Skip to content

Commit 2b1fc7d

Browse files
committed
update module
1 parent 593929b commit 2b1fc7d

17 files changed

Lines changed: 316 additions & 137 deletions

learn-pr/wwl-sci/describe-security-concepts-methodologies/1-introduction.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 1
11+
durationInMinutes: 2
1212
content: |
1313
[!include[](includes/1-introduction.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/2-describe-shared-responsibility-model.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the shared responsibility model
44
metadata:
55
title: Describe the shared responsibility model
66
description: "Describe the shared responsibility model"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 3
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/2-describe-shared-responsibility-model.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/3-describe-defense-depth.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe defense in depth
44
metadata:
55
title: Describe defense in depth
66
description: "Describe defense in depth"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 4
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/3-describe-defense-depth.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/4-describe-zero-trust-model.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the Zero Trust model
44
metadata:
55
title: Describe the Zero Trust model
66
description: "Describe the Zero Trust model"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 5
11+
durationInMinutes: 10
1212
content: |
1313
[!include[](includes/4-describe-zero-trust-model.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/5-describe-encryption-hashing.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe encryption and hashing
44
metadata:
55
title: Describe encryption and hashing
66
description: "Describe encryption and hashing"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 4
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/5-describe-encryption-hashing.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/6-describe-compliance-concepts.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe governance, risk, and compliance (GRC) concepts
44
metadata:
55
title: Describe governance, risk, and compliance (GRC) concepts
66
description: "Describe governance, risk, and compliance (GRC) concepts"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 4
11+
durationInMinutes: 7
1212
content: |
1313
[!include[](includes/6-describe-compliance-concepts.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/7-knowledge-check.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ai_generated_module_assessment: true
77
title: Module assessment
88
description: "Knowledge check"
9-
ms.date: 09/23/2024
9+
ms.date: 03/31/2026
1010
author: wwlpublish
1111
ms.author: ceperezb
1212
ms.topic: unit
@@ -38,26 +38,26 @@ quiz:
3838
explanation: "Correct. Multifactor authentication is an example of defense in-depth at the identity and access layer."
3939
- content: "Ensuring there's no segmentation of your corporate network."
4040
isCorrect: false
41-
explanation: "Incorrect. Splitting a network up into multiple sub-networks provides better layered security and is an example of defense in depth at the network layer."
41+
explanation: "Incorrect. Splitting a network up into multiple subnetworks provides better layered security and is an example of defense in depth at the network layer."
4242
- content: "The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?"
4343
choices:
4444
- content: "Hashing."
4545
isCorrect: false
46-
explanation: "Incorrect. Hashing uses an algorithm to convert the original text to a *unique* fixed-length hash value but it is different to encryption in that it doesn't use keys, and the hashed value isn't subsequently decrypted back to the original."
46+
explanation: "Incorrect. Hashing uses an algorithm to convert the original text to a *unique* fixed-length hash value but it's different to encryption in that it doesn't use keys, and the hashed value isn't decrypted back to the original."
4747
- content: "Encryption in transit."
4848
isCorrect: false
49-
explanation: "Incorrect. Encryption in transit is used for encrypting data that is moving from one location to another, not for data that is stored or at rest."
49+
explanation: "Incorrect. Encryption in transit is used for encrypting data that's moving from one location to another, not for data that is stored or at rest."
5050
- content: "Encryption at rest."
5151
isCorrect: true
5252
explanation: "Correct. Encryption at rest could be part of a security strategy to protect stored employee data."
5353
- content: "Which of the following best describes the concept of data sovereignty?"
5454
choices:
5555
- content: "There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally."
5656
isCorrect: false
57-
explanation: "​​​Incorrect. Regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally relates to data residency. Data sovereignty, is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
58-
- content: "Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
57+
explanation: "​​​Incorrect. Regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally relates to data residency. Data sovereignty, is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
58+
- content: "Data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
5959
isCorrect: true
60-
explanation: "Correct. Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
60+
explanation: "Correct. Data sovereignty is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
6161
- content: "Trust no one, verify everything."
6262
isCorrect: false
63-
explanation: "Incorrect. Trust no one, verify everything describes the Zero Trust model. Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
63+
explanation: "Incorrect. Trust no one, verify everything describes the Zero Trust model. Data sovereignty is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."

learn-pr/wwl-sci/describe-security-concepts-methodologies/8-summary-resources.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Summary and resources
44
metadata:
55
title: Summary and resources
66
description: "Summary and resources"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 1
11+
durationInMinutes: 2
1212
content: |
1313
[!include[](includes/8-summary-resources.md)]
Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11

2+
As more business data is accessed from locations outside the traditional corporate network, security and compliance are critical concerns for organizations of all sizes. Organizations need to understand how to protect their data, regardless of where it's accessed from and whether it sits on a corporate network, in the cloud, or in AI-powered services. They also need to stay compliant with the growing number of industry and regulatory requirements that govern how data must be handled, stored, and protected.
23

3-
As more business data is being accessed from locations outside of the traditional corporate network, security and compliance have become overriding concerns. Organizations need to understand how they can best protect their data, regardless of where it's accessed from, and whether it sits on their corporate network or in the cloud. In addition, organizations need to ensure they're compliant with industry and regulatory requirements to ensure the protection and privacy of data.
4-
5-
This module introduces some important security and compliance concepts. You'll learn about the shared responsibility model, defense in depth, and Zero Trust model. You'll be introduced to the concepts of encryption and hashing as ways to protect data. Lastly, you'll learn about concepts that relate to compliance.
4+
This module introduces the foundational security and compliance concepts that underpin the Microsoft security, compliance, and identity portfolio. You start with the shared responsibility model, which clarifies which security responsibilities belong to you and which belong to your cloud provider. From there, you explore how a defense-in-depth strategy layers multiple controls to slow and stop attacks, and how the confidentiality, integrity, and availability (CIA) triad frames the goals of any security effort. You learn about the Zero Trust model—and why trusting the network perimeter alone is no longer sufficient in a world where work happens from anywhere. You then explore encryption and hashing as technical mechanisms for protecting data. Finally, you learn about governance, risk, and compliance (GRC) as the structured approach organizations use to manage their obligations and responsibilities.
65

76
After completing this module, you'll be able to:
87

9-
- Describe the shared responsibility and the defense in-depth security models.
10-
- Describe the Zero-Trust model.
11-
- Describe the concepts of encryption and hashing.
12-
- Describe some basic compliance concepts.
8+
- Describe the shared responsibility model and how responsibilities shift across on-premises, IaaS, PaaS, and SaaS environments, including AI services.
9+
- Describe defense-in-depth as a layered security strategy and explain the confidentiality, integrity, and availability (CIA) triad.
10+
- Describe the Zero Trust model, its guiding principles, and its seven foundational pillars.
11+
- Describe encryption and hashing as mechanisms for protecting data at rest, in transit, and in use.
12+
- Describe Governance, Risk, and Compliance (GRC) concepts, including data residency, data sovereignty, and data privacy.

0 commit comments

Comments
 (0)