Table of Contents
1. Introduction to Microsoft Entra
2. Implementing Identity
3. Identity Management
4. Identity Protection
5. Identity Governance
6. Microsoft Defender XDR
7. Protecting Identities
8. Protecting Endpoints
9. Protecting M365 Apps
10. Protecting Non-Microsoft Cloud Apps
11. Security Management Using Microsoft Sentinel
12. Protect and Govern Sensitive Data
13. Managing Insider Risks
14. Managing eDiscovery Cases
15. Managing Regulatory Compliance
16. Managing Privacy
17. Best Practices