Rating 3.0 out of 5 (2 ratings in Udemy)
What you'll learn
- Describe the concepts of security, compliance, and identity
- Describe the capabilities of Microsoft identity and access management solutions
- Describe the capabilities of Microsoft security solutions
- Describe the capabilities of Microsoft compliance solutions
Description
Exam: SC-900: Microsoft Security Compliance and Identity Fundamentals
These simulations are for technology professionals but for those who like challenges and …
Rating 3.0 out of 5 (2 ratings in Udemy)
What you'll learn
- Describe the concepts of security, compliance, and identity
- Describe the capabilities of Microsoft identity and access management solutions
- Describe the capabilities of Microsoft security solutions
- Describe the capabilities of Microsoft compliance solutions
Description
Exam: SC-900: Microsoft Security Compliance and Identity Fundamentals
These simulations are for technology professionals but for those who like challenges and study in the world of Azure.
Azure SC-900: Security Compliance Identity Fundamentals - Practice test Jun22 #1
Azure SC-900: Security Compliance Identity Fundamentals - Practice test Jun22 #2
Azure SC-900: Security Compliance Identity Fundamentals - Practice test Jun22 #3
Azure SC-900: Security Compliance Identity Fundamentals - Practice test Jun22 #4
Azure SC-900: Security Compliance Identity Fundamentals - Practice test Jun22 #5
Whether you are a student, business user, or IT professional, this certification ensures a clear understanding of a variety of topics in the rapidly growing cybersecurity field. This foundations certification can serve as a starting point if you are interested in advancing to role-based certifications in security operations, identity management, and information access and protection.
The Microsoft Certified: Security, Compliance and Identity Fundamentals certification could be a great option for you if you want to:
Demonstrate your knowledge of Microsoft's Security, Compliance and Identity (SCI) solutions.
Increase your understanding of how Microsoft's SCI solutions provide holistic end-to-end cybersecurity functionality.
Familiarity with cloud computing and networking concepts, general IT knowledge, or any general experience working in an IT environment, as well as a general understanding of Microsoft Azure and Microsoft 365, is recommended.
To ensure you are prepared for the exam, we recommend:
Advanced understanding of measured skills.
Study relevant individual content on Microsoft Learn or register for an instructor-led training event.
Take the practice exam to validate your knowledge and understanding of the exam experience.
Accompanying a person on your team who works on security, compliance, and identity management.
Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Describe the Concepts of Security, Compliance, and Identity (5-10%)
Describe security and compliance concepts & methodologies
· describe the Zero-Trust methodology
· describe the shared responsibility model
· define defense in depth
· describe common threats
· describe encryption and hashing
· describe cloud adoption framework Define identity concepts
· define identity as the primary security perimeter
· define authentication
· define authorization
· describe what identity providers are
· describe what Active Directory is
· describe the concept of Federated services
· define common Identity Attacks
Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
Describe the basic identity services and identity types of Azure AD
· describe what Azure Active Directory is
· describe Azure AD identity types (users, devices, groups, service principals/applications)
· describe what hybrid identity is
· describe the different external identity types (Guest Users) Describe the authentication capabilities of Azure AD
· describe the different authentication methods
· describe self-service password reset
· describe password protection and management capabilities
· describe Multi-factor Authentication
· describe Windows Hello for Business Describe access management capabilities of Azure AD
· describe what conditional access is
· describe uses and benefits of conditional access
· describe the benefits of Azure AD roles Describe the identity protection & governance capabilities of Azure AD
· describe what identity governance is
· describe what entitlement management and access reviews is
· describe the capabilities of PIM
· describe Azure AD Identity Protection
Describe the capabilities of Microsoft Security Solutions (30-35%)
Describe basic security capabilities in Azure
· describe Azure Network Security groups
· describe Azure DDoS protection
· describe what Azure Firewall is
· describe what Azure Bastion is
· describe what Web Application Firewall is
· describe ways Azure encrypts data Describe security management capabilities of Azure
· describe Cloud security posture management (CSPM)
· describe Microsoft Defender for Cloud
· describe secure score in Microsoft Defender Cloud
· describe enhanced security of Microsoft Defender for Cloud
· describe security baselines for Azure Describe security capabilities of Microsoft Sentinel
· define the concepts of SIEM, SOAR, XDR
· describe how of Microsoft Sentinel provides integrated threat protection Describe threat protection with Microsoft 365 Defender
· describe Microsoft 365 Defender services
· describe Microsoft Defender for Identity (formerly Azure ATP)
· describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
· describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
· describe Microsoft Defender for Cloud Apps Describe security management capabilities of Microsoft 365
· describe the Microsoft 365 Defender portal
· describe how to use Microsoft Secure Score
· describe security reports and dashboards
· describe incidents and incident management capabilities Describe endpoint security with Microsoft Intune
· describe what Intune is
· describe endpoint security with Intune
· describe the endpoint security with the Microsoft Endpoint Manager admin center
Describe the Capabilities of Microsoft Compliance Solutions (25-30%)
Describe the compliance management capabilities in Microsoft
· describe the offerings of the Service Trust portal
· describe Microsoft’s privacy principles
· describe the compliance center
· describe compliance manager
· describe use and benefits of compliance score Describe information protection and governance capabilities of Microsoft 365
· describe data classification capabilities
· describe the value of content and activity explorer
· describe sensitivity labels
· describe Retention Polices and Retention Labels
· describe Records Management
· describe Data Loss Prevention Describe insider risk capabilities in Microsoft 365 · describe Insider risk management solution
· describe communication compliance
· describe information barriers
· describe privileged access management
· describe customer lockbox Describe the eDiscovery and audit capabilities of Microsoft 365
· describe the purpose of eDiscovery
· describe the capabilities of the content search tool
· describe the core eDiscovery workflow
· describe the advanced eDiscovery workflow
· describe the core audit capabilities of M365
· describe purpose and value of Advanced Auditing
Describe resource governance capabilities in Azure
· describe the use of Azure Resource locks
· describe what Azure Blueprints is
· define Azure Policy and describe its use cases
Paid
Self paced
Intermediate Level
English (US)
6
Rating 3.0 out of 5 (2 ratings in Udemy)
Go to the Course