SC-900: Microsoft Security, Compliance, and Identity Fundamentals

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Course Introduction

  • 1. Course Introduction
    4m

Module 1 Describe the concepts of security, compliance, and identity

  • 1. Chapter 1 : Security concepts and methodologies - Introduction
    1m
  • 2. Zero Trust - Guidelines
    3m
  • 3. Zero Trust - Six Foundational Pillars
    4m
  • 4. The Shared Responsibility Model
    6m
  • 5. Defence in Depth Strategy
    3m
  • 6. The CIA Triad
    6m
  • 7. Describe Common Threats
    6m
  • 8. Describe Encryption , hashing and Signing -I
    4m
  • 9. Describe Encryption , hashing and Signing - II
    4m
  • 10. Lesson Conclusion
    1m
  • 11. Microsoft security and compliance principles - Lesson Introduction
    1m
  • 12. Microsoft's Privacy Principles
    2m
  • 13. What is Service Trust Portal
    2m
  • 14. Azure Compliance Documentation
    1m
  • 15. Module 1 : Chapter Summary
    1m

Module 2 Describe the concepts & capabilities of Microsoft identity and access

  • 1. Describe Identity Concepts - Introduction
    1m
  • 2. Common Identity Attacks
    5m
  • 3. Identity As a Security perimeter
    4m
  • 4. Four Pillars of Identity
    6m
  • 5. Modern Authentication and the role of Identity provider
    3m
  • 6. SSO and the Concept of Federation
    4m
  • 7. The concept of directory services and Active Directory
    3m
  • 8. Describe the basic services and identity types - Introduction
    1m
  • 9. Describe Azure Active Directory
    3m
  • 10. Azure AD Editions
    4m
  • 11. Describe the Azure AD identity types
    8m
  • 12. Difference between System assigned and user assigned managed Identity
    3m
  • 13. Describe the types external identities
    5m
  • 14. Describe the concept of hybrid Identities
    4m
  • 15. Describe the authentication capabilities of Azure - Introduction
    1m
  • 16. Describe the different authentication methods
    3m
  • 17. Security defaults and MFA
    4m
  • 18. MFA in Azure AD - Part 1
    2m
  • 19. MFA in Azure AD - Part 2
    3m
  • 20. Windows Hello
    3m
  • 21. Why is Windows Hello safer than a password
    2m
  • 22. Self-service password reset in Azure AD
    5m
  • 23. Password protection and management capabilities of Azure AD
    5m
  • 24. Protecting against password spray
    2m
  • 25. Hybrid security
    2m
  • 26. Describe the access management capabilties of AzureAD
    1m
  • 27. Conditional access in Azure AD
    4m
  • 28. Conditional access in Azure AD - II
    6m
  • 29. Conditional access in Azure AD - III
    3m
  • 30. Azure AD Roles & Custom Roles
    3m
  • 31. Chapter Summary
    1m
  • 32. Describe the identity protection and governance capabilties of Azure AD
    1m
  • 33. What is Identity Governance
    1m
  • 34. What is Identity lifecycle
    4m
  • 35. Access Lifecycle
    2m
  • 36. Privileged access lifecycle
    2m
  • 37. What is Entitlement management
    3m
  • 38. Azure AD access reviews
    3m
  • 39. Azure AD terms of use
    2m
  • 40. Capabilities of Privileged identity Management
    2m

Module 3 : Describe the capabilties of Microsoft security solutions

  • 1. Module Introduction
    2m
  • 2. Network security groups
    3m
  • 3. Inbound and outbound security rules
    4m
  • 4. What is DDOS
    3m
  • 5. Azure DDOS protection plans and pricing
    3m
  • 6. Azure Firewall
    4m
  • 7. Azure Bastion Host
    4m
  • 8. Web Application Firewall
    2m
  • 9. Azure Encryption
    3m
  • 10. Azure Key Vault
    2m
  • 11. Lesson Summary
    2m
  • 12. Cloud Security Posture management
    4m
  • 13. Azure Security Center
    4m
  • 14. Azure Security Center - Features
    4m
  • 15. Azure Security Center - Security Score
    2m
  • 16. Azure defender
    6m
  • 17. Azure Security Benchmark
    5m
  • 18. Azure Security Center - Pricing Tier
    1m
  • 19. Chapter Summary
    1m
  • 20. Describe the security capabilities of Azure Sentinel
    2m
  • 21. Define the concepts of SIEM, SOAR and XDR
    6m
  • 22. Azure Sentinel
    2m
  • 23. Azure Sentinel Features
    6m
  • 24. Azure Sentinel - Pricing
    1m
  • 26. Describe the threat protection capabilities of - Introduction
    2m
  • 27. Microsoft 365 Defender services - Introduction
    3m
  • 28. Microsoft Defender for Identity
    5m
  • 29. Microsoft Defender for O365
    5m
  • 30. Microsoft Defender for Endpoint
    4m
  • 31. What is CASB
    3m
  • 32. The Cloud App Security framework
    2m
  • 33. Microsoft Cloud App Security architecture
    3m
  • 34. O365 Cloud App security And Azure AD Cloud App Discovery
    1m
  • 36. Security Management Capabilties of M365 - Introduction
    2m
  • 37. Microsoft 365 Security Center - Intro
    5m
  • 38. How to use Microsoft Secure Score
    3m
  • 39. Differences between the Azure and Microsoft Secure Score
    1m
  • 40. Managing Incidents
    2m
  • 42. Describe endpoint security with Microsoft Intune - Introduction
    1m
  • 43. What is Intune
    2m
  • 44. MDM and MAM
    3m
  • 45. Endpoint Security with Intune
    7m

Module 4 : Describe the capabilities of Microsoft compliance solutions

  • 1. Module 4 introduction
    1m
  • 2. Common Compliance Needs
    2m
  • 3. Common compliance regulations
    3m
  • 4. Compliance Center
    2m
  • 5. What is Compliance Manager
    2m
  • 6. What are Controls
    1m
  • 7. What are Assesments
    2m
  • 8. Understand Compliance score
    3m
  • 9. Chapter Summary
    1m
  • 10. The information protection and governance capabiliities of Microsoft 365
    1m
  • 11. Know your data, protect your data, and govern your data
    3m
  • 12. Data classification capabilities of compliance Center
    5m
  • 13. Content Explorer and Activity Explorer
    4m
  • 14. Sensitivity labels
    5m
  • 15. Label Policies
    3m
  • 16. Data Loss Prevention
    3m
  • 17. Data Loss Prevention on endpoints and teams
    2m
  • 18. Retention Polices and Retention Labels
    4m
  • 19. Records Management
    3m
  • 21. The insider risk capabilities in Microsoft - Introduction
    1m
  • 22. Insider Risk management
    2m
  • 23. Insider Risk management Workflow
    3m
  • 24. Communications Compliance
    5m
  • 25. Information barriers in Microsoft Teams
    2m
  • 26. Privileged Access Management
    4m
  • 27. Customer Lockbox
    4m
  • 28. Lesson Summary
    1m
  • 29. eDiscovery capabilities of Microsoft M365 - Introduction
    1m
  • 30. The Purpose of eDiscovery
    2m
  • 31. The capabilities of the content search
    5m
  • 32. The Core eDiscovery Workflow
    6m
  • 33. The advanced eDiscovery workflow
    4m
  • 35. The audit capabilities of Microsoft 365- introduction
    1m
  • 36. The core audit capabilities of M365
    4m
  • 37. What are the Advance Auditing Capabilities
    5m
  • 38. High Bandwidth for Office 365 API Activities
    2m
  • 40. Describe the resource governance capabilities- introduction
    1m
  • 41. Resource Manager - Locks
    2m
  • 42. What is Azure Blueprints
    3m
  • 43. What is Azure Policy
    4m
  • 44. Difference between Azure Policy and RBAC
    2m
  • 45. Cloud Adoption Framework
    2m