SC-900 Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
- Duur: 1 dag
- Locatie: In-Company, Online of op onze trainingslocatie: De Loods in Rijswijk
- Niveau: Beginner
- Vragen?
Doelgroep
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have:Inhoud training
Describe security and compliance concepts
Describe security and compliance concepts.After completing this module, you'll be able to:
- Describe the shared responsibility and the defense-in-depth security models.
- Describe the Zero-Trust model.
- Describe the concepts of encryption and hashing.
- Describe some basic compliance concepts.
Describe identity concepts
Describe identity concepts.After completing this module, you'll be able to:
- Understand the difference between authentication and authorization.
- Describe the concept of identity as a security perimeter.
- Describe identity-related services.
Describe the function and identity types of Microsoft Entra ID
Describe the function and identity types of Microsoft Entra IDBy the end of this module, you'll be able to:
- Describe the function of Microsoft Entra ID.
- Describe the types of identities Microsoft Entra ID supports.
Describe the authentication capabilities of Microsoft Entra ID
Describe the authentication capabilities of Microsoft Entra IDAfter completing this module, you'll be able to:
- Describe the authentication methods of Microsoft Entra ID.
- Describe multifactor authentication (MFA) in Microsoft Entra ID.
- Describe self-service password reset (SSPR) in Microsoft Entra ID.
- Describe the password protection and management capabilities of Microsoft Entra ID.
Describe access management capabilities of Microsoft Entra ID
Describe access management capabilities of Microsoft Entra IDBy the end of this module, you'll be able to:
- Describe Conditional Access in Microsoft Entra ID.
- Describe Microsoft Entra roles and role-based access control.
Describe the identity protection and governance capabilities of Microsoft Entra
Describe the identity protection and governance capabilities of Microsoft Entra.After completing this module, you'll be able to:
- Describe the capabilities of Microsoft Entra ID Governance.
- Describe Privileged Identity Management.
- Describe the capabilities of Microsoft Entra ID Protection.
Describe core infrastructure security services in Azure
Describe core infrastructure security services in Azure.After completing this module, you'll be able to:
- Learn how Azure security capabilities can protect the network.
- Learn how Azure can protect your VMs.
- Learn how to keep secrets safe with Azure Key Vault.
Describe the security management capabilities in Azure
Describe the security management capabilities in Azure.After completing this module, you'll be able to:
- Describeâ¯Microsoft Defender for Cloud.
- Describe how security policies and initiatives improve cloud security posture.
- Describe how the three pillars of Microsoft Defender for Cloud protect against cyber threats and vulnerabilities.
Describe security capabilities of Microsoft Sentinel
Describe the capabilities in Microsoft SentinelAfter completing this module, you'll be able to:
- Describe the security concepts for SIEM and SOAR.
- Describe how Microsoft Sentinel provides threat detection and mitigation.
- Describe Microsoft Security Copilot.
Describe threat protection with Microsoft Defender XDR
Describe threat protection with Microsoft Defender XDRAfter completing this module, you'll be able to:
- Describe the Microsoft Defender XDR service.
- Describe how Microsoft Defender XDR provides integrated protection against sophisticated attacks.
- Describe and explore Microsoft Defender portal.
Describe Microsoft’s Service Trust portal and privacy capabilities
Describe Microsoft’s Service Trust portal and privacy capabilities.After completing this module, you'll be able to:
- Describe the offerings of the Service Trust Portal.
- Describe Microsoft's Privacy principles.
- Describe Microsoft Priva.
Describe the compliance management capabilities in Microsoft Purview
Describe the compliance management capabilities in Microsoft PurviewAfter completing this module, you'll be able to:
- Describe the Microsoft Purview compliance portal.
- Describe Compliance Manager.
- Describe the use and benefits of compliance score.
Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview
Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview.After completing this module, you'll be able to:
- Describe data classification capabilities.
- Describe records management.
- Describe data loss prevention.
- Describe unified data governance.
Describe the insider risk capabilities in Microsoft Purview
Describe the insider risk capabilities in Microsoft PurviewAfter completing this module, you'll be able to:
- Describe insider risk management
- Describe communication compliance
Describe the eDiscovery and Audit capabilities in Microsoft Purview
Describe the eDiscovery and Audit capabilities in Microsoft PurviewAfter completing this module, you'll be able to:
- Describe the eDiscovery capabilities of Microsoft Purview.
- Describe the auditing capabilities of Microsoft Purview.