MB-910T00 Introduction to Microsoft Dynamics 365 (CRM)

Do you want to learn more about Dynamics 365? This course will provide you with a broad introduction to the customer engagement capabilities of Dynamics 365. You will become familiar with the concept of customer engagement, the core capabilities of customer engagement apps as well as with each of the customer engagement apps, including Dynamics 365 Customer Insights, Dynamics 365 Sales, Dynamics 365 Customer Service and Dynamics 365 Field Service. You will also learn how Copilot can assist you in executing customer engagement tasks in Dynamics 365. This course includes lectures and hands-on-labs.
Course Details

Price:

Days:

1

Location:

Virtual

Course Overview

Do you want to learn more about Dynamics 365? This course will provide you with a broad introduction to the customer engagement capabilities of Dynamics 365. You will become familiar with the concept of customer engagement, the core capabilities of customer engagement apps as well as with each of the customer engagement apps, including Dynamics 365 Customer Insights, Dynamics 365 Sales, Dynamics 365 Customer Service and Dynamics 365 Field Service. You will also learn how Copilot can assist you in executing customer engagement tasks in Dynamics 365. This course includes lectures and hands-on-labs.

1 – Identify Security Requirements and Expectations

  • Security throughout the development process
  • Business, compliance, and user requirements
  • Identifying factors undermining software security
  • Recognizing vulnerabilities and attack patterns
  • Gathering vulnerability intelligence

2 – Handling Vulnerabilities

  • Addressing software defects and misconfiguration
  • Managing risks from third-party code
  • Handling human factors and social engineering
  • Improving development process security

3 – Designing for Security

  • Applying secure design principles (OWASP, defense in depth, least privilege)
  • Threat modeling and risk assessment
  • Identifying and countering specific threats

4 – Developing Secure Code

  • Secure coding best practices and checklists
  • Avoiding common programming errors (buffer overflows, input validation, etc.)
  • Preventing platform, privacy, and web/mobile vulnerabilities

5 – Implementing Common Protections

  • Access control, authentication, and session management
  • Protecting data in transit and at rest (encryption, PKI)
  • Secure error handling, logging, and output restrictions
  • Preventing SQL injection and securing database access

6 – Testing Software Security

  • Security testing phases and strategies
  • Static and dynamic code analysis
  • Automated tools for vulnerability detection

7 – Maintaining Security in Deployed Software

  • Monitoring and logging applications
  • Ongoing patch management and maintenance
  • Secure deprovisioning and uninstallation
Class Dates & Times
Filters Sort results
Reset Apply
No results found. Clear filters and try again?
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.