SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Video description
Learn the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services to pass Microsoft SC 900 exam
About This Video
In-depth understanding of the concepts of information security, compliance, and identity
The course structure is exactly mapped with the Microsoft SC 900 exam
Comprehensive and hands-on guide with resource files
In Detail
Identity is the new perimeter. …
SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Video description
Learn the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services to pass Microsoft SC 900 exam
About This Video
In-depth understanding of the concepts of information security, compliance, and identity
The course structure is exactly mapped with the Microsoft SC 900 exam
Comprehensive and hands-on guide with resource files
In Detail
Identity is the new perimeter. Application developers and infrastructure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it.
This course begins with the concepts of security, compliance, and identity. You’ll look at security methodologies, security concepts, and Microsoft Security and compliance principles. You’ll learn the concepts of zero trust methodology, shared responsibility model, and defense in depth.
After that, you’ll cover Microsoft Identity and Access Management Solutions. You’ll look at identity principles and concepts; basic identity and identity types; authentication, access management, and identity protection; and governance capabilities of Azure Active Directory.
Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure and Azure Sentinel, Microsoft 365 Defender, Intune, and Microsoft 365.
Finally, you’ll look at Microsoft Compliance Solutions. You’ll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery, and audit.
By the end of this course, you will get hands-on knowledge to pass the Microsoft SC 900 exam.
Who this book is for
This course is for a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.
Individuals looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services can also benefit from this course.
Basic knowledge of security, compliance, and identity, and familiarity with Microsoft Azure and Microsoft 365 will be required.
Concepts of Azure Active Directory would be helpful but not mandatory.
Chapter 2 : Module 1 - Describe the Concepts of Security, Compliance, and Identity
Security Concepts and Methodologies - Introduction
Zero Trust - Guidelines
Zero Trust – Six Foundational Pillars
The Shared Responsibility Models
Defense in Depth Strategy
The CIA Triad
Describe Common Threats
Describe Encryption, Hashing, and Signing - I
Describe Encryption, Hashing, and Signing – II
Summary
Microsoft Security and Compliance principles - Introduction
Microsoft’s Privacy Principles
What is Service Trust Portal
Azure Compliance Documentation
Module 1: Section Summary
Chapter 3 : Module 2 - Describe the Concepts and Capabilities of Microsoft Identity and Access
Describe Identity Concepts - Introduction
Common Identity Attacks
Identity as a Security perimeter
Four Pillars of Identity
Modern Authentication and the Role of Identity Provider
SSO and the Concept of Federation
The Concept of Directory Services and Active Directory
Describe the Basic Services and Identity Types – Introduction
Describe Azure Active Directory
Azure AD Editions
Describe the Azure AD Identity types
Difference between System Assigned and User Assigned Managed Identity
Describe the Types of External Identities
Describe the Concept of Hybrid Identities
Describe the Authentication Capabilities of Azure – Introduction
Describe the Different Authentication Methods
Security Defaults and MFA
MFA in Azure AD - Part 1
Video 3.2: MFA in Azure AD - Part 2
Windows Hello
Why is Windows Hello Safer than a Password
Self-Service Password Reset in Azure AD
Password Protection and Management Capabilities of Azure AD
Protecting against Password Spray
Hybrid security
Describe the Access Management Capabilities of Azure AD
Conditional Access in Azure AD
Conditional Access in Azure AD – II
Conditional Access in Azure AD – III
Azure AD Roles and Custom Roles
Summary
Describe the Identity Protection and Governance Capabilities of Azure AD
What is Identity Governance
What is Identity Lifecycle
Access Lifecycle
Privileged Access lifecycle
What is Entitlement Management
Azure AD Access Reviews
Azure AD Terms of Use
Capabilities of Privileged Identity Management
Chapter 4 : Module 3 - Describe the Capabilities of Microsoft Security Solutions
Module Introduction
Network Security Groups
Inbound and Outbound Security Rules
What is DDOS
Azure DDOS Protection Plans and Pricing
Azure Firewall
Azure Bastion Host
Web Application Firewall
Azure Encryption
Azure Key Vault
Lesson Summary
Cloud Security Posture Management
Azure Security Center
Azure Security Center – Features
Azure Security Center - Security Score
Azure Defender
Azure Security Benchmark
Azure Security Center - Pricing Tier
Summary
Describe the Security Capabilities of Azure Sentinel
Define the Concepts of SIEM, SOAR, and XDR
Azure Sentinel
Azure Sentinel Features
Azure Sentinel – Pricing
Summary
Describe the Threat Protection Capabilities of Microsoft 365 – Introduction
Microsoft 365 Defender Services – Introduction
Microsoft Defender for Identity
Microsoft Defender for O365
Microsoft Defender for Endpoint
What is CASB
The Cloud App Security Framework
Microsoft Cloud App Security Architecture
O365 Cloud App Security and Azure AD Cloud App Discovery
Summary
Security Management Capabilities of M365 – Introduction
Microsoft 365 Security Center – Introduction
How to Use Microsoft Secure Score
Differences Between Azure and Microsoft Secure Score
Managing Incidents
Summary
Describe Endpoint Security with Microsoft Intune – Introduction
What is Intune
MDM and MAM
Endpoint Security with Intune
Summary
Chapter 5 : Module 4 - Describe the Capabilities of Microsoft Compliance Solutions
Module introduction
Common Compliance Needs
Common Compliance Regulations
Compliance Center
What is Compliance Manager
What are Controls
What are Assessments
Understand Compliance score
Summary
The Information Protection and Governance Capabilities of Microsoft 365
Know Your Data, Protect Your Data, and Govern Your Data
Data Classification Capabilities of Compliance Center
Content Explorer and Activity Explorer
Sensitivity Labels
Label Policies
Data Loss Prevention
Data Loss Prevention on Endpoints and Teams
Retention Polices and Retention Labels
Records Management
Summary
The Insider Risk Capabilities in Microsoft – Introduction
Insider Risk Management
Insider Risk Management Workflow
Communications Compliance
Information Barriers in Microsoft Teams
Privileged Access Management
Customer Lockbox
Summary
eDiscovery Capabilities of Microsoft M365 – Introduction
The Purpose of eDiscovery
The Capabilities of the Content Search
The Core eDiscovery Workflow
The Advanced eDiscovery Workflow
Summary
The Audit Capabilities of Microsoft 365 - Introduction
The Core Audit Capabilities of M365
What are the Advanced Auditing Capabilities
High Bandwidth for Office 365 API Activities
Summary
Describe the Resource Governance Capabilities - Introduction
Resource Manager – Locks
What is Azure Blueprint
What is Azure Policy
Difference between Azure Policy and RBAC
Cloud Adoption Framework
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept