SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Mikäli olet kiinnostunut tietoturvasta, vaatimustenmukaisuudesta tai identiteeteistä pilvipohjaisissa ja niihin liittyvissä Microsoft ratkaisuissa, kurssi SC-900 on sinua varten!
Kurssi muodostuu neljästä eri moduulista, joiden jälkeen osaat kuvata tietoturvan, vaatimustenmukaisuuden ja identiteettien merkityksen pilvipalveluissa ja näihin liittyvien Microsoftin tuotteiden kyvykkyydet.
Osoita osaaminen ja suorita sertifikaatti: Saat 14.5. asti kurssioston yhteydessä valitsemasi sertifikaattivoucher-paketin puoleen hintaan! Tutustu Microsoft-sertifikaatin suorittamiseen, hyötyihin ja voucher-paketteihin: Testikeskus ja sertifioinnit
Toteutus: Online-toteutus
Kesto: 1 päivä
Aloituspäivämäärät: 29.3.2023
,
09:00–16:00
25.5.2023
09:00–16:00
Materiaali: Microsoftin englanninkielinen materiaali (MOC)
KenelleKaikille IT-alan ihmisille, joita kiinnostaa oppia uutta tai syventää pintapuolista osaamistaan Microsoftin tietoturva-, vaatimustenmukaisuus- tai identiteettiratkaisuista.
MiksiKurssi antaa kokonaiskuvan siitä, miten ratkaisuiden avulla saadaan kokonaiskuva tietoturvan, vaatimustenmukaisuuden ja identiteettien tilasta yrityksessä.
EsitietovaatimuksetTunnet jonkin verran Microsoft Azure ja Microsoft 365 pilvipalveluja.
Kurssin sisältöModule 01: Describe the Concepts of Security, Compliance, and Identity (modulaarisuuden päivä 1 tunnit 1-2)
- Describe security methodologies:
- describe the Zero-Trust methodology.
- describe the shared responsibility model.
- define defence in depth.
- Describe security concepts:
- describe common threats.
- describe encryption.
- Describe Microsoft Security and compliance principles:
- describe Microsoft’s privacy principles.
- describe the offerings of the service trust portal.
Module 02: Describe the capabilities of Microsoft Identity and Access Management Solutions (modulaarisuuden päivä 1 tunnit 1-2)
- Define identity principles/concepts:
- define identity as the primary security perimeter.
- define authentication.
- define authorization.
- describe what identity providers are.
- describe what Active Directory is.
- describe the concept of Federated services.
- define common Identity Attacks).
- Describe the basic identity services and identity types of Azure AD:
- describe what Azure Active Directory is.
- describe Azure AD identities (users, devices, groups, service principals/applications).
- describe what hybrid identity is.
- describe the different external identity types (Guest Users).
- Describe the authentication capabilities of Azure AD:
- describe the different authentication methods.
- describe self-service password reset.
- describe password protection and management capabilities.
- describe Multi-factor Authentication.
- describe Windows Hello for Business.
- Describe access management capabilities of Azure AD:
- describe what conditional access is.
- describe uses and benefits of conditional access.
- describe the benefits of Azure AD roles.
- Describe the identity protection & governance capabilities of Azure AD:
- describe what identity governance is.
- describe what entitlement management and access reviews is.
- describe the capabilities of PIM.
- describe Azure AD Identity Protection.
Module 03: Describe the capabilities of Microsoft Security Solutions (modulaarisuuden päivä 2 tunnit 3-6)
- Describe basic security capabilities in Azure:
- describe Azure Network Security groups.
- describe Azure DDoS protection.
- describe what Azure Firewall is.
- describe what Azure Bastion is.
- describe what Web Application Firewall is.
- describe ways Azure encrypts data.
- Describe security management capabilities of Azure:
- describe the Azure Security center.
- describe Azure Secure score.
- describe the benefit and use cases of Azure Defender – previously the cloud workload.
- protection platform (CWPP).
- describe Cloud security posture management (CSPM).
- describe security baselines for Azure.
- Describe security capabilities of Azure Sentinel:
- define the concepts of SIEM, SOAR, XDR.
- describe the role and value of Azure Sentinel to provide integrated threat protection.
- Describe threat protection with Microsoft 365 Defender (formerly Microsoft Threat Protection):
- describe Microsoft 365 Defender services.
- describe Microsoft Defender for Identity (formerly Azure ATP).
- describe Microsoft Defender for Office 365 (formerly Office 365 ATP).
- describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP).
- describe Microsoft Cloud App Security.
- Describe security management capabilities of Microsoft 365:
- describe the Microsoft 365 Security Center.
- describe how to use Microsoft Secure Score.
- describe security reports and dashboards.
- describe incidents and incident management capabilities.
- Describe endpoint security with Microsoft Intune:
- describe what Intune is.
- describe endpoint security with Intune.
- describe the endpoint security with the Microsoft Endpoint Manager admin Center.
Module 04: Describe the Capabilities of Microsoft Compliance Solutions (modulaarisuuden päivä 3 tunnit 6-8)
- Describe the compliance management capabilities in Microsoft:
- describe the compliance center.
- describe compliance manager.
- describe use and benefits of compliance score.
- Describe information protection and governance capabilities of Microsoft 365:
- describe data classification capabilities.
- describe the value of content and activity explorer.
- describe sensitivity labels.
- describe Retention Polices and Retention Labels.
- describe Records Management.
- describe Data Loss Prevention.
- Describe insider risk capabilities in Microsoft 365:
- describe Insider risk management solution.
- describe communication compliance.
- describe information barriers.
- describe privileged access management.
- describe customer lockbox.
- Describe the eDiscovery capabilities of Microsoft 365:
- describe the purpose of eDiscovery.
- describe the capabilities of the content search tool.
- describe the core eDiscovery workflow.
- describe the advanced eDisovery workflow.
- Describe the audit capabilities in Microsoft 365:
- describe the core audit capabilities of M365.
- describe purpose and value of Advanced Auditing.
- Describe resource governance capabilities in Azure:
- describe the use of Azure Resource locks.
- describe what Azure Blueprints is.
- define Azure Policy and describe its use cases.
- describe cloud adoption framework.