Welcome to Microsoft Compliance, Privacy & Risk Management, a comprehensive course designed for compliance managers, IT auditors, and security professionals who want to master Microsoft’s compliance and governance ecosystem.



Microsoft Compliance Solutions Capabilities
This course is part of Exam Prep SC-900: Microsoft Certified Security Fundamentals Specialization

Instructor: Whizlabs Instructor
Access provided by Tallinn University of Technology
Recommended experience
Skills you'll gain
- Data Loss Prevention
- Compliance Reporting
- Threat Management
- Data Security
- Investigation
- Information Privacy
- Governance Risk Management and Compliance
- Microsoft Azure
- Risk Management
- Microsoft 365
- Data Governance
- Auditing
- Compliance Management
- Regulatory Compliance
- Compliance Auditing
- Personally Identifiable Information
Details to know

Add to your LinkedIn profile
5 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 2 modules in this course
Week 1 Overview – Azure Security Foundations: Networking, Key Vault & Defender Welcome to Week 1 of this course! We’ll begin with the essential building blocks for securing Azure workloads. You’ll explore Azure networking security, including Azure DDoS Protection, Azure Bastion, and Azure Firewall, to understand how to defend your resources at the network edge. Next, we’ll dive into network segmentation using Azure Virtual Networks, and configure Network Security Groups (NSG) and Application Security Groups (ASG) with hands-on demos. You’ll also explore Azure Key Vault and see how to secure application secrets and configuration data using App Configuration and Key Vault demos. By end for the week, we’ll introduce Microsoft Defender for Cloud, its Cloud Security Posture Management (CSPM) capabilities, and workload protection features to help you proactively strengthen your cloud security posture.
What's included
6 videos3 readings2 assignments
In Week 2, we’ll focus on Microsoft Sentinel and its role as a cloud-native SIEM and SOAR solution. You’ll learn how to plan and deploy workspaces, align Sentinel implementation with Microsoft’s Cloud Adoption Framework (CAF) security design phases, and understand the role of SIEM in modern security operations. We’ll then explore Sentinel’s automation capabilities with SOAR, threat detection, and mitigation features. By the end of this week, we’ll dive into threat hunting, reviewing sample KQL queries and walking through a hands-on demo to see how to proactively hunt for threats in your environment.
What's included
11 videos4 readings3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career




Explore more from Information Technology
University of Pennsylvania