Upgrade Your Career with Exciting Offers on our Career-defining Courses Upto 50% OFF | Offer ending in:
D H M S Grab Now
X

All Self Learning > SC-900 : Microsoft Security,Compliance & Identity Fundamentals Self Learning

SC-900 : Microsoft Security,Compliance & Identity Fundamentals Self Learning 7.5 hours on-demand video | 151 lectures | HD 1080

Learn Microsoft Security, Compliance & Identity Fundamentals

103 Students Enrolled
Watch Preview

Benefits of Self-paced Learning

Flexible learning time and place
Revisit any concept at any given time
Learn from the industry experts over the world
Get course completion certificate
$ 12 $ 99   88 % off
Start Learning
  • 151 lectures in HD 1080
  • 7.5 hours on-demand video
  • Access on mobile and TV
  • Certificate of completion

Course Description

This SC-900: Microsoft Security, Compliance, and Identity Fundamentals course is intended for those who want to learn the principles of security, compliance, and identity across cloud-based and associated Microsoft services.

The concepts of security, compliance, and identity are introduced in this course. You will be familiar with security approaches, concepts, and Microsoft security and compliance guidelines. You will understand the ideas of zero trust methodology, shared responsibility model, and defense-in-depth.

What you'll learn

  • Understand the ideas of information security, compliance, and identity as they apply to Azure and other Microsoft products.
  • Analyze the capability of Microsoft’s security products.
  • Describe the Microsoft compliance solutions’ capabilities.
  • Understand how Microsoft’s identity and access management solutions work.

Target Audience

  • Any IT professionals, business stakeholders, or students interested in Microsoft security, compliance, and identity management solutions.
  • Learners who want to learn the basics of security, compliance, and identity in relation to cloud-based and related Microsoft services.
  • People who want to learn how Microsoft security, compliance, and identity solutions may be used to deliver a comprehensive and end-to-end solution.

Pre-requisites

  • Basic understanding of security, compliance, and identity
  • Knowledge of Microsoft Azure and Microsoft 365 will be helpful
  • Knowledge of Azure Active Directory concepts would be beneficial

Course content

151 lectures • 7.5 hours total length

Introduction
  • SC 900 Introduction
  • Course Trailer
Module 1 : Describe the concepts of security, compliance, and identity
  • Security concepts and methodologies – Introduction
  • Zero Trust – Guidelines
  • Zero Trust – Six Foundational Pillars
  • Defense in Depth
  • Shared Responsibility Model
  • The CIA Triad – Edited
  • Describe Common Threats – Edited
  • Describe Encryption , Hashing and Signing – I
  • Describe Encryption , Hashing and Signing – II
  • Lesson 1 – Conclusion
  • Microsoft security and compliance principles – Lesson Introduction
  • Microsoft’s Privacy Principles
  • What is Service Trust Portal
  • Azure Compliance Documentation
  • Chapter Summary
Module 2 : Describe the concepts & capabilities of Microsoft identity and access
  • Describe identity concepts – Introduction
  • Common identity attacks
  • Identity As a Security perimeter
  • Four pillars of identity
  • Modern authentication and the role of the identity
  • SSO and the Concept of Federation
  • The concept of directory services and Active Directory
  • Describe the basic services and identity types – Introduction
  • Describe Azure Active Directory
  • Azure AD Editions
  • Describe the Azure AD identity types
  • Difference between system and user assigned managed identity
  • Describe the types external identities
  • Describe the concept of hybrid Identities
  • Describe the authentication capabilities of Azure – Introduction-edited
  • Describe the different authentication methods
  • Security defaults and MFA
  • MFA in Azure AD – Part 1
  • MFA in Azure AD – Part 2
  • Windows Hello
  • Why is Windows Hello safer than a password
  • Self-service password reset in Azure AD
  • Password protection and management capabilities of Azure AD
  • Protecting against password spray
  • Hybrid security
  • Describe the access management capabilities of AzureAD
  • Conditional access in Azure AD
  • Conditional access in Azure AD – II
  • Conditional access in Azure AD – III
  • Azure AD Custom Roles and Custom Roles
  • Chapter Summary
  • What is Identity Governance
  • Describe the identity protection and governance capabilities of Azure AD
  • What is Identity lifecycle
  • Access Lifecycle
  • Privileged access lifecycle-edited
  • What is Entitlement management
  • Azure AD access reviews
  • Azure AD terms of use
  • Capabilities of Privileged identity Management
Module 3 : Describe the capabilties of Microsoft security solutions
  • Introduction
  • Network security groups
  • Inbound and outbound security rules1
  • What is DDOS
  • Azure DDOS protection plans and pricing
  • Azure Firewall
  • Azure Bastion Host
  • Web Application Firewall
  • Azure Encryption
  • Azure Key vault
  • Lesson Summary
  • Cloud Security Posture management
  • Azure Security Center
  • Azure Security Center – Features
  • Azure Security Center – Security Score
  • Azure Defender
  • Azure Security Benchmark
  • Azure Security Center
  • Lesson Summary
  • Describe the security capabilities of Azure Sentinel – Introduction
  • Define the concepts of SIEM, SOAR, XDR
  • Azure Sentinel
  • Azure Sentinel Features
  • Azure Sentinel – Pricing
  • Lesson Summary
  • Describe the threat protection capabilities of – Introduction
  • Microsoft 365 Defender services – Introduction
  • Microsoft Defender for Identity
  • Microsoft Defender for O365
  • Microsoft Defender for Endpoint
  • What is CASB
  • The Cloud App Security framework
  • Microsoft Cloud App Security architecture
  • O365 Cloud App security And Azure AD Cloud App Discovery
  • Chapter Summary
  • security management capabilities of M365
  • Microsoft 365 Security Center- Intro
  • How to use Microsoft Secure Score
  • Differences between the Azure and Microsoft Secure Score
  • Managing Incidents
  • Chapter Summary
  • Describe endpoint security with Microsoft Intune – Introduction
  • What is Intune
  • MDM and MAM
  • Endpoint security with Intune
  • Chapter Summary
Module 4 : Describe the capabilities of Microsoft compliance solutions
  • Introduction
  • Common compliance needs
  • Common compliance regulations
  • Compliance Center
  • What is Compliance Manager
  • What are Controls
  • What are Assessments
  • Understand Compliance score
  • Chapter Summary
  • The information protection and governance capabilities of Microsoft 365
  • Know your data, protect your data, and govern your data
  • Data classification capabilities of compliance Center
  • Content Explorer and Activity Explorer
  • Sensitivity labels
  • Label Policies
  • Data Loss Prevention
  • Retention Polices and Retention Labels
  • Records Management
  • Chapter Summary
  • The insider risk capabilities in Microsoft – Introduction
  • insider Risk management Workflow
  • Insider Risk management Workflow
  • Communications Compliance
  • Information barriers in Microsoft Teams
  • Privileged access management
  • Customer Lockbox
  • Lesson Summary
  • eDiscovery capabilities of Microsoft M365 – Introduction
  • The Purpose of eDiscovery
  • The capabilities of the content search
  • The Core eDiscovery Workflow
  • The advanced eDiscovery workflow
  • The audit capabilities of Microsoft 365- introduction
  • Lesson Summary
  • The core audit capabilities of M365
  • What are the Advance Auditing Capabilities
  • Lesson Summary
  • High Bandwidth for O365 APi Activities
  • Describe the resource governance capabilities- introduction
  • Resource Manager – Locks
  • What is Azure Blueprints
  • What is Azure Policy
  • Difference between Azure Policy and RBAC
  • Cloud Adoption Framework
$ 12 $ 99   88 % off
Start Learning
  • 151 lectures in HD 1080
  • 7.5 hours on-demand video
  • Access on mobile and TV
  • Certificate of completion

Instructor

Frequently Asked Questions

How long will I get access to the course?
Once you purchase the course, you can access for 365days
Can I download the videos?
No, you cannot download the videos
How Self-paced Learning Work?
  • Step 1: Enroll into the Course
  • Step 2: Receive the LMS credentials in your registered email ID
  • Step 3: After course completion, Fill the feedback form
  • Step 4: You will receive your Self-paced Learning course completion certification within 3-4 days
How can I resolve any queries?
Our sales executives will help you resolve your queries. You can connect them at our numbers:
Call: IND: 1800-843-7890 / US: +1 657-722-11127 / UK : +44 7451 208413 / UAE: +971 564 23 6252
or send an email at sales@infosectrain.com
Who should opt for a self-paced course?
Self-paced courses are available to anyone who wants to learn but is unable to enrol in an instructor-led course. A self-paced course is an option if you prefer to learn at your own leisure.
Can I opt for an instructor-led course after purchasing a self-paced course?
Yes, you can connect with our sales executive to get details on the latest batch.
What is the number of questions on the SC-900 exam?
The SC-900 exam consists of approximately 40-60 questions.
What is the time limit for answering all of the questions?
The SC-900 exam takes 120 minutes to complete.
What differentiates the SC-900 exam from the other AZ exams?

The SC-900 exam is not the same as the AZ examinations. The AZ tests are for Microsoft’s Azure cloud platform, whereas the SC certifications are exclusively security-related.

In a single registration, how many attempts will I get?
For each registration, you receive one attempt at all Microsoft examinations. You have 24 hours to reschedule if you do not pass the exam on your first attempt.
What is the format of the SC-900 exam?
SC-900 is a multiple-choice exam with some multi-response and case study questions.

Related Courses

  • SC-300: Microsoft Identity & Access Administrator Self Learning Course

    12 99   88% off
    • 245 lectures in HD 1080
    • 13 hours on-demand video
    • Access on mobile and TV
    • Certificate of completion
    View Details
  • SC-200 : Microsoft Security Operations Analyst Self Learning Course

    12 99   88% off
    • 200 lectures in HD 1080
    • 13 hours on-demand video
    • Access on mobile and TV
    • Certificate of completion
    View Details
  • Ansible Automation Self Learning with Example & Practical Lessons

    12 99   88% off
    • 29 hours on-demand video
    • Access on mobile and TV
    • Certificate of completion
    View Details
  • Industrial espionage-HUMINT-SIGINT-OPSINT-OSINT Self Learning

    12 99   88% off
    • 2.5 hours on-demand video
    • Access on mobile and TV
    • Certificate of completion
    View Details
TOP