Keep Calm and Study On - Unlock Your Success - Use #TOGETHER for 30% discount at Checkout

Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Online Course

Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Online Course

Identity is the new perimeter. Application developers and infrastructure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it.

This course begins with the concepts of security, compliance, and identity. You’ll look at security methodologies, security concepts, and Microsoft Security and compliance principles. You’ll learn the concepts of zero trust methodology, shared responsibility model, and defense in depth.

After that, you’ll cover Microsoft Identity and Access Management Solutions. You’ll look at identity principles and concepts; basic identity and identity types; authentication, access management, and identity protection; and governance capabilities of Azure Active Directory.

Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure and Azure Sentinel, Microsoft 365 Defender, Intune, and Microsoft 365.

Finally, you’ll look at Microsoft Compliance Solutions. You’ll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery, and audit.

By the end of this course, you will get hands-on knowledge to pass the Microsoft SC 900 exam.


Course Curriculum

Introduction to the Course

  • Course Introduction

Module 1 - Describe the Concepts of Security, Compliance, and Identity

  • Security Concepts and Methodologies - Introduction
  • Zero Trust - Guidelines
  • Zero Trust – Six Foundational Pillars
  • The Shared Responsibility Models
  • Defense in Depth Strategy
  • The CIA Triad
  • Describe Common Threats
  • Describe Encryption, Hashing, and Signing - I
  • Describe Encryption, Hashing, and Signing – II
  • Summary
  • Microsoft Security and Compliance principles - Introduction
  • Microsoft's Privacy Principles
  • What is Service Trust Portal
  • Azure Compliance Documentation
  • Module 1: Section Summary

Module 2 - Describe the Concepts and Capabilities of Microsoft Identity and Access

  • Describe Identity Concepts - Introduction
  • Common Identity Attacks
  • Identity as a Security perimeter
  • Four Pillars of Identity
  • Modern Authentication and the Role of Identity Provider
  • SSO and the Concept of Federation
  • The Concept of Directory Services and Active Directory
  • Describe the Basic Services and Identity Types – Introduction
  • Describe Azure Active Directory
  • Azure AD Editions
  • Describe the Azure AD Identity types
  • Difference between System Assigned and User Assigned Managed Identity
  • Describe the Types of External Identities
  • Describe the Concept of Hybrid Identities
  • Describe the Authentication Capabilities of Azure – Introduction
  • Describe the Different Authentication Methods
  • Security Defaults and MFA
  • MFA in Azure AD - Part 1
  • Video 3.2: MFA in Azure AD - Part 2
  • Windows Hello
  • Why is Windows Hello Safer than a Password
  • Self-Service Password Reset in Azure AD
  • Password Protection and Management Capabilities of Azure AD
  • Protecting against Password Spray
  • Hybrid security
  • Describe the Access Management Capabilities of Azure AD
  • Conditional Access in Azure AD
  • Conditional Access in Azure AD – II
  • Conditional Access in Azure AD – III
  • Azure AD Roles and Custom Roles
  • Summary
  • Describe the Identity Protection and Governance Capabilities of Azure AD
  • What is Identity Governance
  • What is Identity Lifecycle
  • Access Lifecycle
  • Privileged Access lifecycle
  • What is Entitlement Management
  • Azure AD Access Reviews
  • Azure AD Terms of Use
  • Capabilities of Privileged Identity Management

Module 3 - Describe the Capabilities of Microsoft Security Solutions

  • Module Introduction
  • Network Security Groups
  • Inbound and Outbound Security Rules
  • What is DDOS
  • Azure DDOS Protection Plans and Pricing
  • Azure Firewall
  • Azure Bastion Host
  • Web Application Firewall
  • Azure Encryption
  • Azure Key Vault
  • Lesson Summary
  • Cloud Security Posture Management
  • Azure Security Center
  • Azure Security Center – Features
  • Azure Security Center - Security Score
  • Azure Defender
  • Azure Security Benchmark
  • Azure Security Center - Pricing Tier
  • Summary
  • Describe the Security Capabilities of Azure Sentinel
  • Define the Concepts of SIEM, SOAR, and XDR
  • Azure Sentinel
  • Azure Sentinel Features
  • Azure Sentinel – Pricing
  • Summary
  • Describe the Threat Protection Capabilities of Microsoft 365 – Introduction
  • Microsoft 365 Defender Services – Introduction
  • Microsoft Defender for Identity
  • Microsoft Defender for O365
  • Microsoft Defender for Endpoint
  • What is CASB
  • The Cloud App Security Framework
  • Microsoft Cloud App Security Architecture
  • O365 Cloud App Security and Azure AD Cloud App Discovery
  • Summary
  • Security Management Capabilities of M365 – Introduction
  • Microsoft 365 Security Center – Introduction
  • How to Use Microsoft Secure Score
  • Differences Between Azure and Microsoft Secure Score
  • Managing Incidents
  • Summary
  • Describe Endpoint Security with Microsoft Intune – Introduction
  • What is Intune
  • MDM and MAM
  • Endpoint Security with Intune
  • Summary

Module 4 - Describe the Capabilities of Microsoft Compliance Solutions

  • Module introduction
  • Common Compliance Needs
  • Common Compliance Regulations
  • Compliance Center
  • What is Compliance Manager
  • What are Controls
  • What are Assessments
  • Understand Compliance score
  • Summary
  • The Information Protection and Governance Capabilities of Microsoft 365
  • Know Your Data, Protect Your Data, and Govern Your Data
  • Data Classification Capabilities of Compliance Center
  • Content Explorer and Activity Explorer
  • Sensitivity Labels
  • Label Policies
  • Data Loss Prevention
  • Data Loss Prevention on Endpoints and Teams
  • Retention Polices and Retention Labels
  • Records Management
  • Summary
  • The Insider Risk Capabilities in Microsoft – Introduction
  • Insider Risk Management
  • Insider Risk Management Workflow
  • Communications Compliance
  • Information Barriers in Microsoft Teams
  • Privileged Access Management
  • Customer Lockbox
  • Summary
  • eDiscovery Capabilities of Microsoft M365 – Introduction
  • The Purpose of eDiscovery
  • The Capabilities of the Content Search
  • The Core eDiscovery Workflow
  • The Advanced eDiscovery Workflow
  • Summary
  • The Audit Capabilities of Microsoft 365 - Introduction
  • The Core Audit Capabilities of M365
  • What are the Advanced Auditing Capabilities
  • High Bandwidth for Office 365 API Activities
  • Summary
  • Describe the Resource Governance Capabilities - Introduction
  • Resource Manager – Locks
  • What is Azure Blueprint
  • What is Azure Policy
  • Difference between Azure Policy and RBAC
  • Cloud Adoption Framework

Tags: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Online Course