Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Introduction to security, compliance, and identity concepts

Microsoft via Microsoft Learn

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
  • Describe security and compliance concepts.

    After completing this module, you'll be able to:

    • Describe the shared responsibility model and how responsibilities shift across on-premises, IaaS, PaaS, and SaaS environments, including AI services.
    • Describe defense-in-depth as a layered security strategy and explain the confidentiality, integrity, and availability (CIA) triad.
    • Describe the Zero Trust model, its guiding principles, and its six foundational pillars.
    • Describe encryption and hashing as mechanisms for protecting data at rest, in transit, and in use.
    • Describe Governance, Risk, and Compliance (GRC) concepts, including data residency, data sovereignty, and data privacy.
  • Describe identity concepts.

    After completing this module, you'll be able to:

    • Define authentication and authorization and explain how they work together to control access.
    • Describe identity as the primary security perimeter and explain the four pillars of an identity infrastructure.
    • Describe the role of an identity provider and how modern authentication uses tokens and single sign-on.
    • Describe directory services, Active Directory Domain Services, and Microsoft Entra ID as its cloud evolution.
    • Describe the concept of federation and how trust relationships enable cross-organizational access.

Syllabus

  • Describe security and compliance concepts
    • Introduction
    • Describe the shared responsibility model
    • Describe defense in depth
    • Describe the Zero Trust model
    • Describe encryption and hashing
    • Describe governance, risk, and compliance (GRC) concepts
    • Module assessment
    • Summary and resources
  • Describe identity concepts
    • Introduction
    • Define authentication and authorization
    • Define identity as the primary security perimeter
    • Describe the role of the identity provider
    • Describe the concept of directory services and Active Directory
    • Describe the concept of federation
    • Module assessment
    • Summary and resources

Reviews

Start your review of Introduction to security, compliance, and identity concepts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.