Microsoft Security Academy
Are you ready to get started?⏩
Welcome to cybersecurity! Browse our curated collection of resources to help you kickstart your journey. These resources specifically cater to those who are new to the field seeking to gain expertise.
Explore Microsoft’s Security-101 for 7 cybersecurity lessons for Beginners.
Microsoft Zero Trust Architecture
Definition Cookbook
Concept | Definition |
Shared Responsibility Model | A security and compliance framework that outlines the responsibilities of cloud service providers (CSPs) and customers for securing every aspect of the cloud environment. |
Logging or Auditing | ‘Logging’ or ‘Auditing’ means that information systems are recording important events such as system-level events, and the creation, modification, or deletion of objects within the system. |
Ransomware | A type of attack that destroys or encrypts files and folders, preventing the owner of the effected device from accessing their data. |
Incident Response | The practice of investigating and remediating active attack campaigns against your organization. |
Secure Configuration | ‘Secure’ means that a system has been configured or managed in a manner that reduces common risks associated with security incidents. |
Identity Protection | The detection, investigation, and remediation of identity-based risks. |
Privileged Access | Individuals or cloud service providers (CSPs) with ‘Privileged Roles’ have administrative access including the ability to manage information systems and change permissions. Also known as Privileged Access or Administrator Access. |
Data Loss Prevention | Preventing users from inappropriately sharing sensitive information with people who shouldn’t have it. |
Data Retention | Refers to minimum and maximum timelines for keeping corporate data, including sensitive data, before such data is permanently deleted. |
Records Management | A solution for organizations to manage regulatory, legal, and business-critical records. |
Security Strategy
Zero Trust
- What is Zero Trust?
- Zero Trust Adoption Framework
- Zero Trust: New Era of Security Microsoft eBook
- Zero Trust Maturity Model
Security Operations Analyst
- Security Operations (SecOps) Functions
- What is Microsoft Sentinel?
- What is Microsoft Defender XDR?
- What is Microsoft Defender for Cloud?
- What is Microsoft Defender for Endpoint?
Identity and Access Administrator
- What is Azure Active Directory (Microsoft Entra ID)?
- What is Entra ID Protection?
- What is Microsoft Entra ID Governance?
- What is Global Secure Access?
- What’s Microsoft Entra Permissions Management?