SC-900: Microsoft Security, Compliance, and Identity Fundamentals

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Course Introduction

  • 1. Course Introduction
    4m

Module 1 Describe the concepts of security, compliance, and identity

  • 1. Chapter 1 : Security concepts and methodologies - Introduction
    1m
  • 2. Zero Trust - Guidelines
    3m
  • 3. Zero Trust - Six Foundational Pillars
    4m
  • 4. The Shared Responsibility Model
    6m
  • 5. Defence in Depth Strategy
    3m
  • 6. The CIA Triad
    6m
  • 7. Describe Common Threats
    6m
  • 8. Describe Encryption , hashing and Signing -I
    4m
  • 9. Describe Encryption , hashing and Signing - II
    4m
  • 10. Lesson Conclusion
    1m
  • 11. Microsoft security and compliance principles - Lesson Introduction
    1m
  • 12. Microsoft's Privacy Principles
    2m
  • 13. What is Service Trust Portal
    2m
  • 14. Azure Compliance Documentation
    1m
  • 15. Module 1 : Chapter Summary
    1m

Module 2 Describe the concepts & capabilities of Microsoft identity and access

  • 1. Describe Identity Concepts - Introduction
    1m
  • 2. Common Identity Attacks
    5m
  • 3. Identity As a Security perimeter
    4m
  • 4. Four Pillars of Identity
    6m
  • 5. Modern Authentication and the role of Identity provider
    3m
  • 6. SSO and the Concept of Federation
    4m
  • 7. The concept of directory services and Active Directory
    3m
  • 8. Describe the basic services and identity types - Introduction
    1m
  • 9. Describe Azure Active Directory
    3m
  • 10. Azure AD Editions
    4m
  • 11. Describe the Azure AD identity types
    8m
  • 12. Difference between System assigned and user assigned managed Identity
    3m
  • 13. Describe the types external identities
    5m
  • 14. Describe the concept of hybrid Identities
    4m
  • 15. Describe the authentication capabilities of Azure - Introduction
    1m
  • 16. Describe the different authentication methods
    3m
  • 17. Security defaults and MFA
    4m
  • 18. MFA in Azure AD - Part 1
    2m
  • 19. MFA in Azure AD - Part 2
    3m
  • 20. Windows Hello
    3m
  • 21. Why is Windows Hello safer than a password
    2m
  • 22. Self-service password reset in Azure AD
    5m
  • 23. Password protection and management capabilities of Azure AD
    5m
  • 24. Protecting against password spray
    2m
  • 25. Hybrid security
    2m
  • 26. Describe the access management capabilties of AzureAD
    1m
  • 27. Conditional access in Azure AD
    4m
  • 28. Conditional access in Azure AD - II
    6m
  • 29. Conditional access in Azure AD - III
    3m
  • 30. Azure AD Roles & Custom Roles
    3m
  • 31. Chapter Summary
    1m
  • 32. Describe the identity protection and governance capabilties of Azure AD
    1m
  • 33. What is Identity Governance
    1m
  • 34. What is Identity lifecycle
    4m
  • 35. Access Lifecycle
    2m
  • 36. Privileged access lifecycle
    2m
  • 37. What is Entitlement management
    3m
  • 38. Azure AD access reviews
    3m
  • 39. Azure AD terms of use
    2m
  • 40. Capabilities of Privileged identity Management
    2m

Module 3 : Describe the capabilties of Microsoft security solutions

  • 1. Module Introduction
    2m
  • 2. Network security groups
    3m
  • 3. Inbound and outbound security rules
    4m
  • 4. What is DDOS
    3m
  • 5. Azure DDOS protection plans and pricing
    3m
  • 6. Azure Firewall
    4m
  • 7. Azure Bastion Host
    4m
  • 8. Web Application Firewall
    2m
  • 9. Azure Encryption
    3m
  • 10. Azure Key Vault
    2m
  • 11. Lesson Summary
    2m
  • 12. Cloud Security Posture management
    4m
  • 13. Azure Security Center
    4m
  • 14. Azure Security Center - Features
    4m
  • 15. Azure Security Center - Security Score
    2m
  • 16. Azure defender
    6m
  • 17. Azure Security Benchmark
    5m
  • 18. Azure Security Center - Pricing Tier
    1m
  • 19. Chapter Summary
    1m
  • 20. Describe the security capabilities of Azure Sentinel
    2m
  • 21. Define the concepts of SIEM, SOAR and XDR
    6m
  • 22. Azure Sentinel
    2m
  • 23. Azure Sentinel Features
    6m
  • 24. Azure Sentinel - Pricing
    1m
  • 26. Describe the threat protection capabilities of - Introduction
    2m
  • 27. Microsoft 365 Defender services - Introduction
    3m
  • 28. Microsoft Defender for Identity
    5m
  • 29. Microsoft Defender for O365
    5m
  • 30. Microsoft Defender for Endpoint
    4m
  • 31. What is CASB
    3m
  • 32. The Cloud App Security framework
    2m
  • 33. Microsoft Cloud App Security architecture
    3m
  • 34. O365 Cloud App security And Azure AD Cloud App Discovery
    1m
  • 36. Security Management Capabilties of M365 - Introduction
    2m
  • 37. Microsoft 365 Security Center - Intro
    5m
  • 38. How to use Microsoft Secure Score
    3m
  • 39. Differences between the Azure and Microsoft Secure Score
    1m
  • 40. Managing Incidents
    2m
  • 42. Describe endpoint security with Microsoft Intune - Introduction
    1m
  • 43. What is Intune
    2m
  • 44. MDM and MAM
    3m
  • 45. Endpoint Security with Intune
    7m

Module 4 : Describe the capabilities of Microsoft compliance solutions

  • 1. Module 4 introduction
    1m
  • 2. Common Compliance Needs
    2m
  • 3. Common compliance regulations
    3m
  • 4. Compliance Center
    2m
  • 5. What is Compliance Manager
    2m
  • 6. What are Controls
    1m
  • 7. What are Assesments
    2m
  • 8. Understand Compliance score
    3m
  • 9. Chapter Summary
    1m
  • 10. The information protection and governance capabiliities of Microsoft 365
    1m
  • 11. Know your data, protect your data, and govern your data
    3m
  • 12. Data classification capabilities of compliance Center
    5m
  • 13. Content Explorer and Activity Explorer
    4m
  • 14. Sensitivity labels
    5m
  • 15. Label Policies
    3m
  • 16. Data Loss Prevention
    3m
  • 17. Data Loss Prevention on endpoints and teams
    2m
  • 18. Retention Polices and Retention Labels
    4m
  • 19. Records Management
    3m
  • 21. The insider risk capabilities in Microsoft - Introduction
    1m
  • 22. Insider Risk management
    2m
  • 23. Insider Risk management Workflow
    3m
  • 24. Communications Compliance
    5m
  • 25. Information barriers in Microsoft Teams
    2m
  • 26. Privileged Access Management
    4m
  • 27. Customer Lockbox
    4m
  • 28. Lesson Summary
    1m
  • 29. eDiscovery capabilities of Microsoft M365 - Introduction
    1m
  • 30. The Purpose of eDiscovery
    2m
  • 31. The capabilities of the content search
    5m
  • 32. The Core eDiscovery Workflow
    6m
  • 33. The advanced eDiscovery workflow
    4m
  • 35. The audit capabilities of Microsoft 365- introduction
    1m
  • 36. The core audit capabilities of M365
    4m
  • 37. What are the Advance Auditing Capabilities
    5m
  • 38. High Bandwidth for Office 365 API Activities
    2m
  • 40. Describe the resource governance capabilities- introduction
    1m
  • 41. Resource Manager - Locks
    2m
  • 42. What is Azure Blueprints
    3m
  • 43. What is Azure Policy
    4m
  • 44. Difference between Azure Policy and RBAC
    2m
  • 45. Cloud Adoption Framework
    2m
Study4Pass does not provide real Microsoft exam questions. Similarly, Study4Pass does not supply real Amazon exam questions. The materials offered by Study4Pass lack real questions and answers from Cisco's certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of Study4Pass content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

© study4pass.com 2025. All rights reserved.