SC-900 Microsoft Security, Compliance, and Identity Fundamentals

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
SC-900 Microsoft Security, Compliance, and Identity Fundamentals

Doelgroep

The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have:

Inhoud training

Describe security and compliance concepts

Describe security and compliance concepts.

After completing this module, you'll be able to:

  • Describe the shared responsibility and the defense-in-depth security models.
  • Describe the Zero-Trust model.
  • Describe the concepts of encryption and hashing.
  • Describe some basic compliance concepts.

Describe identity concepts

Describe identity concepts.

After completing this module, you'll be able to:

  • Understand the difference between authentication and authorization.
  • Describe the concept of identity as a security perimeter.
  • Describe identity-related services.

Describe the function and identity types of Microsoft Entra ID

Describe the function and identity types of Microsoft Entra ID

By the end of this module, you'll be able to:

  • Describe the function of Microsoft Entra ID.
  • Describe the types of identities Microsoft Entra ID supports.

Describe the authentication capabilities of Microsoft Entra ID

Describe the authentication capabilities of Microsoft Entra ID

After completing this module, you'll be able to:

  • Describe the authentication methods of Microsoft Entra ID.
  • Describe multifactor authentication (MFA) in Microsoft Entra ID.
  • Describe self-service password reset (SSPR) in Microsoft Entra ID.
  • Describe the password protection and management capabilities of Microsoft Entra ID.

Describe access management capabilities of Microsoft Entra ID

Describe access management capabilities of Microsoft Entra ID

By the end of this module, you'll be able to:

  • Describe Conditional Access in Microsoft Entra ID.
  • Describe Microsoft Entra roles and role-based access control.

Describe the identity protection and governance capabilities of Microsoft Entra

Describe the identity protection and governance capabilities of Microsoft Entra.

After completing this module, you'll be able to:

  • Describe the capabilities of Microsoft Entra ID Governance.
  • Describe Privileged Identity Management.
  • Describe the capabilities of Microsoft Entra ID Protection.

Describe core infrastructure security services in Azure

Describe core infrastructure security services in Azure.

After completing this module, you'll be able to:

  • Learn how Azure security capabilities can protect the network.
  • Learn how Azure can protect your VMs.
  • Learn how to keep secrets safe with Azure Key Vault.

Describe the security management capabilities in Azure

Describe the security management capabilities in Azure.

After completing this module, you'll be able to:

  • Describe Microsoft Defender for Cloud.
  • Describe how security policies and initiatives improve cloud security posture.
  • Describe how the three pillars of Microsoft Defender for Cloud protect against cyber threats and vulnerabilities.

Describe security capabilities of Microsoft Sentinel

Describe the capabilities in Microsoft Sentinel

After completing this module, you'll be able to:

  • Describe the security concepts for SIEM and SOAR.
  • Describe how Microsoft Sentinel provides threat detection and mitigation.
  • Describe Microsoft Security Copilot.

Describe threat protection with Microsoft Defender XDR

Describe threat protection with Microsoft Defender XDR

After completing this module, you'll be able to:

  • Describe the Microsoft Defender XDR service.
  • Describe how Microsoft Defender XDR provides integrated protection against sophisticated attacks.
  • Describe and explore Microsoft Defender portal.

Describe Microsoft’s Service Trust portal and privacy capabilities

Describe Microsoft’s Service Trust portal and privacy capabilities.

After completing this module, you'll be able to:

  • Describe the offerings of the Service Trust Portal.
  • Describe Microsoft's Privacy principles.
  • Describe Microsoft Priva.

Describe the compliance management capabilities in Microsoft Purview

Describe the compliance management capabilities in Microsoft Purview

After completing this module, you'll be able to:

  • Describe the Microsoft Purview compliance portal.
  • Describe Compliance Manager.
  • Describe the use and benefits of compliance score.

Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview

Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview.

After completing this module, you'll be able to:

  • Describe data classification capabilities.
  • Describe records management.
  • Describe data loss prevention.
  • Describe unified data governance.

Describe the insider risk capabilities in Microsoft Purview

Describe the insider risk capabilities in Microsoft Purview

After completing this module, you'll be able to:

  • Describe insider risk management
  • Describe communication compliance

Describe the eDiscovery and Audit capabilities in Microsoft Purview

Describe the eDiscovery and Audit capabilities in Microsoft Purview

After completing this module, you'll be able to:

  • Describe the eDiscovery capabilities of Microsoft Purview.
  • Describe the auditing capabilities of Microsoft Purview.

Meer informatie

Heb je interesse in deze training? Vul je gegevens in, verstuur en we nemen contact met je op.