive. Our new https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/?wt.mc_id=security_2minrcp_blog_wwl module will help you understand the capabilities of device configuration profiles available in Microsoft Endpoint Manager.
Before you embark on this module, you will need to have:
- Basic knowledge of Microsoft Endpoint Manager and Endpoint management concepts. See https://docs.microsoft.com/learn/paths/endpoint-manager-fundamentals/?wt.mc_id=security_2minrcp_blog_wwl
- Clarity about your endpoint management objectives, device inventory considerations, licensing needs, infrastructure objectives, and roll out plans. See https://docs.microsoft.com/learn/modules/determine-endpoint-implementation/?wt.mc_id=security_2minrcp_blog_wwl
- Working knowledge of how to set up and use Intune. See https://docs.microsoft.com/learn/modules/set-up-microsoft-intune/?wt.mc_id=security_2minrcp_blog_wwl
Once you begin this module, you’ll go through:
- https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/2-understand-configuration-profiles?wt.mc_id=security_2minrcp_blog_wwl
- https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/3-fundamental-device-configuration?wt.mc_id=security_2minrcp_blog_wwl, https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/4-standard-device-configuration?wt.mc_id=security_2minrcp_blog_wwl, and https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/5-complex-device-configuration?wt.mc_id=security_2minrcp_blog_wwl device configuration profiles
- How to https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/8-create-vpn-profile?wt.mc_id=security_2minrcp_blog_wwl and https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/10-assign-configuration-profile?wt.mc_id=security_2minrcp_blog_wwl new device configuration profiles
- https://docs.microsoft.com/learn/modules/create-device-configuration-profiles/11-view-configuration-profiles?wt.mc_id=security_2minrcp_blog_wwl
Microsoft Azure Security Engineer
Part of the requirements for our https://docs.microsoft.com/learn/certifications/azure-security-engineer/?wt.mc_id=security_2minrcp_blog_wwl certification, this credential is designed for security engineers that implement and manage secure cloud solutions. We recently updated our four-part learning path series to prepare candidates for https://docs.microsoft.com/learn/certifications/exams/az-500?wt.mc_id=security_2minrcp_blog_wwl. This learning path will provide instruction on how to:
- https://docs.microsoft.com/learn/paths/manage-identity-access/?wt.mc_id=security_2minrcp_blog_wwl
- https://docs.microsoft.com/learn/paths/implement-platform-protection/?wt.mc_id=security_2minrcp_blog_wwl
- https://docs.microsoft.com/learn/paths/secure-your-data-applications/?wt.mc_id=security_2minrcp_blog_wwl
- https://docs.microsoft.com/learn/paths/manage-security-operation/?wt.mc_id=security_2minrcp_blog_wwl
Microsoft Cybersecurity Architect
If you have expertise in designing and evolving all aspects of your organization’s cybersecurity strategy, our new https://docs.microsoft.com/learn/certifications/cybersecurity-architect-expert/?wt.mc_id=security_2minrcp_blog_wwl certification could be right for you. We recently released a new four-part learning path series to prepare you for https://docs.microsoft.com/learn/certifications/exams/sc-100?wt.mc_id=security_2minrcp_blog_wwl. This learning path covers how to:
- https://docs.microsoft.com/learn/paths/sc-100-design-zero-trust-strategy-architecture/?wt.mc_id=security_2minrcp_blog_wwl
- https://docs.microsoft.com/learn/paths/sc-100-evaluate-governance-risk-compliance/?wt.mc_id=security_2minrcp_blog_wwl
- https://docs.microsoft.com/learn/paths/sc-100-design-security-for-infrastructure/?wt.mc_id=security_2minrcp_blog_wwl
- https://docs.microsoft.com/learn/paths/sc-100-design-strategy-for-data-applications/?wt.mc_id=security_2minrcp_blog_wwl
We’re excited to hear about how our content is helping you advance your skills, technical expertise, or career progression. Be sure to check out our https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWREfA?wt.mc_id=security_2minrcp_blog_wwl to get an overview of all our role-based credentials.