We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC900)

Online Training by  ECCENTRIX
Inquire Now
Online / Training

Details

This one-day Microsoft certified course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

This training is a comprehensive preparation for the SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam to earn the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

Outline

Module 1: Describe security and compliance concepts

  • Describe the shared responsibility model
  • Describe defense in depth
  • Describe the Zero Trust model
  • Describe encryption and hashing
  • Describe compliance concepts

Module 2: Describe identity concepts

  • Define authentication and authorization
  • Define Identity as the primary security perimeter
  • Describe the role of the identity provider
  • Describe the concept of directory services and Active Directory
  • Describe the concept of Federation

Module 3: Describe the function and identity types of Microsoft Entra ID

  • Describe Microsoft Entra ID
  • Describe types of identities
  • Describe hybrid identity
  • Describe external identities

Module 4: Describe the authentication capabilities of Microsoft Entra ID

  • Describe authentication methods
  • Describe multifactor authentication
  • Describe self-service password reset
  • Describe password protection and management capabilities

Module 5: Describe access management capabilities of Microsoft Entra ID

  • Describe Conditional Access
  • Describe Microsoft Entra roles and role-based access control (RBAC)

Module 6: Describe the identity protection and governance capabilities of Microsoft Entra

  • Describe Microsoft Entra ID Governance
  • Describe access reviews
  • Describe entitlement management
  • Describe the capabilities of Privileged identity Management
  • Describe Microsoft Entra ID Protection
  • Describe Microsoft Entra Permissions Management
  • Describe Microsoft Entra Verified ID

Module 7: Describe core infrastructure security services in Azure

  • Describe Azure DDoS protection
  • Describe Azure Firewall
  • Describe Web Application Firewall
  • Describe network segmentation in Azure
  • Describe Azure Network Security groups
  • Describe Azure Bastion
  • Describe Azure Key Vault

Module 8: Describe the security management capabilities in Azure

  • Describe Microsoft Defender for Cloud
  • Describe how security policies and initiatives improve cloud security posture
  • Describe Cloud security posture management
  • Describe the enhanced security of Microsoft Defender for Cloud
  • Describe DevOps security management

Module 9: Describe security capabilities of Microsoft Sentinel

  • Define the concepts of SIEM and SOAR
  • Describe threat detection and mitigation capabilities in Microsoft Sentinel
  • Describe Microsoft Security Copilot

Module 10: Describe threat protection with Microsoft Defender XDR

  • Describe Microsoft 365 Defender services
  • Describe Microsoft Defender for Office 365
  • Describe Microsoft Defender for Endpoint
  • Describe Microsoft Defender for Cloud Apps
  • Describe Microsoft Defender for Identity
  • Describe the Microsoft 365 Defender portal

Module 11: Describe Microsoft’s Service Trust portal and privacy capabilities

  • Describe the offerings of the Service Trust portal
  • Describe Microsoft's privacy principles
  • Describe Microsoft Priva

Module 12: Describe the compliance management capabilities in Microsoft Purview

  • Describe the Microsoft Purview compliance portal
  • Describe Compliance Manager
  • Describe use and benefits of compliance score
  • Knowledge check

Module 13: Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview

  • Know your data, protect your data, and govern your data
  • Describe the data classification capabilities of the compliance portal
  • Describe sensitivity labels and policies
  • Describe data loss prevention
  • Describe retention policies and retention labels
  • Describe records management
  • Describe the Microsoft Purview unified data governance solution

Module 14: Describe the insider risk capabilities in Microsoft Purview

  • Describe insider risk management
  • Describe communication compliance

Module 15: Describe the eDiscovery and Audit capabilities in Microsoft Purview

  • Describe the eDiscovery solutions in Microsoft Purview
  • Describe the audit solutions in Microsoft Purview
Reviews
Be the first to write a review about this course.
Write a Review
Since 2011, Eccentrix has been providing technology skills enhancement solutions for businesses. Our mission is to promote the importance of continuing education to computer users and professionals through many programs that we have implemented and improved over the years.

Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, and PeopleCert.

Microsoft

Eccentrix has the most comprehensive offer in terms of Microsoft accredited trainings. In addition, a complete set of benefits comes with each enrollment to our trainings. Since the very beginning of our operations, Eccentrix has been a Microsoft Partner in learning following the numerous changes in the learning paths and programs, notably for certification-based courses.

EC-Council

Eccentrix has the highest level of EC-Council partnership, delivering the complete portfolio of EC-Council cybersecurity courses since 2017. With an EC-Council course comes a set of benefits that greatly help our participants get certified. EC-Council is a key vendor for Eccentrix, since we have a strong focus on cybersecurity courses and that relationships just gets better over the years. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.