Use these Learning Paths to find a range of Microsoft training references and resources on security threats and appropriate countermeasures. Learning resources are organized by level (from basic to expert) and provide information on the planning, prevention, detection, and response phases of security implementation.
While data warehousing is primarily concerned with the integration of vast amounts of data across multiple business systems, business intelligence is concerned with how to use that integrated data to make strategic business decisions. Right away, security becomes a concern whenever private corporate data is accessed. Stories of conspicuous data leaks have been making news headlines for years. Use this learning path to help you take security into consideration when developing a business intelligence strategy.
Find prescriptive guidance on assessing security risk and implementing security technologies that offer defense-in-depth protection against attacks and provide IT professionals with central visibility and control of the security environment.
Learn about Microsoft technologies that allow legitimate users to access resources, while raising the bar for unauthorized users such as external hackers or internal disgruntled employees. Find guides, webcasts, and virtual labs to help you verify user identity, control user access to resources, and protect access to data throughout its life cycle.
Combine Microsoft technology with tools and guidance to help build a secure foundation for your IT infrastructure. Learn about technologies intrinsic to the operating system that help make computers more resilient to attacks and provide the foundation upon which you can build your other technology investments.
Planning begins with understanding your priority assets, as well as their risks and vulnerabilities as identified through a risk management process, then creating corporate security policies to manage risks.