SC-900: Microsoft Security, Compliance, and Identity Fundamentals
If you are interested in information security, compliance or identities in cloud-based and related Microsoft solutions, this course is for you.
The course consists of four different modules, after which you will be able to describe the importance of information security, compliance and identities in cloud services and the capabilities of related Microsoft products.
For all people in the IT industry who are looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
This course prepares you for the certification Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals to become a Microsoft Certified: Security, Compliance, and Identity Fundamentals.
Candidates should be familiar with Microsoft Azure and Microsoft 365.
Module 01: Describe the Concepts of Security, Compliance, and Identity
- Describe security methodologies:
- describe the Zero-Trust methodology.
- describe the shared responsibility model.
- define defence in depth.
- Describe security concepts:
- describe common threats.
- describe encryption.
- Describe Microsoft Security and compliance principles:
- describe Microsoft’s privacy principles.
- describe the offerings of the service trust portal.
Module 02: Describe the capabilities of Microsoft Identity and Access Management Solutions
- Define identity principles/concepts:
- define identity as the primary security perimeter.
- define authentication.
- define authorization.
- describe what identity providers are.
- describe what Active Directory is.
- describe the concept of Federated services.
- define common Identity Attacks).
- Describe the basic identity services and identity types of Azure AD:
- describe what Azure Active Directory is.
- describe Azure AD identities (users, devices, groups, service principals/applications).
- describe what hybrid identity is.
- describe the different external identity types (Guest Users).
- Describe the authentication capabilities of Azure AD:
- describe the different authentication methods.
- describe self-service password reset.
- describe password protection and management capabilities.
- describe Multi-factor Authentication.
- describe Windows Hello for Business.
- Describe access management capabilities of Azure AD:
- describe what conditional access is.
- describe uses and benefits of conditional access.
- describe the benefits of Azure AD roles.
- Describe the identity protection & governance capabilities of Azure AD:
- describe what identity governance is.
- describe what entitlement management and access reviews is.
- describe the capabilities of PIM.
- describe Azure AD Identity Protection.
Module 03: Describe the capabilities of Microsoft Security Solutions
- Describe basic security capabilities in Azure:
- describe Azure Network Security groups.
- describe Azure DDoS protection.
- describe what Azure Firewall is.
- describe what Azure Bastion is.
- describe what Web Application Firewall is.
- describe ways Azure encrypts data.
- Describe security management capabilities of Azure:
- describe the Azure Security center.
- describe Azure Secure score.
- describe the benefit and use cases of Azure Defender – previously the cloud workload.
- protection platform (CWPP).
- describe Cloud security posture management (CSPM).
- describe security baselines for Azure.
- Describe security capabilities of Azure Sentinel:
- define the concepts of SIEM, SOAR, XDR.
- describe the role and value of Azure Sentinel to provide integrated threat protection.
- Describe threat protection with Microsoft 365 Defender (formerly Microsoft Threat Protection):
- describe Microsoft 365 Defender services.
- describe Microsoft Defender for Identity (formerly Azure ATP).
- describe Microsoft Defender for Office 365 (formerly Office 365 ATP).
- describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP).
- describe Microsoft Cloud App Security.
- Describe security management capabilities of Microsoft 365:
- describe the Microsoft 365 Security Center.
- describe how to use Microsoft Secure Score.
- describe security reports and dashboards.
- describe incidents and incident management capabilities.
- Describe endpoint security with Microsoft Intune:
- describe what Intune is.
- describe endpoint security with Intune.
- describe the endpoint security with the Microsoft Endpoint Manager admin Center.
Module 04: Describe the Capabilities of Microsoft Compliance Solutions
- Describe the compliance management capabilities in Microsoft:
- describe the compliance center.
- describe compliance manager.
- describe use and benefits of compliance score.
- Describe information protection and governance capabilities of Microsoft 365:
- describe data classification capabilities.
- describe the value of content and activity explorer.
- describe sensitivity labels.
- describe Retention Polices and Retention Labels.
- describe Records Management.
- describe Data Loss Prevention.
- Describe insider risk capabilities in Microsoft 365:
- describe Insider risk management solution.
- describe communication compliance.
- describe information barriers.
- describe privileged access management.
- describe customer lockbox.
- Describe the eDiscovery capabilities of Microsoft 365:
- describe the purpose of eDiscovery.
- describe the capabilities of the content search tool.
- describe the core eDiscovery workflow.
- describe the advanced eDisovery workflow.
- Describe the audit capabilities in Microsoft 365:
- describe the core audit capabilities of M365.
- describe purpose and value of Advanced Auditing.
- Describe resource governance capabilities in Azure:
- describe the use of Azure Resource locks.
- describe what Azure Blueprints is.
- define Azure Policy and describe its use cases.
- describe cloud adoption framework.
590,00 € (Excl. Tax)
Related products
-
MB-910: Microsoft Dynamics 365 Fundamentals (CRM)
Array
590,00 € (Excl. Tax)This course will provide you with a broad introduction to the customer engagement capabilities of Dynamics 365. You will become familiar with the concept of customer engagement, as well as each of the customer engagement apps, including Dynamics 365 Marketing, Dynamics 365 Sales, Dynamics 365 Customer Service, Dynamics 365 Field Service, and the customer relationship... View ArticleImplementation: Online (in Finnish)Length: 1 dayStarting dates: Ask for details: sales@sulava.comMaterial: Microsoft English Material (MOC)Tommi Rehn
Consulting & Training
-
SC-200: Microsoft Security Operations Analyst
1990,00 € (Excl. Tax)This course delves into Microsoft’s cloud-based security tools on a practical level. You will learn how investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and... View ArticleImplementation: Class (in Finnish), Online (in Finnish)Length: 4 daysStarting dates: Ask for details: sales@sulava.comMaterial: Microsoft English Material (MOC)Risto Nikula
Consulting & Training
-
Sale!
Microsoft Sentinel SIEM One Day – How to build an effective and complete cybersecurity situation view?
790,00 €Original price was: 790,00 €.395,00 €Current price is: 395,00 €. (Excl. Tax)Learn about our cloud-based Microsoft Sentinel Security Information Event Management (SIEM) solution. This course covers how to build a comprehensive cybersecurity incident data view for your organization’s needs using a SIEM solution. This includes how to gather and organize information from a variety of sources into a real-time incident snapshot, including third-party sources such as... View ArticleImplementation: Online (in Finnish)Length: 1 dayStarting dates: Ask for details: sales@sulava.comMaterial: Sulava's english materialSelect options This product has multiple variants. The options may be chosen on the product page