This instructor-led Microsoft Power Platform Fundamentals Pearson course prepares you for the Microsoft Exam PL-900 while helping demonstrate your real-world knowledge of the four Microsoft Power Platform products: Power BI, Power Apps, Power Automate, and Power Virtual Agents. PL-900 focuses on knowledge needed to describe the business value of Microsoft Power Platform; identify the core components of Microsoft Power platform; describe the business value of Power BI; demonstrate the capabilities of Power Apps; demonstrate the capabilities of Power Automate; and demonstrate the capabilities of Power Virtual Agents
The goal of this course is to provide you with all the tools you need to prepare for the PL-900 Microsoft Power Platform Fundamentals exam — including text explanations, video demos, lab activities, self-assessment questions, and a practice exam— to increase your chances of passing the exam on your first try.
Course components:
365-day access to:
- Lessons
- Video learning
- MeasureUp Practice Test for Microsoft PL-900. Practice Mode with remediation and Certification mode to simulate the test day experience.
Duration: 1 day of training.
Audience: Beginners who desire to learn more about the Microsoft Power Platform Fundamentals.
Prerequisites:
- No coding experience required.
- No administration experience required.
Course objectives:
Upon successful completion of this course, students should be able to:
- Describe the business value of Microsoft Power Platform.
- Identify the core components of Microsoft Power Platform.
- Describe the business value of Power BI.
- Demonstrate the capabilities of Power Apps.
- Demonstrate the capabilities of Power Automate.
- Demonstrate the capabilities of Power Virtual Agents.
Lesson 1: Describe the business value of Microsoft Power Platform (4 hours and 12 minutes).
- Skill 1.1: Describe the business value of Microsoft Power Platform services (1 hour and 12 minutes).
- Gain insights into data by using Power BI.
- Build applications quickly by using Power Apps.
- Build solutions that use the Microsoft Dataverse.
- Automate processes by using Power Automate.
- Use connectors to integrate services and data.
- Create powerful chatbots by using the Power Virtual Agents web app and Power Virtual Agents in Microsoft Teams.
- Skill 1.2: Describe the business value of extending business solutions by using Microsoft Power Platform (1 hour and 24 minutes).
- Describe how Microsoft Power Platform apps work together with Dynamics 365 apps.
- Describe how Power Platform business solutions work together with Microsoft 365 apps. and services.
- Describe how Microsoft Power Platform apps work together.
- Describe how to use Microsoft Power Platform solutions with Microsoft Teams.
- Describe how Microsoft Power Platform business solutions can consume Microsoft. Azure services including Azure Cognitive Services.
- Describe how Power Platform business solutions can consume third-party apps and services.
- Describe use cases for AppSource.
- Skill 1.3: Describe Microsoft Power Platform administration and security (1 hour and 36 minutes).
- Describe how Power Platform implements security, including awareness of Microsoft. Dataverse security roles, Azure Identity Services, and Access Management (IAM).
- Describe how to manage apps and users.
- Describe environments.
- Describe where to perform specific administrative tasks, including Power Platform admin center and Microsoft 365 admin center.
- Describe data policies.
- Describe how Microsoft Power Platform supports privacy and accessibility guidelines.
- Describe Microsoft Power Platform governance capabilities.
- Describe analytics and how they can be used.
- Summary
- Case Study
- Quiz
Lesson 2: Identify the core components of Microsoft Power platform (2 hours and 24 minutes).
- Skill 2.1: Describe Microsoft Dataverse (1 hour and 36 minutes).
- Introduce Microsoft Dataverse.
- Describe the difference between databases and Dataverse.
- Describe the differences between Dataverse and Dataverse for Teams.
- Describe tables, columns, and relationships.
- Describe how to use common standard tables to describe people, places, and things.
- Describe business logic uses, including business rules, real-time workflows, and actions.
- Describe dataflows and their uses.
- Describe solutions and their purpose.
- Skill 2.2: Describe connectors (48 minutes).
- Describe triggers, including trigger types and where triggers are used.
- Describe actions.
- Describe licensing options for connectors, including standard or premium tier.
- Identify use cases for custom connectors.
- Summary
- Case Study
- Quiz
Lesson 3: Describe the business value of Power BI (3 hours and 12 minutes).
- Skill 3.1: Identify common Power BI components (1 hour and 12 minutes).
- Identify and describe uses for visualization controls, including pie, bar, donut, and scatter plots and KPIs.
- Describe the Power BI Desktop Reports, Data, and Model tabs.
- Compare and contrast Power BI Desktop and Power BI service.
- Compare and contrast dashboards, workspaces, and reports.
- Describe the Power BI security model.
- Describe using Power BI in mobile apps.
- Skill 3.2: Connect to and consume data (1 hour 24 minutes).
- Connect to and combine data from multiple sources, including Microsoft Excel.
- Describe how to use Power Query to clean and transform data.
- Describe and implement aggregate functions.
- Identify available types of data sources, including Microsoft Excel.
- Describe use cases for shared datasets.
- Describe use cases for template apps.
- Describe options for viewing Power BI reports and dashboards.
- Skill 3.3: Build a basic dashboard using Power BI (36 minutes).
- Create a Power BI report.
- Create a Power BI dashboard.
- Publish and share reports and dashboard.
- Summary
- Case Study
- Quiz
Lesson 4: Demonstrate the capabilities of Power Apps (2 hours and 24 minutes).
- Skill 4.1: Identify common Power Apps components (24 minutes).
- Describe the differences between canvas apps and model-driven apps.
- Describe use cases for formulas.
- Skill 4.2: Build a basic canvas app (1 hour and 12 minutes).
- Describe types of data sources.
- Connect to data by using connectors.
- Create an app from data.
- Use controls to design the user experience.
- Publish and share an app.
- Describe embedding into Microsoft Teams.
- Skill 4.3: Build a basic model-driven app (48 minutes).
- Create a model-driven app from tables.
- Modify forms.
- Create and modify views and columns.
- Publish and share an app.
- Summary
- Case Study
- Quiz
Lesson 5: Demonstrate the capabilities of Power Automate (2 hours and 12 minutes).
- Skill 5.1: Identify common Power Automate components (1 hour and 20 minutes).
- Identify flow types, including cloud, desktop, and business process flows.
- Describe use cases for flows and available flow templates.
- Describe how Power Automate uses connector triggers and actions.
- Describe loops and conditions, including switch, do until, and apply to each.
- Describe expressions.
- Describe use cases for approvals.
- Describe the Power Automate apps, including Power Automate Desktop, Power Automate mobile, and Power Automate portal.
- Skill 5.2: Build a basic cloud flow (48 minutes.)
- Create a cloud flow by using the instant, automated, or scheduled flow template.
- Modify a cloud flow.
- Use flow steps to perform data operations.
- Run a cloud flow.
- Summary
- Case Study
- Quiz
Lesson 6: Demonstrate the capabilities of Power Virtual Agents (1 hour and 36 minutes).
- Skill 6.1: Describe the capabilities of Power Virtual Agents in Microsoft Teams (36 minutes).
- Describe use cases for Power Virtual Agents within Microsoft Teams.
- Describe topics, entities, and actions.
- Describe message nodes, question nodes, conditions, trigger phrases, and the authoring canvas.
- Skill 6.2: Build and publish a basic chatbot (1 hour).
- Create a chatbot.
- Create a topic.
- Call an action.
- Launch a Power Automate flow from a chatbot.
- Publish a chatbot.
- Summary
- Case Study
- Quiz
- Design a security operations strategy.
- Design an identity security strategy.
- Design a regulatory compliance strategy.
- Evaluate security posture and recommend technical strategies to manage risk.
- Design a strategy for securing server and client endpoints.
- Design a strategy for securing SaaS, PaaS, and IaaS services.
- Specify security requirements for applications.
- Design a strategy for securing data.
- Microsoft Cybersecurity Reference Architectures and Microsoft cloud security benchmark best practices.
- Recommend a secure methodology by using the Cloud Adoption Framework (CAF).
- Recommend a ransomware strategy by using Microsoft Security Best Practices.
Required course materials: Self-paced CertPREP Microsoft Cybersecurity Architect (SC-100) courseware with 180-day access.
Training outline:
Lesson 1: Build an overall security strategy and architecture (2 hours and 48 minutes).
- Skill 1.1: Identify the integration points in an architecture by using Microsoft Cybersecurity Reference Architectures (MCRA) (36 minutes).
- MCRA and Cloud Adoption Framework Secure Methodology.
- How to use the MCRA to identify integration points.
- Skill 1.2: Translate business goals into security requirements (24 minutes)
- Translation process.
- Skill 1.3: Translate security requirements into technical capabilities, including security services, security products and security processes (1 hour).
- Requirement: Mitigate compromise of accounts using password spray and other credential compromise.
- Requirement: Shorten response times to attacks across resources in the environment.
- Requirement: Integrate network security into Infrastructure as a Code (IaC) automation.
- Requirement: Enable eDiscovery processes for Office 365 data.
- Skill 1.4: Design security for a resiliency strategy (24 minutes).
- Reducing risk by reducing critical security events.
- Resilience requires shifting from a network-centric to an asset- and data-centric mindset.
- Skill 1.5: Integrate a hybrid or multi-tenant environment into a security strategy (12 minutes).
- Skill 1.6: Develop a technical governance strategy for security (12 minutes).
- Summary
- Case Study
- Quiz
Lesson 2: Design a security operations strategy (5 hours and 24 minutes)
- Skill 2.1: Design a logging and auditing strategy to support security operations (1 hour).
- Centralizing log collection.
- Deciding which logs have security value.
- Designing security operations use cases.
- Determining log retention periods.
- Skill 2.2: Develop security operations to support a hybrid or multi-cloud environment (1 hour).
- Cross-platform log collection.
- Cloud security posture management (CSPM).
- Focus on identity.
- Internet of Things (IoT)/Operational Technology (OT) coverage.
- Skill 2.3: Design a strategy for SIEM and SOAR (48 minutes).
- Microsoft Security Operations Reference Architecture.
- Ingest logs into your SIEM.
- Automate, automate, automate.
- Skill 2.4: Evaluate security workflows (36 minutes).
- General incident response workflow.
- Automation, automation, automation (again).
- Skill 2.5: Evaluate a security operations strategy for the incident management lifecycle (1 hour and 24 minutes).
- Microsoft’s approach to security incident management.
- Detection and analysis.
- Post-incident activity.
- Skill 2.6: Evaluate a security operations strategy for sharing technical threat intelligence (36 minutes).
- Microsoft’s threat intelligence strategy.
- Sharing technical threat intelligence in your organization.
- Summary
- Case Study
- Quiz
Lesson 3: Design an identity security strategy (6 hours and 36 minutes).
- Skill 3.1: Design a strategy for access to cloud resources (1 hour and 24 minutes).
- Identity-related access controls.
- Network-related access controls.
- Coordinated identity and network access.
- Interconnection and cross-service collaboration.
- Assume-breach and explicitly verify.
- People, process, and technology approach.
- Skill 3.2: Recommend an identity store (tenants, B2B, B2C, and hybrid) (36 minutes).
- Foundational implementations.
- External collaboration.
- Skill 3.3: Recommend an authentication strategy (1 hour).
- Enterprise accounts.
- Specialized accounts.
- Controlling authentication sessions.
- Key recommendations.
- Skill 3.4: Recommend an authorization strategy (48 minutes).
- Configuring access to support authorization.
- Decentralized identities.
- Key recommendations.
- Skill 3.5: Design a strategy for conditional access (24 minutes).
- Key recommendations.
- Skill 3.6: Design a strategy for role assignment and delegation (36 minutes).
- Delegating to non-administrators.
- Delegating access to service providers.
- Skill 3.7: Design security strategy for privileged-role access to infrastructure, including identity-based firewall rules and Azure PIM (1 hour).
- Privileged Access Workstation (PAW).
- Privileged Identity Management (PIM).
- Microsoft Entra Permissions Management.
- Key recommendations.
- Skill 3.8: Design security strategy for privileged activities, including PAM, entitlement management, and cloud tenant administration (48 minutes).
- Privileged Access Workstation (PAM).
- Privileged Identity Management (PIM).
- Microsoft Entra Permission Management.
- Summary
- Case Study
- Quiz
Lesson 4: Design a regulatory compliance strategy (1 hour and 48 minutes).
- Skill 4.1: Interpret compliance requirements and translate specific technical capabilities (new or existing) (36 minutes).
- Security compliance translation process.
- Resolving conflicts between compliance and security.
- Skill 4.2: Evaluate infrastructure compliance by using Microsoft Defender for Cloud (12 minutes).
- Skill 4.3: Interpret compliance scores and recommend actions to resolve issues or improve security (12 minutes).
- Skill 4.4: Design implementation of Azure Policy (12 minutes).
- Skill 4.5: Design for data residency requirements (12 minutes).
- Skill 4.6: Translate privacy requirements into requirements for security solutions (24 minutes).
- Security and privacy.
- Summary
- Case Study
- Quiz
Lesson 5: Evaluate security posture and recommend technical strategies to manage risk (4 hours and 48 minutes).
- Skill 5.1: Evaluate security posture by using benchmarks (including Azure Security benchmarks for Microsoft Cloud security benchmark, ISO 27001, etc.) (48 minutes).
- Microsoft Cloud security benchmark.
- Monitoring your MCSB compliance.
- Industry standards.
- Skill 5.2: Evaluate security posture by using Microsoft Defender for Cloud (1 hour).
- Defender for Cloud.
- Security posture management.
- Considerations for multi-cloud.
- Considerations for vulnerability assessment.
- Skill 5.3: Evaluate security posture by using Secure Scores (24 minutes).
- Secure Score in Defender for Cloud.
- Skill 5.4: Evaluate security posture of cloud workloads (24 minutes).
- Workload security.
- Skill 5.5: Design security for an Azure Landing Zone (1 hour and 12 minutes).
- Design principles.
- Enforcing guardrails.
- Single management plane.
- Application–centric.
- Security considerations.
- Skill 5.6: Interpret technical threat intelligence and recommend risk mitigations (36 minutes).
- Threat intelligence in Defender for Cloud.
- Threat intelligence in Microsoft Sentinel.
- Skill 5.7: Recommend security capabilities or controls to mitigate identified risks (24 minutes).
- Identifying and mitigating risks.
- Summary
- Case Study
- Quiz
Lesson 6: Design a strategy for securing server and client endpoints (9 hours and 36 minutes).
- Skill 6.1: Specify security baselines for server and client endpoints (2 hours and 48 minutes).
- Group Policy Objects (GPO).
- Security Compliance Toolkit (SCT).
- Azure Security Benchmark (ASB).
- Microsoft Endpoint Manager (MEM).
- PowerShell DSC.
- Azure Automation.
- Azure Policy.
- Azure Resource Manager (ARM) templates.
- Microsoft Defender for Cloud (MDC).
- Microsoft Defender for IoT (MDIoT).
- Baseline configuration.
- Key Recommendations.
- Skill 6.2: Specify security requirements for servers, including multiple platforms and operating systems (1 hour and 36 minutes).
- Shared responsibility in the cloud.
- Legacy insecure protocols.
- Threat protection.
- Local Administrator Password Management (LAPS).
- User rights assignments.
- Network-based controls.
- Skill 6.3: Specify security requirements for mobile devices and clients, including endpoint protection, hardening, and configurations (1 hour and 48 minutes).
- Local Administrator Password Management.
- Basic Mobility and Security.
- Threat protection.
- Conditional access.
- Microsoft Intune.
- User rights assignments.
- Micro-segmentation.
- Other security controls.
- Skill 6.4: Specify requirements to secure Active Directory Domain Services (1hour and 12 minutes).
- Secure the control plane.
- Privileged Access Management.
- Key recommendations.
- Microsoft Defender for Identity.
- Active Directory Federation Services (AD FS).
- Skill 6.5: Design a strategy to manage secrets, keys, and certificates (1 hour).
- Access control.
- Configuration control.
- Key management.
- Key recommendations.
- Skill 6.6: Design a strategy for secure remote access (1hour and 36 minutes).
- Key configurations to enable secure remote access.
- Remote access to desktop, applications, and data.
- Remote access to on-premises web applications.
- RDP/SSH connectivity.
- Remotely provisioning new devices.
- B2B collaboration.
- Key recommendations.
- Summary
- Case Study
- Quiz
Lesson 7: Design a strategy for securing SaaS, PaaS, and IaaS services (4 hours).
- Skill 7.1: Specify security baselines for SaaS, PaaS, and IaaS services (24 minutes).
- Specify security baselines for SaaS services.
- Skill 7.2: Specify security requirements for IoT workloads (36 minutes).
- Security requirements.
- Security posture and threat detection.
- Skill 7.3: Specify security requirements for data workloads, including SQL, Azure SQL Database, Azure Synapse, and Azure Cosmos DB (24 minutes).
- Security considerations for Azure Cosmos DB.
- Skill 7.4: Specify security requirements for web workloads, including Azure App Service (48 minutes).
- Network communication.
- Authentication and authorization.
- Security posture and threat protection.
- Skill 7.5: Specify security requirements for storage workloads, including Azure Storage (1 hour).
- Data protection.
- Identity and access management.
- Logging and monitoring.
- Skill 7.6: Specify security requirements for containers (24 minutes).
- Hardening access to Azure Container Registry.
- Skill 7.7: Specify security requirements for container orchestration (24 minutes).
- Threat detection.
- Summary
- Case Study
- Quiz
Lesson 8: Specify security requirements for applications (2 hours).
- Skill 8.1: Specify priorities for mitigating threats to applications (48 minutes).
- Classifying applications.
- Application threat modeling.
- Microsoft Security Development Lifecycle (SDL).
- Skill 8.2: Specify a security standard for onboarding a new application (36 minutes).
- Old versus new.
- Security standards for onboarding applications.
- Skill 8.3: Specify a security strategy for applications and APIs (36 minutes).
- Waterfall to Agile/DevOps.
- Security in DevOps (DevSecOps).
- Summary
- Case Study
- Quiz
Lesson 9: Design a strategy for securing data (2 hours and 12 minutes)
- Skill 9.1: Specify priorities for mitigating threats to data (36 minutes)
- Common threats.
- Skill 9.2: Design a strategy to identify and protect sensitive data (1 hour)
- Know your data.
- Protect your data.
- Prevent data loss.
- Govern your data.
- Skill 9.3: Specify an encryption standard for data at rest and in motion (36 minutes) Encrypt at rest.
- Encryption in motion.
- Summary
- Case Study
- Quiz
Lesson 10: Microsoft Cybersecurity Reference Architectures and Microsoft cloud security benchmark best practices (48 minutes).
- Skill 10.1: Recommend best practices for cybersecurity capabilities and controls (12 minutes).
- Skill 10.2: Recommend best practices for protecting from insider and external attacks (12 minutes).
- Skill 10.3: Recommend best practices for Zero Trust security (12 minutes)
- Skill 10.4: Recommend best practices for the Zero Trust Rapid Modernization Plan (12 minutes).
- Summary
- Case Study
- Quiz
Lesson 11: Recommend a secure methodology by using the Cloud Adoption Framework (CAF) (2 hours and 36 minutes)
- Skill 11.1: Recommend a DevSecOps process (1 hour and 12 minutes)
- DevSecOps Control.
- Plan and develop.
- Commit the code.
- Build and test.
- Go to production and operate.
- Skill 11.2: Recommend a methodology for asset protection (48 minutes)
- Getting secure.
- Staying secure.
Key recommendations for an asse protection program
- Skill 11.3: Recommend strategies for managing and minimizing risk (36 minutes)
- Measuring risk.
- Managing security risk.
- Summary
- Case Study
- Quiz
Lesson 12: Recommend a ransomware strategy by using Microsoft Security Best Practices (1 hour and 48 minutes)
- Skill 12.1: Plan for ransomware protection and extortion-based attacks (36 minutes)
- Security hygiene and damage control.
- Skill 12.2: Protect assets from ransomware attacks (48 minutes)
- Enter environment.
- Traverse and spread.
- Execute objective.
- Skill 12.3: Recommend Microsoft ransomware best practices (24 minutes)
- Best practices.
- Summary
- Case Study
- Quiz
-
MORE OPTIONS?
Pearson Skilling Suite
Ready to take learning to the next level? Check out what Pearson's Skilling Suite has to offer your business and how it can enrich your team's learning. Discover more here from FAQs to demos to answer your Skilling Suite questions.
Learn more
-
HOW CAN WE HELP?
Contact us
Whether you're a training center, enterprise, or academic institution, our team is here to help. Explore tailored solutions, get product support, or learn how Pearson can help you deliver successful training and certification programs.
Let's connect