logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Microsoft Security, Compliance, and Identity Fundamentals (SC-900T00)

SS Course: GK821306

Course Overview

TOP

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

                                                                  

Scheduled Classes

TOP
04/12/24 - GVT - Virtual Classroom - Virtual Instructor-Led
06/17/24 - GVT - Virtual Classroom - Virtual Instructor-Led
08/29/24 - GVT - Virtual Classroom - Virtual Instructor-Led
10/24/24 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP

Module 1: Describe security and compliance concepts

  • Describe the shared responsibility and the defense-in-depth security models.
  • Describe the Zero-Trust model.
  • Describe the concepts of encryption and hashing.
  • Describe some basic compliance concepts.

Module 2: Describe identity concepts

  • Understand the difference between authentication and authorization.
  • Describe the concept of identity as a security perimeter.
  • Describe identity-related services.

Module 3 : Describe the function and identity types of Microsoft Entra ID

  • Describe the function of Microsoft Entra ID.
  • Describe the types of identities Microsoft Entra ID supports.

Module 4 : Describe the authentication capabilities of Microsoft Entra ID

  • Describe the authentication methods of Microsoft Entra ID.
  • Describe multifactor authentication (MFA) in Microsoft Entra ID.
  • Describe self-service password reset (SSPR) in Microsoft Entra ID.
  • Describe the password protection and management capabilities of Microsoft Entra ID.

Module 5 : Describe access management capabilities of Microsoft Entra ID

  • Describe Conditional Access in Microsoft Entra ID.
  • Describe Microsoft Entra roles and role-based access control.

Module 6 : Describe the identity protection and governance capabilities of Azure AD

  • Describe the capabilities of identity governance in Azure.
  • Describe Privileged Identity Management.
  • Describe the capabilities of Azure Identity Protection.

Module 7 : Describe core infrastructure security services in Azure

  • Learn how Azure security capabilities can protect the network
  • Learn how Azure can protect your VMs
  • Learn how to keep secrets safe with Azure Key Vault

Module 8 : Describe the security management capabilities in Azure

  • Describe?Microsoft Defender for Cloud.
  • Describe how security policies and initiatives improve cloud security posture.
  • Describe how the three pillars of Microsoft Defender for Cloud protect against cyber threats and vulnerabilities.

Module 9 : Describe security capabilities of Microsoft Sentinel

  • Describe the security concepts for SIEM and SOAR.
  • Describe how Microsoft Sentinel provides threat detection and mitigation.
  • Describe Microsoft Security Copilot.

Module 10 : Describe threat protection with Microsoft Defender XDR

  • Describe the Microsoft Defender XDR service.
  • Describe how Microsoft Defender XDR provides integrated protection against sophisticated attacks.
  • Describe and explore Microsoft Defender portal.

Module 11 : Describe Microsoft s Service Trust portal and privacy capabilities

  • Describe the offerings of the Service Trust Portal.
  • Describe Microsoft's Privacy principles.
  • Describe Microsoft Priva.

Module 12 : Describe the compliance management capabilities in Microsoft Purview

  • Describe the Microsoft Purview compliance portal.
  • Describe Compliance Manager.
  • Describe the use and benefits of compliance score.

Module 13 : Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview

  • Describe data classification capabilities.
  • Describe records management.
  • Describe data loss prevention.
  • Describe unified data governance.

Module 14 : Describe the insider risk capabilities in Microsoft Purview

  • Describe insider risk management
  • Describe communication compliance

Module 15 : Describe the eDiscovery and Audit capabilities in Microsoft Purview

  • Describe the eDiscovery capabilities of Microsoft Purview.
  • Describe the auditing capabilities of Microsoft Purview.

    Prerequisites

    TOP

    Before attending this course, students must have:

    • General understanding of networking and cloud computing concepts.
    • General IT knowledge or any general experience working in an IT environment.
    • General understanding of Microsoft Azure and Microsoft 365.

      Who Should Attend

      TOP

      The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.