SC-900: Microsoft Security, Compliance and Identity
Christopher Nett
5:05:50
Description
Pass SC-900 | Elevate your Career
What You'll Learn?
- Describe security and compliance concepts
- Define identity concepts
- Describe function and identity types of Microsoft Entra ID
- Describe authentication capabilities of Microsoft Entra ID
- Describe access management capabilities of Microsoft Entra ID
- Describe identity protection and governance capabilities of Microsoft Entra
- Describe core infrastructure security services in Azure
- Describe security management capabilities of Azure
- Describe capabilities of Microsoft Sentinel
- Describe threat protection with Microsoft Defender XDR
- Describe Microsoft Service Trust Portal and privacy principles
- Describe compliance management capabilities of Microsoft Purview
- Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
- Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview
Who is this for?
What You Need to Know?
More details
DescriptionThis SC-900 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the SC-900: Microsoft Security, Compliance and Identity exam. This course systematically guides you from the basics to advanced concepts of Microsoft Security, Compliance and Identity.
By mastering Microsoft Security, Compliance and Identity, you're developing expertise in essential topics in today's cybersecurity landscape.
The course is always aligned with Microsoft's latest study guide and exam objectives:
Skills at a glance
Describe the concepts of security, compliance, and identity (10â15%)
Describe the capabilities of Microsoft Entra (25â30%)
Describe the capabilities of Microsoft security solutions (35â40%)
Describe the capabilities of Microsoft compliance solutions (20â25%)
Describe the concepts of security, compliance, and identity (10â15%)
Describe security and compliance concepts
Describe the shared responsibility model
Describe defense-in-depth
Describe the Zero Trust model
Describe encryption and hashing
Describe Governance, Risk, and Compliance (GRC) concepts
Define identity concepts
Define identity as the primary security perimeter
Define authentication
Define authorization
Describe identity providers
Describe the concept of directory services and Active Directory
Describe the concept of federation
Describe the capabilities of Microsoft Entra (25â30%)
Describe function and identity types of Microsoft Entra ID
Describe Microsoft Entra ID
Describe types of identities
Describe hybrid identity
Describe authentication capabilities of Microsoft Entra ID
Describe the authentication methods
Describe multi-factor authentication (MFA)
Describe password protection and management capabilities
Describe access management capabilities of Microsoft Entra ID
Describe Conditional Access
Describe Microsoft Entra roles and role-based access control (RBAC)
Describe identity protection and governance capabilities of Microsoft Entra
Describe Microsoft Entra ID Governance
Describe access reviews
Describe the capabilities of Microsoft Entra Privileged Identity Management
Describe Microsoft Entra ID Protection
Describe Microsoft Entra Permissions Management
Describe the capabilities of Microsoft security solutions (35â40%)
Describe core infrastructure security services in Azure
Describe Azure distributed denial-of-service (DDoS) Protection
Describe Azure Firewall
Describe Web Application Firewall (WAF)
Describe network segmentation with Azure virtual networks
Describe network security groups (NSGs)
Describe Azure Bastion
Describe Azure Key Vault
Describe security management capabilities of Azure
Describe Microsoft Defender for Cloud
Describe Cloud Security Posture Management (CSPM)
Describe how security policies and initiatives improve the cloud security posture
Describe enhanced security features provided by cloud workload protection
Describe capabilities of Microsoft Sentinel
Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)
Describe threat detection and mitigation capabilities in Microsoft Sentinel
Describe threat protection with Microsoft Defender XDR
Describe Microsoft Defender XDR services
Describe Microsoft Defender for Office 365
Describe Microsoft Defender for Endpoint
Describe Microsoft Defender for Cloud Apps
Describe Microsoft Defender for Identity
Describe Microsoft Defender Vulnerability Management
Describe Microsoft Defender Threat Intelligence (Defender TI)
Describe the Microsoft Defender portal
Describe the capabilities of Microsoft compliance solutions (20â25%)
Describe Microsoft Service Trust Portal and privacy principles
Describe the Service Trust Portal offerings
Describe the privacy principles of Microsoft
Describe Microsoft Priva
Describe compliance management capabilities of Microsoft Purview
Describe the Microsoft Purview compliance portal
Describe Compliance Manager
Describe the uses and benefits of compliance score
Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
Describe the data classification capabilities
Describe the benefits of Content explorer and Activity explorer
Describe sensitivity labels and sensitivity label policies
Describe data loss prevention (DLP)
Describe records management
Describe retention policies, retention labels, and retention label policies
Describe unified data governance solutions in Microsoft Purview
Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview
Describe insider risk management
Describe eDiscovery solutions in Microsoft Purview
Describe audit solutions in Microsoft Purview
Who this course is for:
- SOC Analyst
- Security Engineer
- Security Consultant
- Security Architect
- Security Manager
- Cloud Engineer
- Cloud Architect
- IT Manager
- CISO
This SC-900 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the SC-900: Microsoft Security, Compliance and Identity exam. This course systematically guides you from the basics to advanced concepts of Microsoft Security, Compliance and Identity.
By mastering Microsoft Security, Compliance and Identity, you're developing expertise in essential topics in today's cybersecurity landscape.
The course is always aligned with Microsoft's latest study guide and exam objectives:
Skills at a glance
Describe the concepts of security, compliance, and identity (10â15%)
Describe the capabilities of Microsoft Entra (25â30%)
Describe the capabilities of Microsoft security solutions (35â40%)
Describe the capabilities of Microsoft compliance solutions (20â25%)
Describe the concepts of security, compliance, and identity (10â15%)
Describe security and compliance concepts
Describe the shared responsibility model
Describe defense-in-depth
Describe the Zero Trust model
Describe encryption and hashing
Describe Governance, Risk, and Compliance (GRC) concepts
Define identity concepts
Define identity as the primary security perimeter
Define authentication
Define authorization
Describe identity providers
Describe the concept of directory services and Active Directory
Describe the concept of federation
Describe the capabilities of Microsoft Entra (25â30%)
Describe function and identity types of Microsoft Entra ID
Describe Microsoft Entra ID
Describe types of identities
Describe hybrid identity
Describe authentication capabilities of Microsoft Entra ID
Describe the authentication methods
Describe multi-factor authentication (MFA)
Describe password protection and management capabilities
Describe access management capabilities of Microsoft Entra ID
Describe Conditional Access
Describe Microsoft Entra roles and role-based access control (RBAC)
Describe identity protection and governance capabilities of Microsoft Entra
Describe Microsoft Entra ID Governance
Describe access reviews
Describe the capabilities of Microsoft Entra Privileged Identity Management
Describe Microsoft Entra ID Protection
Describe Microsoft Entra Permissions Management
Describe the capabilities of Microsoft security solutions (35â40%)
Describe core infrastructure security services in Azure
Describe Azure distributed denial-of-service (DDoS) Protection
Describe Azure Firewall
Describe Web Application Firewall (WAF)
Describe network segmentation with Azure virtual networks
Describe network security groups (NSGs)
Describe Azure Bastion
Describe Azure Key Vault
Describe security management capabilities of Azure
Describe Microsoft Defender for Cloud
Describe Cloud Security Posture Management (CSPM)
Describe how security policies and initiatives improve the cloud security posture
Describe enhanced security features provided by cloud workload protection
Describe capabilities of Microsoft Sentinel
Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)
Describe threat detection and mitigation capabilities in Microsoft Sentinel
Describe threat protection with Microsoft Defender XDR
Describe Microsoft Defender XDR services
Describe Microsoft Defender for Office 365
Describe Microsoft Defender for Endpoint
Describe Microsoft Defender for Cloud Apps
Describe Microsoft Defender for Identity
Describe Microsoft Defender Vulnerability Management
Describe Microsoft Defender Threat Intelligence (Defender TI)
Describe the Microsoft Defender portal
Describe the capabilities of Microsoft compliance solutions (20â25%)
Describe Microsoft Service Trust Portal and privacy principles
Describe the Service Trust Portal offerings
Describe the privacy principles of Microsoft
Describe Microsoft Priva
Describe compliance management capabilities of Microsoft Purview
Describe the Microsoft Purview compliance portal
Describe Compliance Manager
Describe the uses and benefits of compliance score
Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
Describe the data classification capabilities
Describe the benefits of Content explorer and Activity explorer
Describe sensitivity labels and sensitivity label policies
Describe data loss prevention (DLP)
Describe records management
Describe retention policies, retention labels, and retention label policies
Describe unified data governance solutions in Microsoft Purview
Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview
Describe insider risk management
Describe eDiscovery solutions in Microsoft Purview
Describe audit solutions in Microsoft Purview
Who this course is for:
- SOC Analyst
- Security Engineer
- Security Consultant
- Security Architect
- Security Manager
- Cloud Engineer
- Cloud Architect
- IT Manager
- CISO
User Reviews
Rating
Christopher Nett
Instructor's Courses
Udemy
View courses Udemy- language english
- Training sessions 55
- duration 5:05:50
- Release Date 2025/02/27