In this module
EI0.10 Course Structure and Learning Path
Course architecture
The course follows a deliberate progression that mirrors how you would deploy identity security controls in a production environment. The phases build on each other: foundations give you the telemetry skills and authentication knowledge, then you build the policy architecture, then you govern the non-human identities, and finally you engineer the detection and monitoring layer that verifies everything works.
Module dependencies
Most modules build on their predecessors, but the course is not strictly linear. Here are the critical dependencies:
EI1 (Sign-In Logs) is a prerequisite for everything. Every module from EI3 onward uses sign-in log queries for verification. If you skip EI1, you will not be able to complete the "how do you verify it works" step of the Defense Design Method in any subsequent module.
Recommended paths by role
M365 administrator with new security responsibility (estimated 35-40 hours): Follow the full course in order: EI0 → EI1 → EI2 → EI3 → EI4 → EI5 → EI6 → EI7 → EI8 → EI9 → EI10 → EI11 → EI12 → EI13 → EI14 → EI15 → EI16 → EI17. You need every module because you are building the complete identity security capability from the ground up.
Time estimates per module
Phase 1 modules (EI0-EI2) are the most accessible — they build foundational knowledge at an introductory pace. Estimated 50-80 minutes each.
Phase 2 modules (EI3-EI8) are the most technical — they involve hands-on conditional access policy design, Identity Protection configuration, and PIM setup. Estimated 70-120 minutes each.
How this course connects to the Ridgeline curriculum
This course does not exist in isolation. It is designed to work alongside the other Ridgeline courses, with explicit cross-references throughout:
Practical Incident Response is the companion course. This course teaches prevention; the IR course teaches investigation. Together, they provide end-to-end identity security capability. Specific connections: EI4 (CA stopping attacks) ↔ IR8 (identity compromise investigation), EI7 (token security) ↔ IR11 (Entra ID persistence), EI9 (app security) ↔ IR11 (service principal investigation), EI13 (detection rules) ↔ IR13-IR16 (investigation scenarios).
What you will build: module deliverables
This course does not just teach concepts — it produces deployable artifacts. By the time you complete each module, you will have created or configured something tangible. Here is what each module produces:
EI1 (Sign-In Logs) produces a personal KQL query library for identity security — the queries you will use daily to monitor sign-in activity, validate policies, and investigate anomalies. You will also build a documented sign-in baseline for your lab environment that establishes normal patterns.
What this course does not cover
Setting expectations now prevents frustration later. This course focuses on Entra ID security — preventing, detecting, and responding to identity-based attacks in Microsoft 365 environments. It does not cover the following:
Entra ID administration. This course does not teach you how to create users, manage groups, configure SSO for applications, or set up directory synchronization. It assumes you already know how to perform basic Entra ID administration (or can learn it from Microsoft's documentation). If you are completely new to Entra ID, start with the M365 Security: From Admin to Defender course, which builds the administrative foundation this course builds on.
Try it yourself
Try It — Plan Your Learning Path
Exercise: Based on your current role and the recommended paths above, write down your planned module sequence. For each module, note the estimated time and the week you plan to complete it. A realistic pace is 2-3 modules per week at 2-3 hours per week of study time.
If you are unsure which path fits your role, start with the full course in order — the module sequence is designed so that each module builds naturally on the previous ones.
The myth: I am preparing for the SC-200 exam. I only need the modules that cover SC-200 exam objectives and can skip the rest.
The reality: This course is not designed as certification prep — it is designed to build operational identity security capability. Certification exams test knowledge of features and configuration options. This course teaches you to design defenses against specific attacks, verify they work, and detect when they fail. The skills overlap with SC-200 and SC-300 objectives but go significantly deeper in operational methodology. If your goal is certification, the M365 Security Operations course is more directly aligned with SC-200. If your goal is defending identity in production — which is what makes you effective at the job the certification qualifies you for — this course provides the depth that certifications cannot.
You are reviewing NE's Entra ID security posture. You find 4 accounts with Global Administrator role, but NE's policy says maximum 2. The extra 2 were added during the AiTM incident for emergency response and never removed. Do you remove them?
Remove them — but through the proper process, not unilaterally. Notify the account owners that their emergency GA assignment is being revoked, confirm they have their standard role assignments restored, and document the removal with the rationale ('emergency assignment during INC-NE-2026-0227-001, no longer required'). Then add a PIR action item: 'Implement PIM time-limited role assignments for future incident response — emergency GA assignments auto-expire after 8 hours rather than persisting indefinitely.' The stale emergency assignment is a governance failure, not a technical failure — the fix is procedural.
You've mapped the identity threat landscape and learned to read sign-in logs.
EI0 established that every cloud attack starts with identity. EI1 took you through the signal that matters most — interactive, non-interactive, service principal, and managed identity sign-ins. Now you engineer the defences.
- 17 engineering modules — authentication methods, conditional access architecture, Identity Protection, PIM, token protection, application governance, and detection rules
- The Defense Design Method — the six-step framework applied to every identity control you'll build
- EI18 Capstone — Identity Security Architecture Design — design complete identity architectures for three realistic organisations (SMB, mid-market, regulated enterprise)
- Identity Security Toolkit lab pack — deployable conditional access policies, PIM configurations, and Identity Protection risk rules
- Cross-domain detection (EI16) — email-to-identity correlation and the full phishing-to-inbox-rule attack chain