Cademy logoCademy Marketplace

Course Images

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 7 hours 7 minutes

  • All levels

Description

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

Identity is the new perimeter. Application developers and infrastructure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it. This course begins with the concepts of security, compliance, and identity. You'll look at security methodologies, security concepts, and Microsoft Security and compliance principles. You'll learn the concepts of zero trust methodology, shared responsibility model, and defense in depth. After that, you'll cover Microsoft Identity and Access Management Solutions. You'll look at identity principles and concepts; basic identity and identity types; authentication, access management, and identity protection; and governance capabilities of Azure Active Directory. Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure and Azure Sentinel, Microsoft 365 Defender, Intune, and Microsoft 365. Finally, you'll look at Microsoft Compliance Solutions. You'll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery, and audit. By the end of this course, you will get hands-on knowledge to pass the Microsoft SC 900 exam. The resource files are available on the GitHub repository at https://github.com/PacktPublishing/SC-900-Microsoft-Security-Compliance-Identity-Fundamentals

What You Will Learn

Learn the concepts of security, compliance, and identity
Explore Microsoft Identity and Access Management Solution
Identify the capabilities of Microsoft Security solutions
Identify the capabilities of Microsoft Compliance solutions
Check the concepts of zero trust methodology
Look at the capabilities in Microsoft 365

Audience

This course is for a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.

Individuals looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services can also benefit from this course.

Basic knowledge of security, compliance, and identity, and familiarity with Microsoft Azure and Microsoft 365 will be required.

Concepts of Azure Active Directory would be helpful but not mandatory.

Approach

This course is mapped exactly as per the syllabus of Microsoft SC 900 exam and designed for individuals with a passion to learn and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

Key Features

In-depth understanding of the concepts of information security, compliance, and identity * The course structure is exactly mapped with the Microsoft SC 900 exam * Comprehensive and hands-on guide with resource files

Github Repo

https://github.com/PacktPublishing/SC-900-Microsoft-Security-Compliance-Identity-Fundamentals

About the Author

Anand Rao Nednur

Anand Rao Nednur is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure, AWS, and GCP) but is also well-versed with IAM, security, and automation with PowerShell and Python. In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in lab examinations and securing certifications. Anand is also a certified seasoned professional holding several certifications and has delivered instructor-led training in several states in India as well as several countries such as the USA, Bahrain, Kenya, and UAE. He has worked as a Microsoft-certified trainer globally for major corporate clients.

Course Outline

1. Introduction to the Course

1. Course Introduction

This video provides focus areas about this course and overview of the 4 different modules.


2. Module 1 - Describe the Concepts of Security, Compliance, and Identity

1. Security Concepts and Methodologies - Introduction

This video provides an introduction to security concepts and methodologies.

2. Zero Trust - Guidelines

This video explains about the zero trust guidelines.

3. Zero Trust - Six Foundational Pillars

This video demonstrates zero trust - six foundational pillars.

4. The Shared Responsibility Models

This video explains the shared responsibility models.

5. Defense in Depth Strategy

This video explains the defense in depth strategy.

6. The CIA Triad

This video talks about the CIA triad.

7. Describe Common Threats

This video describes the common threats.

8. Describe Encryption, Hashing, and Signing - I

This is first of the two-part video that talks about encryption, hashing, and signing.

9. Describe Encryption, Hashing, and Signing - II

This is second of the two-part video that talks about encryption, hashing, and signing.

10. Summary

This video provides a summary for the concepts learned so far.

11. Microsoft Security and Compliance principles - Introduction

This video provides an introduction to the Microsoft Security and Compliance principles.

12. Microsoft's Privacy Principles

This video explains Microsoft's privacy principles.

13. What is Service Trust Portal

This video explains the Service Trust Portal.

14. Azure Compliance Documentation

This video goes through the Azure compliance documentation.

15. Module 1: Section Summary

This video provides a summary of the section.


3. Module 2 - Describe the Concepts and Capabilities of Microsoft Identity and Access

1. Describe Identity Concepts - Introduction

This video provides an introduction to identity concepts.

2. Common Identity Attacks

This video focuses on the common identity attacks.

3. Identity as a Security perimeter

This video explains identity as a security perimeter.

4. Four Pillars of Identity

This video explains the four pillars of identity.

5. Modern Authentication and the Role of Identity Provider

This video explains modern authentication and the role of identity provider.

6. SSO and the Concept of Federation

This video talks about SSO and explains the concept of Federation.

7. The Concept of Directory Services and Active Directory

This video explains the concept of directory services and Active Directory.

8. Describe the Basic Services and Identity Types - Introduction

This video provides an introduction to the basic services and Identity types.

9. Describe Azure Active Directory

This video talks about the Azure Active directory.

10. Azure AD Editions

This video explains the Azure AD editions.

11. Describe the Azure AD Identity types

This video focuses on the Azure AD Identity types.

12. Difference between System Assigned and User Assigned Managed Identity

This video talks about the difference between system assigned and user assigned managed identity.

13. Describe the Types of External Identities

This video describes the types of external identities.

14. Describe the Concept of Hybrid Identities

This video describes the concept of hybrid identities.

15. Describe the Authentication Capabilities of Azure - Introduction

This video provides an introduction to the authentication capabilities of Azure.

16. Describe the Different Authentication Methods

This video describes the different authentication methods.

17. Security Defaults and MFA

This video explains the security defaults and MFA.

18. MFA in Azure AD - Part 1

This is first of the two-part video that focuses on MFA in Azure AD.

19. Video 3.2: MFA in Azure AD - Part 2

This is second of the two-part video that focuses on MFA in Azure AD.

20. Windows Hello

This video focuses on the Windows Hello authentication feature.

21. Why is Windows Hello Safer than a Password

This video explains why Windows Hello is safer than a password.

22. Self-Service Password Reset in Azure AD

This video is about the self-service password reset in Azure AD.

23. Password Protection and Management Capabilities of Azure AD

This video talks about password protection and management capabilities oof Azure AD.

24. Protecting against Password Spray

This video explains how to protect against password spray.

25. Hybrid security

This video explains about the hybrid security feature.

26. Describe the Access Management Capabilities of Azure AD

This video demonstrates about the Access management capabilities of Azure AD.

27. Conditional Access in Azure AD

This is first of the three-part video that focuses on conditional access in Azure AD.

28. Conditional Access in Azure AD - II

This is second of the three-part video that focuses on conditional access in Azure AD.

29. Conditional Access in Azure AD - III

This is third of the three-part video that focuses on conditional access in Azure AD.

30. Azure AD Roles and Custom Roles

This video focuses on the Azure AD roles and custom roles.

31. Summary

This video provides a summary for the concepts learned so far.

32. Describe the Identity Protection and Governance Capabilities of Azure AD

This video focuses on identity protection and governance capabilities of Azure AD.

33. What is Identity Governance

This video explains about the identity governance.

34. What is Identity Lifecycle

This video explains the identity lifecycle.

35. Access Lifecycle

This video talks about Access lifecycle.

36. Privileged Access lifecycle

This video talks about privileged Access lifecycle.

37. What is Entitlement Management

This video explains entitlement management.

38. Azure AD Access Reviews

This video talks about Azure AD Access reviews.

39. Azure AD Terms of Use

This video focuses on the terms of use of Azure AD.

40. Capabilities of Privileged Identity Management

This video demonstrates the capabilities of privileged identity management.


4. Module 3 - Describe the Capabilities of Microsoft Security Solutions

1. Module Introduction

This video provides an introduction to this module.

2. Network Security Groups

This video explains the network security groups.

3. Inbound and Outbound Security Rules

This video focuses on the inbound and outbound security rules.

4. What is DDOS

This video explains Distributed Denial of Service Attacks (DDOS).

5. Azure DDOS Protection Plans and Pricing

This video explains DDOS protection plans and pricing.

6. Azure Firewall

This video talks about Azure Firewall.

7. Azure Bastion Host

This video talks about Azure Bastion Host.

8. Web Application Firewall

This video focuses on Web Application Firewall.

9. Azure Encryption

This video explains Azure Encryption.

10. Azure Key Vault

This video explains Azure Key Vault.

11. Lesson Summary

This video provides a summary for the concepts learned so far.

12. Cloud Security Posture Management

This video focuses on cloud security posture management.

13. Azure Security Center

This video talks about Azure Security Center.

14. Azure Security Center - Features

This video demonstrates the features of Azure Security Center.

15. Azure Security Center - Security Score

This video talks about security score of Azure Security Center.

16. Azure Defender

This video talks about Azure Defender.

17. Azure Security Benchmark

This video explains Azure Security Benchmark.

18. Azure Security Center - Pricing Tier

This video talks about the pricing tier of Azure Security Center.

19. Summary

This video provides a summary of the concepts learned so far.

20. Describe the Security Capabilities of Azure Sentinel

This video helps with understanding the security capabilities of Azure Sentinel.

21. Define the Concepts of SIEM, SOAR, and XDR

This video helps with defining the concepts of SIEM, SOAR, and XDR.

22. Azure Sentinel

This video explains Azure Sentinel.

23. Azure Sentinel Features

This video talks about the features of Azure Sentinel.

24. Azure Sentinel - Pricing

This video focuses on the pricing part of the Azure Sentinel.

25. Summary

This video provides a summary for the concepts learned so far.

26. Describe the Threat Protection Capabilities of Microsoft 365 - Introduction

This video provides an introduction to the threat protection capabilities of Microsoft 365.

27. Microsoft 365 Defender Services - Introduction

This video provides an introduction to the Microsoft 365 Defender services.

28. Microsoft Defender for Identity

This video focuses on how the Microsoft Defender protects identity.

29. Microsoft Defender for O365

This video focuses on how the Microsoft Defender protects Office 365.

30. Microsoft Defender for Endpoint

This video focuses on how the Microsoft Defender protects endpoints.

31. What is CASB

This video explains about Cloud Access Security Broker (CASB).

32. The Cloud App Security Framework

This video explains the cloud app security framework.

33. Microsoft Cloud App Security Architecture

This video talks about Microsoft Cloud App Security architecture.

34. O365 Cloud App Security and Azure AD Cloud App Discovery

This video is about O365 Cloud App security and Azure AD Cloud App Discovery.

35. Summary

This video provides a summary for the concepts learned so far.

36. Security Management Capabilities of M365 - Introduction

This video provides an introduction to the security management capabilities of M365.

37. Microsoft 365 Security Center - Introduction

This video provides an introduction to the Microsoft 365 Security Center.

38. How to Use Microsoft Secure Score

This video guides you on how to use Microsoft Secure Score.

39. Differences Between Azure and Microsoft Secure Score

This video explains the differences between Azure and Microsoft Secure Score.

40. Managing Incidents

This video talks about managing incidents.

41. Summary

This video provides a summary of the concepts learned so far.

42. Describe Endpoint Security with Microsoft Intune - Introduction

This video provides an introduction to the endpoint security with Microsoft Intune.

43. What is Intune

This video explains what Intune is.

44. MDM and MAM

This video explains Mobile Device management (MDM) and Mobile Application Management (MAM).

45. Endpoint Security with Intune

This video focuses on endpoint security with Intune.

46. Summary

This video provides a summary of the concepts learned so far.


5. Module 4 - Describe the Capabilities of Microsoft Compliance Solutions

1. Module introduction

This video provides an introduction to this module.

2. Common Compliance Needs

This video talks about common compliance needs.

3. Common Compliance Regulations

This video explains common compliance regulations.

4. Compliance Center

This video explains about compliance center.

5. What is Compliance Manager

This video talks about compliance manager.

6. What are Controls

This video explains about the controls.

7. What are Assessments

This video focuses on assessments.

8. Understand Compliance score

This video helps you understand compliance score.

9. Summary

This video provides a summary of the concepts learned so far.

10. The Information Protection and Governance Capabilities of Microsoft 365

This video helps you understand the information protection and governance capabilities of Microsoft 365.

11. Know Your Data, Protect Your Data, and Govern Your Data

This video helps you with knowing your data, protecting your data, and governing your data.

12. Data Classification Capabilities of Compliance Center

This video explains the data classification capabilities of compliance center.

13. Content Explorer and Activity Explorer

This video talks about Content Explorer and Activity Explorer.

14. Sensitivity Labels

This video talks about sensitivity labels.

15. Label Policies

This video talks about label policies.

16. Data Loss Prevention

This video explains data loss prevention.

17. Data Loss Prevention on Endpoints and Teams

This video focuses on data loss prevention on endpoints and teams.

18. Retention Polices and Retention Labels

This video explains retention polices and retention labels.

19. Records Management

This video talk about records management.

20. Summary

This video provides a summary of the concepts learned so far.

21. The Insider Risk Capabilities in Microsoft - Introduction

This video provides an introduction to the insider risk capabilities in Microsoft.

22. Insider Risk Management

This video talks about insider risk management.

23. Insider Risk Management Workflow

This video focuses on the insider risk management workflow.

24. Communications Compliance

This video helps you understand communications compliance.

25. Information Barriers in Microsoft Teams

This video shows information barriers in Microsoft Teams.

26. Privileged Access Management

This video explains privileged access management.

27. Customer Lockbox

This video talks about Customer Lockbox.

28. Summary

This video provides a summary of the concepts learned so far.

29. eDiscovery Capabilities of Microsoft M365 - Introduction

This video provides an introduction to the eDiscovery capabilities of Microsoft M365.

30. The Purpose of eDiscovery

This video explores the purpose of eDiscovery.

31. The Capabilities of the Content Search

This video shows the capabilities of the content search.

32. The Core eDiscovery Workflow

This video explains the core eDiscovery workflow.

33. The Advanced eDiscovery Workflow

This video explains the advanced eDiscovery workflow.

34. Summary

This video provides a summary of the concepts learned so far.

35. The Audit Capabilities of Microsoft 365 - Introduction

This video provides an introduction to the audit capabilities of Microsoft 365.

36. The Core Audit Capabilities of M365

This video explains the core audit capabilities of M365.

37. What are the Advanced Auditing Capabilities

This video focuses on the advanced auditing capabilities.

38. High Bandwidth for Office 365 API Activities

This video talks about the high bandwidth for Office 365 API activities.

39. Summary

This video provides a summary of the concepts learned so far.

40. Describe the Resource Governance Capabilities - Introduction

This video provides an introduction to the resource governance capabilities.

41. Resource Manager - Locks

This video talks about the locks in Resource Manager.

42. What is Azure Blueprint

This video focuses on Azure Blueprint.

43. What is Azure Policy

This video navigates through Azure Policy.

44. Difference between Azure Policy and RBAC

This video helps to differentiate between Azure Policy and Azure Role-Based Access Control (RBAC).

45. Cloud Adoption Framework

This video explains the Cloud Adoption framework.

Course Content

  1. SC-900: Microsoft Security, Compliance, and Identity Fundamentals

About The Provider

Packt
Packt
Birmingham
Founded in 2004 in Birmingham, UK, Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and i...
Read more about Packt

Tags

Reviews