Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Design Security Ops, Identity, and Compliance capabilities

Whizlabs via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Welcome to Design Security Operations, Identity, and Compliance Capabilities, a focused and practical course tailored for cybersecurity professionals and Microsoft cloud architects. This course is part of the SC-100: Microsoft Certified Cybersecurity Architect Expert specialization and helps build the essential skills required to design identity-first, operations-aligned, and compliance-ready security strategies using Microsoft technologies. You’ll explore how to operate Microsoft Sentinel as a cloud-native SIEM, design identity and access strategies using Microsoft Entra ID, manage privileged accounts securely, and align your architecture with leading compliance frameworks like GDPR, HIPAA, and SOC 2. Through practical lessons, demos, and real-world scenarios, this course equips you with the ability to implement secure access, monitor privileged activities, and automate compliance in Microsoft’s cloud ecosystem. This course includes 6–7 hours of expert-led video content structured across two comprehensive modules. Each module contains multiple lessons and hands-on demonstrations, with quizzes and in-video questions to support continuous learning and knowledge retention. Who Should Take This Course? Security Operations Engineers and SIEM Analysts Identity and Access Management (IAM) Professionals Microsoft 365 and Azure Security Administrators Security Architects preparing for the SC-100 exam Course Modules: Microsoft Sentinel: Security Operations and SIEM Microsoft Entra: Identity and Access Management (IAM) Microsoft Privileged Access and Secrets Management Microsoft Compliance Management and Cloud Governance

Syllabus

  • Microsoft Sentinel: Security Operations
    • Welcome to Week 1 of the course! In this module, you’ll explore Microsoft Sentinel as a cloud-native SIEM and SOAR solution for monitoring, detecting, and responding to security threats across your organization. You’ll begin by learning the role of SIEM in security operations and how automation enhances response efficiency through SOAR. Then, you’ll get hands-on with Microsoft Sentinel-setting up data connectors, creating detection rules, and investigating incidents through guided demos. By the end of the week, you’ll understand how Sentinel empowers proactive defense with real-time insights, automated remediation, and centralized visibility across hybrid and multicloud environments.
  • Microsoft Entra: Identity and Access Management (IAM)
    • This week’s focus is on building secure identity foundations using Microsoft Entra ID. You’ll begin by exploring core identity concepts such as users, roles, and access models (RBAC and ABAC), and then move into authentication strategies like MFA and Conditional Access. You’ll also dive into identity governance-including provisioning, deprovisioning, and access reviews-to ensure that user access is secure, minimal, and auditable. These lessons provide practical insights into securing access in both cloud-native and hybrid environments. By the end of the week, you’ll gain the confidence to implement robust identity and access policies using Entra ID to protect your organization’s digital assets.
  • Microsoft Privileged Access and Secrets Management
    • Welcome to Week 3! In this module, you’ll address one of the most critical areas in cloud security: securing privileged access. You’ll start by understanding the risks of privileged accounts and learn to implement controls like Just-in-Time (JIT) and Just-Enough-Access (JEA) to enforce the principle of least privilege. You’ll also explore Microsoft’s Privileged Access Management (PAM) solutions and discover how to secure secrets with Azure Key Vault. Finally, you’ll learn how to audit privileged access activities and detect anomalous behavior through logging and monitoring tools. By the end of the week, you’ll know how to design and implement layered defenses to safeguard high-value accounts and sensitive credentials across your cloud environment.
  • Microsoft Compliance Management and Cloud Governance
    • This final week focuses on compliance and governance strategies for secure cloud operations. You’ll begin by identifying key regulatory standards such as GDPR, HIPAA, and SOC 2, then map them to Azure security controls and compliance tools. You’ll also learn how to build a governance framework that aligns with business needs, and explore how to automate compliance tasks like policy enforcement, reporting, and auditing. The week wraps up with an overview of Azure’s compliance offerings and how they support continuous regulatory readiness. By the end of the week, you’ll be able to confidently apply Microsoft tools to maintain compliance, reduce risk, and streamline governance in your Azure environment.

Taught by

Whizlabs Instructor

Reviews

Start your review of Design Security Ops, Identity, and Compliance capabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.