SC-900 Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
- Duur: 1 dag
- Locatie: In-Company, Online of op onze trainingslocatie: De Loods in Rijswijk
- Niveau: Beginner
- Vragen?
Doelgroep
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have:Inhoud training
Describe security and compliance concepts
Describe security and compliance concepts.After completing this module, you'll be able to:
- Describe the shared responsibility and the defense-in-depth security models.
- Describe the Zero-Trust model.
- Describe the concepts of encryption and hashing.
- Describe some basic compliance concepts.
Describe identity concepts
Describe identity concepts.After completing this module, you'll be able to:
- Understand the difference between authentication and authorization.
- Describe the concept of identity as a security perimeter.
- Describe identity-related services.
Describe the function and identity types of Microsoft Entra ID
Describe the function and identity types of Microsoft Entra IDBy the end of this module, you'll be able to:
- Describe the function of Microsoft Entra ID.
- Describe the types of identities Microsoft Entra ID supports.
Describe the authentication capabilities of Microsoft Entra ID
Describe the authentication capabilities of Microsoft Entra IDAfter completing this module, you'll be able to:
- Describe the authentication methods of Microsoft Entra ID.
- Describe multifactor authentication (MFA) in Microsoft Entra ID.
- Describe self-service password reset (SSPR) in Microsoft Entra ID.
- Describe the password protection and management capabilities of Microsoft Entra ID.
Describe access management capabilities of Microsoft Entra ID
Describe access management capabilities of Microsoft Entra IDBy the end of this module, you'll be able to:
- Describe Conditional Access in Microsoft Entra ID.
- Describe Microsoft Entra roles and role-based access control.
- Describe Global Secure Access in Microsoft Entra.
Describe the identity protection and governance capabilities of Microsoft Entra
Describe the identity protection and governance capabilities of Microsoft Entra.After completing this module, you'll be able to:
- Describe the capabilities of Microsoft Entra ID Governance.
- Describe Privileged Identity Management.
- Describe the capabilities of Microsoft Entra ID Protection.
Describe core infrastructure security services in Azure
Describe core infrastructure security services in Azure.After completing this module, you'll be able to:
- Learn how Azure security capabilities can protect the network.
- Learn how Azure can protect your VMs.
- Learn how to keep secrets safe with Azure Key Vault.
Describe the security management capabilities in Azure
Describe the security management capabilities in Azure.After completing this module, you'll be able to:
- Describeâ¯Microsoft Defender for Cloud.
- Describe how security policies and initiatives improve cloud security posture.
- Describe how the three pillars of Microsoft Defender for Cloud protect against cyber threats and vulnerabilities.
Describe security capabilities of Microsoft Sentinel
Describe the capabilities in Microsoft SentinelAfter completing this module, you'll be able to:
- Describe the security concepts for SIEM and SOAR.
- Describe how Microsoft Sentinel provides threat detection and mitigation.
- Describe Microsoft Security Copilot.
Describe threat protection with Microsoft Defender XDR
Describe threat protection with Microsoft Defender XDRAfter completing this module, you'll be able to:
- Describe the Microsoft Defender XDR service.
- Describe how Microsoft Defender XDR provides integrated protection against sophisticated attacks.
- Describe and explore Microsoft Defender portal.
Describe Microsoft’s Service Trust portal and privacy capabilities
Describe Microsoft’s Service Trust portal and privacy capabilities.After completing this module, you'll be able to:
- Describe the offerings of the Service Trust Portal.
- Describe Microsoft's Privacy principles.
- Describe Microsoft Priva.
Describe the compliance management capabilities in Microsoft Purview
Describe the compliance management capabilities in Microsoft PurviewBy the end of this module, you'll be able to:
- Describe Microsoft Purview eDiscovery and Audit
- Describe Microsoft Purview Compliance Manager
- Describe Microsoft Purview Communication Compliance
- Describe Microsoft Purview Data Lifecycle Management
- Describe Microsoft Purview Records Management
Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview
Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview.By the end of this module, you'll be able to:
- Describe how Microsoft Purview Information Protection helps organizations discover, classify, and protect sensitive information.
- Describe how Microsoft Purview Data Loss Prevention helps organizations prevent their users from inappropriately sharing sensitive data with people who shouldn't have it.
- Describe how Microsoft Purview Insider Risk Management helps minimize internal risks.
Describe the insider risk capabilities in Microsoft Purview
Describe the insider risk capabilities in Microsoft PurviewBy the end of this module, you'll be able to:
- Describe how Microsoft Purview Information Protection helps organizations discover, classify, and protect sensitive information.
- Describe how Microsoft Purview Data Loss Prevention helps organizations prevent their users from inappropriately sharing sensitive data with people who shouldn't have it.
- Describe how Microsoft Purview Insider Risk Management helps minimize internal risks.
Describe the eDiscovery and Audit capabilities in Microsoft Purview
Describe the eDiscovery and Audit capabilities in Microsoft PurviewBy the end of this module, you'll be able to:
- Describe Microsoft Purview eDiscovery and Audit
- Describe Microsoft Purview Compliance Manager
- Describe Microsoft Purview Communication Compliance
- Describe Microsoft Purview Data Lifecycle Management
- Describe Microsoft Purview Records Management