Microsoft Security, Compliance, and Identity Fundamentals Training (SC-900)

Course 8590

  • Duration: 1 day
  • Language: English
  • Level: Foundation

This Security, Compliance, and Identity Fundamentals Training course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Security, Compliance, and Identity Fundamentals Training Delivery Methods

  • In-Person

  • Online

Security, Compliance, and Identity Fundamentals Training Information

In this course, you will learn how to:

  • Describe basic concepts of security, compliance, and identity.
  • Describe the concepts and capabilities of Microsoft identity and access management solutions.
  • Describe the capabilities of Microsoft security solutions.
  • Describe the compliance management capabilities in Microsoft.

Prerequisites

  • General understanding of networking and cloud computing concepts.
  • General IT knowledge or any general experience working in an IT environment.
  • General understanding of Microsoft Azure and Microsoft 365.

Exam Information

This class prepares an attendee for the Microsoft Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

Security, Compliance, and Identity Fundamentals Training Outline

Learn about common security and compliance concepts that are foundational to Microsoft solutions. Topics include the shared responsibility and Zero Trust models, encryption, data residency and data sovereignty, and more.

After completing this module, you will be able to:

  • Describe the shared responsibility and the defense-in-depth security models.
  • Describe the Zero-Trust model.
  • Describe the concepts of encryption and hashing.
  • Describe some basic compliance concepts.

    Learn about the critical concepts of authentication and authorization and why identity is essential in securing corporate resources. You'll also learn about some identity-related services.

    After completing this module, you will be able to:

    • Understand the difference between authentication and authorization.
    • Describe the concept of identity as a security perimeter.
    • Describe identity-related services.

      Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service. Learn about Azure AD, its services and the types of identities it supports.

      After completing this module, you will be able to:

      • Describe what Azure AD does.
      • Describe the types of identities Azure AD supports.

        Learn about the authentication capabilities of Azure AD, multi-factor authentication, and how it improves security. You'll also learn about the password protection and management capabilities of Azure AD.

        After completing this module, you'll be able to:

        • Describe the authentication methods of Azure AD.
        • Describe multi-factor authentication in Azure AD.
        • Describe the password protection and management capabilities of Azure AD.

          An essential function of Azure AD is to manage access. Learn about the access management capabilities, its use cases, and benefits.

          After completing this module, you will be able to:

          • Describe Conditional Access in Azure AD.
          • Describe the benefits of Azure AD roles and role-based access control.

            Azure AD provides identity protection and governance capabilities. Learn about these capabilities, their use cases, and their benefits.

            After completing this module, you will be able to:

            • Describe the capabilities of identity governance in Azure.
            • Describe Privileged Identity Management.
            • Describe the capabilities of Azure Identity Protection.

              Learn about the capabilities Azure supports to protect your network, VMs, and your data.

              After completing this module, you will be able to:

              • Learn how Azure security capabilities can protect the network
              • Learn how Azure can protect your VMs
              • Learn how encryption on Azure can protect your data

                Learn about cloud security posture management and how Microsoft Defender for Cloud protects your cloud through secure scores, recommendations, and enhanced features that provide cloud workload protection. You'll also learn about security baselines in Azure.

                After completing this module, you'll be able to:

                • Describe cloud security posture management.
                • Describe the capabilities of Microsoft Defender for Cloud
                • Understand the Microsoft cloud security benchmark and the security baselines in Azure.

                  Learn about Microsoft Sentinel, a scalable, cloud-native security information event management (SIEM) and security orchestration automated response (SOAR) solution.

                  After completing this module, you will be able to:

                  • Describe the security concepts for SIEM and SOAR.
                  • Describe how Microsoft Sentinel provides integrated threat management.
                  • Describe the pricing models of Microsoft Sentinel.

                    Protect against cyber threats with Microsoft 365 Defender across endpoints, identities, email, and applications.

                    After completing this module, you'll be able to:

                    • Describe the Microsoft 365 Defender service.
                    • Describe how Microsoft 365 Defender provides integrated protection against sophisticated attacks.
                    • Describe and explore the Microsoft 365 Defender portal.

                      Microsoft runs on trust! Here, you'll explore the Service Trust Portal for content on how Microsoft delivers on our commitment to trust. You'll also learn about Microsoft Priva, a solution to help meet privacy goals.

                      After completing this module, you'll be able to:

                      • Describe the offerings of the Service Trust Portal.
                      • Describe Microsoft's Privacy principles.
                      • Describe Microsoft Priva.

                        Explore the Microsoft Purview compliance portal for organizations to manage their compliance needs. Learn about the Compliance Manager and Compliance Score, which can help organizations manage, simplify, and improve compliance.

                        After completing this module, you'll be able to:

                        • Describe the Microsoft Purview compliance portal.
                        • Describe Compliance Manager.
                        • Describe the use and benefits of compliance score.

                          Information protection and data lifecycle management in Microsoft Purview helps organizations classify, protect, and retain their data where it lives and wherever it goes. Learn about data classification capabilities, data loss prevention, and records management.

                          After completing this module, you'll be able to:

                          • Describe data classification capabilities.
                          • Describe records management.
                          • Describe data loss prevention.

                            Insider risks are a top concern for organizations. These risks can be challenging to identify and mitigate. Learn how Microsoft Purview enables organizations to identify, analyze, and remediate internal risks before they cause harm.

                            After completing this module, you'll be able to:

                            • Describe insider risk management
                            • Describe communication compliance
                            • Describe information barriers

                              Organizations may need to identify, collect, and audit information for legal, regulatory, or business reasons. Learn how the eDiscovery and audit capabilities of Microsoft Purview help organizations find relevant data quickly.

                              After completing this module, you'll be able to:

                              • Describe the eDiscovery capabilities of Microsoft Purview.
                              • Describe the auditing capabilities of Microsoft Purview.

                                Azure governance capabilities provide mechanisms and processes for organizations to control their applications and resources. Learn how Azure policy, Blueprints, and Microsoft Purview help organizations govern their resources and applications.

                                After completing this module, you'll be able to:

                                • Describe Azure Policy.
                                • Describe Azure Blueprints.
                                • Describe Microsoft Purview.

                                Need Help Finding The Right Training Solution?

                                Our training advisors are here for you.

                                Security, Compliance, and Identity Fundamentals Training FAQs

                                The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain.

                                Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

                                Chat With Us