Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC900)
Details
This one-day Microsoft certified course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
This training is a comprehensive preparation for the SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam to earn the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.
Outline
Module 1: Describe security and compliance concepts
- Describe the shared responsibility model
- Describe defense in depth
- Describe the Zero Trust model
- Describe encryption and hashing
- Describe compliance concepts
Module 2: Describe identity concepts
- Define authentication and authorization
- Define Identity as the primary security perimeter
- Describe the role of the identity provider
- Describe the concept of directory services and Active Directory
- Describe the concept of Federation
Module 3: Describe the function and identity types of Microsoft Entra ID
- Describe Microsoft Entra ID
- Describe types of identities
- Describe hybrid identity
- Describe external identities
Module 4: Describe the authentication capabilities of Microsoft Entra ID
- Describe authentication methods
- Describe multifactor authentication
- Describe self-service password reset
- Describe password protection and management capabilities
Module 5: Describe access management capabilities of Microsoft Entra ID
- Describe Conditional Access
- Describe Microsoft Entra roles and role-based access control (RBAC)
Module 6: Describe the identity protection and governance capabilities of Microsoft Entra
- Describe Microsoft Entra ID Governance
- Describe access reviews
- Describe entitlement management
- Describe the capabilities of Privileged identity Management
- Describe Microsoft Entra ID Protection
- Describe Microsoft Entra Permissions Management
- Describe Microsoft Entra Verified ID
Module 7: Describe core infrastructure security services in Azure
- Describe Azure DDoS protection
- Describe Azure Firewall
- Describe Web Application Firewall
- Describe network segmentation in Azure
- Describe Azure Network Security groups
- Describe Azure Bastion
- Describe Azure Key Vault
Module 8: Describe the security management capabilities in Azure
- Describe Microsoft Defender for Cloud
- Describe how security policies and initiatives improve cloud security posture
- Describe Cloud security posture management
- Describe the enhanced security of Microsoft Defender for Cloud
- Describe DevOps security management
Module 9: Describe security capabilities of Microsoft Sentinel
- Define the concepts of SIEM and SOAR
- Describe threat detection and mitigation capabilities in Microsoft Sentinel
- Describe Microsoft Security Copilot
Module 10: Describe threat protection with Microsoft Defender XDR
- Describe Microsoft 365 Defender services
- Describe Microsoft Defender for Office 365
- Describe Microsoft Defender for Endpoint
- Describe Microsoft Defender for Cloud Apps
- Describe Microsoft Defender for Identity
- Describe the Microsoft 365 Defender portal
Module 11: Describe Microsoft’s Service Trust portal and privacy capabilities
- Describe the offerings of the Service Trust portal
- Describe Microsoft's privacy principles
- Describe Microsoft Priva
Module 12: Describe the compliance management capabilities in Microsoft Purview
- Describe the Microsoft Purview compliance portal
- Describe Compliance Manager
- Describe use and benefits of compliance score
- Knowledge check
Module 13: Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview
- Know your data, protect your data, and govern your data
- Describe the data classification capabilities of the compliance portal
- Describe sensitivity labels and policies
- Describe data loss prevention
- Describe retention policies and retention labels
- Describe records management
- Describe the Microsoft Purview unified data governance solution
Module 14: Describe the insider risk capabilities in Microsoft Purview
- Describe insider risk management
- Describe communication compliance
Module 15: Describe the eDiscovery and Audit capabilities in Microsoft Purview
- Describe the eDiscovery solutions in Microsoft Purview
- Describe the audit solutions in Microsoft Purview
Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, and PeopleCert.
Eccentrix has the most comprehensive offer in terms of Microsoft accredited trainings. In addition, a complete set of benefits comes with each enrollment to our trainings. Since the very beginning of our operations, Eccentrix has been a Microsoft Partner in learning following the numerous changes in the learning paths and programs, notably for certification-based courses.
EC-Council
Eccentrix has the highest level of EC-Council partnership, delivering the complete portfolio of EC-Council cybersecurity courses since 2017. With an EC-Council course comes a set of benefits that greatly help our participants get certified. EC-Council is a key vendor for Eccentrix, since we have a strong focus on cybersecurity courses and that relationships just gets better over the years. ...