Skip to content

Commit 456bb74

Browse files
Merge pull request #54054 from ceperezb/CEPEREZB-sc900-describe-security-concepts
update module
2 parents 5a73104 + bebe562 commit 456bb74

17 files changed

Lines changed: 316 additions & 139 deletions

learn-pr/wwl-sci/describe-security-concepts-methodologies/1-introduction.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 1
11+
durationInMinutes: 2
1212
content: |
1313
[!include[](includes/1-introduction.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/2-describe-shared-responsibility-model.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the shared responsibility model
44
metadata:
55
title: Describe the shared responsibility model
66
description: "Describe the shared responsibility model"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 3
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/2-describe-shared-responsibility-model.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/3-describe-defense-depth.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe defense in depth
44
metadata:
55
title: Describe defense in depth
66
description: "Describe defense in depth"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 4
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/3-describe-defense-depth.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/4-describe-zero-trust-model.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the Zero Trust model
44
metadata:
55
title: Describe the Zero Trust model
66
description: "Describe the Zero Trust model"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 5
11+
durationInMinutes: 10
1212
content: |
1313
[!include[](includes/4-describe-zero-trust-model.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/5-describe-encryption-hashing.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe encryption and hashing
44
metadata:
55
title: Describe encryption and hashing
66
description: "Describe encryption and hashing"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 4
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/5-describe-encryption-hashing.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/6-describe-compliance-concepts.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe governance, risk, and compliance (GRC) concepts
44
metadata:
55
title: Describe governance, risk, and compliance (GRC) concepts
66
description: "Describe governance, risk, and compliance (GRC) concepts"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 4
11+
durationInMinutes: 7
1212
content: |
1313
[!include[](includes/6-describe-compliance-concepts.md)]

learn-pr/wwl-sci/describe-security-concepts-methodologies/7-knowledge-check.yml

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,9 @@
22
uid: learn.wwl.describe-security-concepts-methodologies.knowledge-check
33
title: Module assessment
44
metadata:
5-
hidden_question_numbers: ["6E8CE524_67","6E8CE524_83","6E8CE524_104","6E8CE524_108","6E8CE524_136"]
6-
ai_generated_module_assessment: true
75
title: Module assessment
86
description: "Knowledge check"
9-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
108
author: wwlpublish
119
ms.author: ceperezb
1210
ms.topic: unit
@@ -38,26 +36,26 @@ quiz:
3836
explanation: "Correct. Multifactor authentication is an example of defense in-depth at the identity and access layer."
3937
- content: "Ensuring there's no segmentation of your corporate network."
4038
isCorrect: false
41-
explanation: "Incorrect. Splitting a network up into multiple sub-networks provides better layered security and is an example of defense in depth at the network layer."
39+
explanation: "Incorrect. Splitting a network up into multiple subnetworks provides better layered security and is an example of defense in depth at the network layer."
4240
- content: "The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?"
4341
choices:
4442
- content: "Hashing."
4543
isCorrect: false
46-
explanation: "Incorrect. Hashing uses an algorithm to convert the original text to a *unique* fixed-length hash value but it is different to encryption in that it doesn't use keys, and the hashed value isn't subsequently decrypted back to the original."
44+
explanation: "Incorrect. Hashing uses an algorithm to convert the original text to a *unique* fixed-length hash value but it's different to encryption in that it doesn't use keys, and the hashed value isn't decrypted back to the original."
4745
- content: "Encryption in transit."
4846
isCorrect: false
49-
explanation: "Incorrect. Encryption in transit is used for encrypting data that is moving from one location to another, not for data that is stored or at rest."
47+
explanation: "Incorrect. Encryption in transit is used for encrypting data that's moving from one location to another, not for data that is stored or at rest."
5048
- content: "Encryption at rest."
5149
isCorrect: true
5250
explanation: "Correct. Encryption at rest could be part of a security strategy to protect stored employee data."
5351
- content: "Which of the following best describes the concept of data sovereignty?"
5452
choices:
5553
- content: "There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally."
5654
isCorrect: false
57-
explanation: "​​​Incorrect. Regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally relates to data residency. Data sovereignty, is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
58-
- content: "Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
55+
explanation: "​​​Incorrect. Regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally relates to data residency. Data sovereignty, is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
56+
- content: "Data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
5957
isCorrect: true
60-
explanation: "Correct. Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
58+
explanation: "Correct. Data sovereignty is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
6159
- content: "Trust no one, verify everything."
6260
isCorrect: false
63-
explanation: "Incorrect. Trust no one, verify everything describes the Zero Trust model. Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
61+
explanation: "Incorrect. Trust no one, verify everything describes the Zero Trust model. Data sovereignty is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."

learn-pr/wwl-sci/describe-security-concepts-methodologies/8-summary-resources.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Summary and resources
44
metadata:
55
title: Summary and resources
66
description: "Summary and resources"
7-
ms.date: 09/23/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 1
11+
durationInMinutes: 2
1212
content: |
1313
[!include[](includes/8-summary-resources.md)]
Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11

2+
As more business data is accessed from locations outside the traditional corporate network, security and compliance are critical concerns for organizations of all sizes. Organizations need to understand how to protect their data, regardless of where it's accessed from and whether it sits on a corporate network, in the cloud, or in AI-powered services. They also need to stay compliant with the growing number of industry and regulatory requirements that govern how data must be handled, stored, and protected.
23

3-
As more business data is being accessed from locations outside of the traditional corporate network, security and compliance have become overriding concerns. Organizations need to understand how they can best protect their data, regardless of where it's accessed from, and whether it sits on their corporate network or in the cloud. In addition, organizations need to ensure they're compliant with industry and regulatory requirements to ensure the protection and privacy of data.
4-
5-
This module introduces some important security and compliance concepts. You'll learn about the shared responsibility model, defense in depth, and Zero Trust model. You'll be introduced to the concepts of encryption and hashing as ways to protect data. Lastly, you'll learn about concepts that relate to compliance.
4+
This module introduces the foundational security and compliance concepts that underpin the Microsoft security, compliance, and identity portfolio. You start with the shared responsibility model, which clarifies which security responsibilities belong to you and which belong to your cloud provider. From there, you explore how a defense-in-depth strategy layers multiple controls to slow and stop attacks, and how the confidentiality, integrity, and availability (CIA) triad frames the goals of any security effort. You learn about the Zero Trust model—and why trusting the network perimeter alone is no longer sufficient in a world where work happens from anywhere. You then explore encryption and hashing as technical mechanisms for protecting data. Finally, you learn about governance, risk, and compliance (GRC) as the structured approach organizations use to manage their obligations and responsibilities.
65

76
After completing this module, you'll be able to:
87

9-
- Describe the shared responsibility and the defense in-depth security models.
10-
- Describe the Zero-Trust model.
11-
- Describe the concepts of encryption and hashing.
12-
- Describe some basic compliance concepts.
8+
- Describe the shared responsibility model and how responsibilities shift across on-premises, IaaS, PaaS, and SaaS environments, including AI services.
9+
- Describe defense-in-depth as a layered security strategy and explain the confidentiality, integrity, and availability (CIA) triad.
10+
- Describe the Zero Trust model, its guiding principles, and its seven foundational pillars.
11+
- Describe encryption and hashing as mechanisms for protecting data at rest, in transit, and in use.
12+
- Describe Governance, Risk, and Compliance (GRC) concepts, including data residency, data sovereignty, and data privacy.

0 commit comments

Comments
 (0)