SC-900: Microsoft Security, Compliance, & Identity with SIMS

Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7

SC-900: Microsoft Security, Compliance, & Identity with SIMS
SC-900: Microsoft Security, Compliance, & Identity with SIMS

SC-900: Microsoft Security, Compliance, & Identity with SIMS free download

Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7

We really hope you'll agree, this training is way more then the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • Having a Solid Foundation of Active Directory Domains

  • Having a Solid Foundation of RAS, DMZ, and Virtualization

  • Having a Solid Foundation of the Microsoft Cloud Services

  • Questions for John Christopher

Performing hands on activities

  • IMPORTANT Using Assignments in the course

  • Creating a free Microsoft 365 Azure AD Account

  • Getting your free Azure credit

Describe security and compliance concepts

  • Describe the shared responsibility model

  • Describe defense in depth

  • Describe the Zero-Trust model

  • Describe encryption and hashing

  • Describe compliance concepts

Define identity concepts

  • Define identity as the primary security perimeter

  • Define authentication

  • Define authorization

  • Describe identity providers and the concept of Federation

  • Describe Active Directory

Describe the basic identity services and identity types of Azure AD

  • Describe Azure AD

  • Describe Azure AD identities including external identities

  • Describe hybrid identity

Describe the authentication capabilities of Azure AD

  • Describe the authentication methods available in Azure AD

  • Describe Multi-factor Authentication

  • Describe self-service password reset

  • Describe password protection and management capabilities available in Azure AD

Describe access management capabilities of Azure AD

  • Describe conditional access

  • Creating conditional access polies

  • Describe the benefits of Azure AD roles

  • Describe the benefits of Azure AD role-based access control

Describe the identity protection and governance capabilities of Azure AD

  • Describe identity governance in Azure AD

  • Describe entitlement management

  • Describe access reviews

  • Describe the capabilities of Azure AD Privileged Identity Management (PIM)

  • Implementing Azure AD Privileged Identity Management (PIM)

  • Describe Azure AD Identity Protection

Describe basic security capabilities in Azure

  • Visualizing general Azure networking

  • Describe Azure DDoS protection

  • Describe Azure Firewall

  • Describe Network Segmentation with VNet

  • Describe Azure Network Security groups

  • Create a virtual machine in Azure

  • Describe Azure Bastion and JIT Access

  • Describe ways Azure encrypts data

Describe security management capabilities of Azure

  • Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)

  • Describe the enhanced security features of Microsoft Defender for Cloud

  • Describe security baselines for Azure

Describe security capabilities of Microsoft Sentinel

  • Define the concepts of security information and event management (SIEM) and SOAR

  • Describe threat detection and mitigation capabilities in Microsoft Sentinel

Describe threat protection with Microsoft 365 Defender

  • Describe Microsoft 365 Defender services

  • Describe Microsoft Defender for Office 365

  • Describe Microsoft Defender for Endpoint

  • Describe Microsoft Defender for Cloud Apps

  • Using Microsoft Defender for Cloud Apps for policy creation

  • Describe Microsoft Defender for Identity

  • Basics of setting up Microsoft Defender for Identity

  • Describe the Microsoft 365 Defender portal

Describe Microsoft’s Service Trust Portal and privacy principles

  • Describe the offerings of the Service Trust portal

  • Describe Microsoft’s privacy principles

Describe the compliance management capabilities of Microsoft Purview

  • Describe the Microsoft Purview compliance portal

  • Describe compliance manager

  • Describe the use and benefits of compliance score

Describe information protection & data lifecycle management of Microsoft Purview

  • Describe data classification capabilities

  • Describe the benefits of content explorer and activity explorer

  • Describe sensitivity labels

  • Basics of using sensitivity labels

  • Describe Data Loss Prevention (DLP)

  • Basics of using Data Loss Prevention (DLP)

  • Describe Records Management

  • Describe Retention Polices and Retention Labels

Describe insider risk capabilities in Microsoft Purview

  • Describe Insider Risk Management

  • Describe communication compliance

  • Describe information barriers

Describe resource governance capabilities in Azure

  • Describe Azure Policy

  • Describe Azure Blueprints

  • Describe the capabilities of the Microsoft Purview governance portal

Finishing Up

  • Where do I go from here?