Skip to main content


Use these Learning Paths to find a range of Microsoft training references and resources on security threats and appropriate countermeasures. Learning resources are organized by level (from basic to expert) and provide information on the planning, prevention, detection, and response phases of security implementation.
Featured This Month

Featured This Month:

Securing Business Intelligence

While data warehousing is primarily concerned with the integration of vast amounts of data across multiple business systems, business intelligence is concerned with how to use that integrated data to make strategic business decisions. Right away, security becomes a concern whenever private corporate data is accessed. Stories of conspicuous data leaks have been making news headlines for years. Use this learning path to help you take security into consideration when developing a business intelligence strategy.

Browse by Topic

Threat and Vulnerability Mitigation

Find prescriptive guidance on assessing security risk and implementing security technologies that offer defense-in-depth protection against attacks and provide IT professionals with central visibility and control of the security environment.

Identity and Access Management

Learn about Microsoft technologies that allow legitimate users to access resources, while raising the bar for unauthorized users such as external hackers or internal disgruntled employees. Find guides, webcasts, and virtual labs to help you verify user identity, control user access to resources, and protect access to data throughout its life cycle.

Security Fundamentals

Combine Microsoft technology with tools and guidance to help build a secure foundation for your IT infrastructure. Learn about technologies intrinsic to the operating system that help make computers more resilient to attacks and provide the foundation upon which you can build your other technology investments.

Browse by Category


Planning begins with understanding your priority assets, as well as their risks and vulnerabilities as identified through a risk management process, then creating corporate security policies to manage risks.


Policies are mapped to solutions and processes, which are implemented in the Prevent phase.


Detection involves the tools, technologies and best practices for managing and monitoring the solutions and processes implemented during the Prevent phase.


The Respond phase encompasses pre-planned courses of action used to intercept security violations.

Previous Monthly Features