top of page

Related Courses

SC-900 MICROSOFT SECURITY COMPLIANCE AND IDENTITY Online Course

Price: 6.00 USD | Size: 8.27 GB | Duration : 7.06 Hours |146  Video Lessons | ★★★★★3.8  (24 ratings)

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

 

SC-900 MICROSOFT SECURITY COMPLIANCE AND IDENTITY Online Course

 

Video description

 

Learn the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services to pass Microsoft SC 900 exam

 

About This Video

 

In-depth understanding of the concepts of information security, compliance, and identity

The course structure is exactly mapped with the Microsoft SC 900 exam

Comprehensive and hands-on guide with resource files

In Detail

 

Identity is the new perimeter. Application developers and infrastructure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it.

 

This course begins with the concepts of security, compliance, and identity. You’ll look at security methodologies, security concepts, and Microsoft Security and compliance principles. You’ll learn the concepts of zero trust methodology, shared responsibility model, and defense in depth.

 

After that, you’ll cover Microsoft Identity and Access Management Solutions. You’ll look at identity principles and concepts; basic identity and identity types; authentication, access management, and identity protection; and governance capabilities of Azure Active Directory.

 

Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure and Azure Sentinel, Microsoft 365 Defender, Intune, and Microsoft 365.

 

Finally, you’ll look at Microsoft Compliance Solutions. You’ll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery, and audit.

 

By the end of this course, you will get hands-on knowledge to pass the Microsoft SC 900 exam.

 

 

Table of contents

Chapter 1 : Introduction to the Course

Course Introduction

Chapter 2 : Module 1 - Describe the Concepts of Security, Compliance, and Identity

Security Concepts and Methodologies - Introduction

Zero Trust - Guidelines

Zero Trust – Six Foundational Pillars

The Shared Responsibility Models

Defense in Depth Strategy

The CIA Triad

Describe Common Threats

Describe Encryption, Hashing, and Signing - I

Describe Encryption, Hashing, and Signing – II

Summary

Microsoft Security and Compliance principles - Introduction

Microsoft's Privacy Principles

What is Service Trust Portal

Azure Compliance Documentation

Module 1: Section Summary

Chapter 3 : Module 2 - Describe the Concepts and Capabilities of Microsoft Identity and Access

Describe Identity Concepts - Introduction

Common Identity Attacks

Identity as a Security perimeter

Four Pillars of Identity

Modern Authentication and the Role of Identity Provider

SSO and the Concept of Federation

The Concept of Directory Services and Active Directory

Describe the Basic Services and Identity Types – Introduction

Describe Azure Active Directory

Azure AD Editions

Describe the Azure AD Identity types

Difference between System Assigned and User Assigned Managed Identity

Describe the Types of External Identities

Describe the Concept of Hybrid Identities

Describe the Authentication Capabilities of Azure – Introduction

Describe the Different Authentication Methods

Security Defaults and MFA

MFA in Azure AD - Part 1

Video 3.2: MFA in Azure AD - Part 2

Windows Hello

Why is Windows Hello Safer than a Password

Self-Service Password Reset in Azure AD

Password Protection and Management Capabilities of Azure AD

Protecting against Password Spray

Hybrid security

Describe the Access Management Capabilities of Azure AD

Conditional Access in Azure AD

Conditional Access in Azure AD – II

Conditional Access in Azure AD – III

Azure AD Roles and Custom Roles

Summary

Describe the Identity Protection and Governance Capabilities of Azure AD

What is Identity Governance

What is Identity Lifecycle

Access Lifecycle

Privileged Access lifecycle

What is Entitlement Management

Azure AD Access Reviews

Azure AD Terms of Use

Capabilities of Privileged Identity Management

Chapter 4 : Module 3 - Describe the Capabilities of Microsoft Security Solutions

Module Introduction

Network Security Groups

Inbound and Outbound Security Rules

What is DDOS

Azure DDOS Protection Plans and Pricing

Azure Firewall

Azure Bastion Host

Web Application Firewall

Azure Encryption

Azure Key Vault

Lesson Summary

Cloud Security Posture Management

Azure Security Center

Azure Security Center – Features

Azure Security Center - Security Score

Azure Defender

Azure Security Benchmark

Azure Security Center - Pricing Tier

Summary

Describe the Security Capabilities of Azure Sentinel

Define the Concepts of SIEM, SOAR, and XDR

Azure Sentinel

Azure Sentinel Features

Azure Sentinel – Pricing

Summary

Describe the Threat Protection Capabilities of Microsoft 365 – Introduction

Microsoft 365 Defender Services – Introduction

Microsoft Defender for Identity

Microsoft Defender for O365

Microsoft Defender for Endpoint

What is CASB

The Cloud App Security Framework

Microsoft Cloud App Security Architecture

O365 Cloud App Security and Azure AD Cloud App Discovery

Summary

Security Management Capabilities of M365 – Introduction

Microsoft 365 Security Center – Introduction

How to Use Microsoft Secure Score

Differences Between Azure and Microsoft Secure Score

Managing Incidents

Summary

Describe Endpoint Security with Microsoft Intune – Introduction

What is Intune

MDM and MAM

Endpoint Security with Intune

Summary

Chapter 5 : Module 4 - Describe the Capabilities of Microsoft Compliance Solutions

Module introduction

Common Compliance Needs

Common Compliance Regulations

Compliance Center

What is Compliance Manager

What are Controls

What are Assessments

Understand Compliance score

Summary

The Information Protection and Governance Capabilities of Microsoft 365

Know Your Data, Protect Your Data, and Govern Your Data

Data Classification Capabilities of Compliance Center

Content Explorer and Activity Explorer

Sensitivity Labels

Label Policies

Data Loss Prevention

Data Loss Prevention on Endpoints and Teams

Retention Polices and Retention Labels

Records Management

Summary

The Insider Risk Capabilities in Microsoft – Introduction

Insider Risk Management

 

SC-900 MICROSOFT SECURITY COMPLIANCE AND IDENTITY Online Course

SKU: EXT2021-0283
$6.00Price
  • You can Instant Download a PDF file 

    After successful payment, 

    This PDF File Contains Course Download links

    You can Download This Course immediately from the click that Links.  

bottom of page