- Describe security and compliance concepts.
After completing this module, you'll be able to:
- Describe the shared responsibility model and how responsibilities shift across on-premises, IaaS, PaaS, and SaaS environments, including AI services.
- Describe defense-in-depth as a layered security strategy and explain the confidentiality, integrity, and availability (CIA) triad.
- Describe the Zero Trust model, its guiding principles, and its six foundational pillars.
- Describe encryption and hashing as mechanisms for protecting data at rest, in transit, and in use.
- Describe Governance, Risk, and Compliance (GRC) concepts, including data residency, data sovereignty, and data privacy.
- Describe identity concepts.
After completing this module, you'll be able to:
- Define authentication and authorization and explain how they work together to control access.
- Describe identity as the primary security perimeter and explain the four pillars of an identity infrastructure.
- Describe the role of an identity provider and how modern authentication uses tokens and single sign-on.
- Describe directory services, Active Directory Domain Services, and Microsoft Entra ID as its cloud evolution.
- Describe the concept of federation and how trust relationships enable cross-organizational access.
Google, IBM & Meta Certificates — 40% Off for a Limited Time
Build with Azure OpenAI, Copilot Studio & Agentic Frameworks — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Describe security and compliance concepts
- Introduction
- Describe the shared responsibility model
- Describe defense in depth
- Describe the Zero Trust model
- Describe encryption and hashing
- Describe governance, risk, and compliance (GRC) concepts
- Module assessment
- Summary and resources
- Describe identity concepts
- Introduction
- Define authentication and authorization
- Define identity as the primary security perimeter
- Describe the role of the identity provider
- Describe the concept of directory services and Active Directory
- Describe the concept of federation
- Module assessment
- Summary and resources