Chapter 1: Describe the concepts of security, compliance, and identity-Describe security and compliance concepts-Describe the shared responsibility model
Chapter 5: Describe the concepts of security, compliance, and identity-Describe security and compliance concepts-Describe Governance, Risk, and Compliance (GRC) concepts
Chapter 10: Describe the concepts of security, compliance, and identity-Define identity concepts-Describe the concept of directory services and Active Directory
Chapter 15: Describe the capabilities of Microsoft Entra -Describe authentication capabilities of Microsoft Entra ID-Describe the authentication methods
Chapter 16: Describe the capabilities of Microsoft Entra -Describe authentication capabilities of Microsoft Entra ID-Describe multi-factor authentication (MFA)
Chapter 17: Describe the capabilities of Microsoft Entra -Describe authentication capabilities of Microsoft Entra ID-Describe password protection and management capabilities
Chapter 19: Describe the capabilities of Microsoft Entra -Describe access management capabilities of Microsoft Entra ID-Describe Microsoft Entra roles and role-based access control (RBAC)
Chapter 20: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe Microsoft Entra ID Governance
Chapter 21: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe access reviews
Chapter 22: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe the capabilities of Microsoft Entra Privileged Identity Management
Chapter 23: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe Microsoft Entra ID Protection
Chapter 24: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe Microsoft Entra Permissions Management
Chapter 27: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe Web Application Firewall (WAF)
Chapter 28: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe network segmentation with Azure virtual networks
Chapter 29: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe network security groups (NSGs)
Chapter 31: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe Azure Key Vault
Chapter 32: Describe the capabilities of Microsoft security solutions -Describe security management capabilities of Azure-Describe Microsoft Defender for Cloud
Chapter 33: Describe the capabilities of Microsoft security solutions -Describe security management capabilities of Azure-Describe Cloud Security Posture Management (CSPM)
Chapter 34: Describe the capabilities of Microsoft security solutions -Describe security management capabilities of Azure-Describe how security policies and initiatives improve the cloud security posture
Chapter 35: Describe the capabilities of Microsoft security solutions -Describe security management capabilities of Azure-Describe enhanced security features provided by cloud workload protection
Chapter 36: Describe the capabilities of Microsoft security solutions -Describe capabilities of Microsoft Sentinel-Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)
Chapter 37: Describe the capabilities of Microsoft security solutions -Describe capabilities of Microsoft Sentinel-Describe threat detection and mitigation capabilities in Microsoft Sentinel
Chapter 38: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender XDR services
Chapter 39: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Office 365
Chapter 40: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Endpoint
Chapter 41: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Cloud Apps
Chapter 42: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Identity
Chapter 43: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender Vulnerability Management
Chapter 44: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender Threat Intelligence (Defender TI)
Chapter 45: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe the Microsoft Defender portal
Chapter 46: Describe the capabilities of Microsoft compliance solutions -Describe Microsoft Service Trust Portal and privacy principles-Describe the Service Trust Portal offerings
Chapter 47: Describe the capabilities of Microsoft compliance solutions -Describe Microsoft Service Trust Portal and privacy principles-Describe the privacy principles of Microsoft
Chapter 48: Describe the capabilities of Microsoft compliance solutions -Describe Microsoft Service Trust Portal and privacy principles-Describe Microsoft Priva
Chapter 49: Describe the capabilities of Microsoft compliance solutions -Describe compliance management capabilities of Microsoft Purview-Describe the Microsoft Purview compliance portal
Chapter 50: Describe the capabilities of Microsoft compliance solutions -Describe compliance management capabilities of Microsoft Purview-Describe Compliance Manager
Chapter 51: Describe the capabilities of Microsoft compliance solutions -Describe compliance management capabilities of Microsoft Purview-Describe the uses and benefits of compliance score
Chapter 52: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe the data classification capabilities
Chapter 53: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe the benefits of Content explorer and Activity explorer
Chapter 54: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe sensitivity labels and sensitivity label policies
Chapter 55: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe data loss prevention (DLP)
Chapter 56: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe records management
Chapter 57: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe retention policies, retention labels, and retention label policies
Chapter 58: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe unified data governance solutions in Microsoft Purview
Chapter 59: Describe the capabilities of Microsoft compliance solutions -Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview-Describe insider risk management
Chapter 60: Describe the capabilities of Microsoft compliance solutions -Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview-Describe eDiscovery solutions in Microsoft Purview
Chapter 61: Describe the capabilities of Microsoft compliance solutions -Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview-Describe audit solutions in Microsoft Purview