Skip to content

Commit 48ef1a8

Browse files
authored
Merge pull request #53934 from Rob-Barefoot/main
LP2-updates
2 parents 519d573 + 763de61 commit 48ef1a8

103 files changed

Lines changed: 440 additions & 431 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38461,6 +38461,21 @@
3846138461
"redirect_url": "/purview/",
3846238462
"redirect_document_id": false
3846338463
},
38464+
{
38465+
"source_path": "learn-pr/wwl-azure/describe-azure-storage-services/5-exercise-create-storage-blob.md",
38466+
"redirect_url": "https://learn.microsoft.com/training/modules/describe-azure-storage-services/",
38467+
"redirect_document_id": false
38468+
},
38469+
{
38470+
"source_path": "learn-pr/wwl-azure/describe-core-architectural-components-of-azure/7-exercise-create-azure-resource.md",
38471+
"redirect_url": "https://learn.microsoft.com/training/modules/describe-core-architectural-components-of-azure/",
38472+
"redirect_document_id": false
38473+
},
38474+
{
38475+
"source_path": "learn-pr/wwl-azure/describe-core-architectural-components-of-azure/4-exercise-explore-learn-sandbox.md",
38476+
"redirect_url": "https://learn.microsoft.com/training/modules/describe-core-architectural-components-of-azure/",
38477+
"redirect_document_id": false
38478+
},
3846438479
{
3846538480
"source_path": "learn-pr/wwl-data-ai/manage-power-bi-artifacts-use-microsoft-purview/index.md",
3846638481
"redirect_url": "/purview/",
Lines changed: 63 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,52 +1,63 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.describe-azure-identity-access-security.knowledge-check
3-
title: Module assessment
4-
metadata:
5-
title: Module assessment
6-
description: "Knowledge check"
7-
ms.date: 10/03/2024
8-
author: wwlpublish
9-
ms.author: robbarefoot
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
module_assessment: true
14-
durationInMinutes: 4
15-
content: |
16-
[!include[](includes/10-knowledge-check.md)]
17-
quiz:
18-
title: "Check your knowledge"
19-
questions:
20-
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21-
choices:
22-
- content: "Conditional Access"
23-
isCorrect: true
24-
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25-
- content: "Guest access"
26-
isCorrect: false
27-
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28-
- content: "Passwordless"
29-
isCorrect: false
30-
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31-
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32-
choices:
33-
- content: "Zero Trust"
34-
isCorrect: true
35-
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36-
- content: "Defense-in-depth"
37-
isCorrect: false
38-
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39-
- content: "Role-based access control"
40-
isCorrect: false
41-
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42-
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43-
choices:
44-
- content: "Read only"
45-
isCorrect: false
46-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47-
- content: "Write only"
48-
isCorrect: false
49-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50-
- content: "Read and write"
51-
isCorrect: true
52-
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-identity-access-security.knowledge-check
3+
title: Module assessment
4+
metadata:
5+
title: Module assessment
6+
description: "Knowledge check"
7+
ms.date: 10/03/2024
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
module_assessment: true
14+
durationInMinutes: 4
15+
content: |
16+
[!include[](includes/10-knowledge-check.md)]
17+
quiz:
18+
title: "Check your knowledge"
19+
questions:
20+
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21+
choices:
22+
- content: "Conditional Access"
23+
isCorrect: true
24+
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25+
- content: "Guest access"
26+
isCorrect: false
27+
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28+
- content: "Passwordless"
29+
isCorrect: false
30+
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31+
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32+
choices:
33+
- content: "Zero Trust"
34+
isCorrect: true
35+
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36+
- content: "Defense-in-depth"
37+
isCorrect: false
38+
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39+
- content: "Role-based access control"
40+
isCorrect: false
41+
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42+
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43+
choices:
44+
- content: "Read only"
45+
isCorrect: false
46+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47+
- content: "Write only"
48+
isCorrect: false
49+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50+
- content: "Read and write"
51+
isCorrect: true
52+
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
53+
- content: "Which Azure service is designed to securely store secrets, certificates, and encryption keys for your applications?"
54+
choices:
55+
- content: "Azure Key Vault"
56+
isCorrect: true
57+
explanation: "Azure Key Vault is used to securely store and manage secrets, certificates, and keys."
58+
- content: "Azure Policy"
59+
isCorrect: false
60+
explanation: "Azure Policy helps enforce governance rules, but it doesn't store application secrets or encryption keys."
61+
- content: "Azure Monitor"
62+
isCorrect: false
63+
explanation: "Azure Monitor provides telemetry and observability, not key and secret storage."
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-identity-access-security.describe-encryption-key-management
3+
title: Describe encryption and key management in Azure
4+
metadata:
5+
title: Describe encryption and key management in Azure
6+
description: "Describe encryption and key management in Azure"
7+
ms.date: 03/06/2026
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/9a-describe-encryption-key-management.md)]

learn-pr/wwl-azure/describe-azure-identity-access-security/includes/1-introduction.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
In this module, youll be introduced to the Azure identity, access, and security services and tools. Youll learn about directory services in Azure, authentication methods, and access control. Youll also cover things like Zero Trust and defense in depth, and how they keep your cloud safer. You’ll wrap up with an introduction to Microsoft Defender for Cloud.
1+
In this module, you'll be introduced to the Azure identity, access, and security services and tools. You'll learn about directory services in Azure, authentication methods, and access control. You'll also cover Zero Trust, defense in depth, and how they keep your cloud safer. Finally, you'll review encryption concepts, key management with Azure Key Vault, and Microsoft Defender for Cloud.
22

33
## Learning objectives
44

@@ -11,4 +11,5 @@ After completing this module, you’ll be able to:
1111
- Describe Azure Role Based Access Control (RBAC).
1212
- Describe the concept of Zero Trust.
1313
- Describe the purpose of the defense in depth model.
14+
- Describe encryption concepts and key management options in Azure.
1415
- Describe the purpose of Microsoft Defender for Cloud.

learn-pr/wwl-azure/describe-azure-identity-access-security/includes/11-summary.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. And, you learned about the Defense In Depth and Zero Trust models.
1+
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. You also reviewed encryption concepts and key management options in Azure. And, you learned about the Defense In Depth and Zero Trust models.
22

33
## Learning objectives
44

@@ -11,8 +11,20 @@ You should now be able to:
1111
- Describe Azure Role Based Access Control (RBAC).
1212
- Describe the concept of Zero Trust.
1313
- Describe the purpose of the defense in depth model.
14+
- Describe encryption concepts and key management options in Azure.
1415
- Describe the purpose of Microsoft Defender for Cloud.
1516

1617
## Additional resources
1718

1819
The following resources provide more information on topics in this module or related to this module.<br>[Microsoft Certified: Security, Compliance, and Identity Fundamentals](/learn/certifications/security-compliance-and-identity-fundamentals/) is an entire certification, with associated training, dedicated to helping you better understand and manage Security, Compliance, and identity.
20+
21+
## Explore with Copilot
22+
23+
> [!TIP]
24+
> Try one of these prompts in Copilot Chat:
25+
>
26+
> - "Use one end-to-end scenario to show how SSO, MFA, Conditional Access, and RBAC work together in a Zero Trust design."
27+
> - "Explain the difference between Microsoft Entra ID, Microsoft Entra Domain Services, and external identities with practical examples."
28+
> - "Simulate a security incident and show how encryption, key management, defense in depth, and Microsoft Defender for Cloud reduce risk."
29+
30+

0 commit comments

Comments
 (0)