SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Course Introduction
-
1. Course Introduction4m
Module 1 Describe the concepts of security, compliance, and identity
-
1. Chapter 1 : Security concepts and methodologies - Introduction1m
-
2. Zero Trust - Guidelines3m
-
3. Zero Trust - Six Foundational Pillars4m
-
4. The Shared Responsibility Model6m
-
5. Defence in Depth Strategy3m
-
6. The CIA Triad6m
-
7. Describe Common Threats6m
-
8. Describe Encryption , hashing and Signing -I4m
-
9. Describe Encryption , hashing and Signing - II4m
-
10. Lesson Conclusion1m
-
11. Microsoft security and compliance principles - Lesson Introduction1m
-
12. Microsoft's Privacy Principles2m
-
13. What is Service Trust Portal2m
-
14. Azure Compliance Documentation1m
-
15. Module 1 : Chapter Summary1m
Module 2 Describe the concepts & capabilities of Microsoft identity and access
-
1. Describe Identity Concepts - Introduction1m
-
2. Common Identity Attacks5m
-
3. Identity As a Security perimeter4m
-
4. Four Pillars of Identity6m
-
5. Modern Authentication and the role of Identity provider3m
-
6. SSO and the Concept of Federation4m
-
7. The concept of directory services and Active Directory3m
-
8. Describe the basic services and identity types - Introduction1m
-
9. Describe Azure Active Directory3m
-
10. Azure AD Editions4m
-
11. Describe the Azure AD identity types8m
-
12. Difference between System assigned and user assigned managed Identity3m
-
13. Describe the types external identities5m
-
14. Describe the concept of hybrid Identities4m
-
15. Describe the authentication capabilities of Azure - Introduction1m
-
16. Describe the different authentication methods3m
-
17. Security defaults and MFA4m
-
18. MFA in Azure AD - Part 12m
-
19. MFA in Azure AD - Part 23m
-
20. Windows Hello3m
-
21. Why is Windows Hello safer than a password2m
-
22. Self-service password reset in Azure AD5m
-
23. Password protection and management capabilities of Azure AD5m
-
24. Protecting against password spray2m
-
25. Hybrid security2m
-
26. Describe the access management capabilties of AzureAD1m
-
27. Conditional access in Azure AD4m
-
28. Conditional access in Azure AD - II6m
-
29. Conditional access in Azure AD - III3m
-
30. Azure AD Roles & Custom Roles3m
-
31. Chapter Summary1m
-
32. Describe the identity protection and governance capabilties of Azure AD1m
-
33. What is Identity Governance1m
-
34. What is Identity lifecycle4m
-
35. Access Lifecycle2m
-
36. Privileged access lifecycle2m
-
37. What is Entitlement management3m
-
38. Azure AD access reviews3m
-
39. Azure AD terms of use2m
-
40. Capabilities of Privileged identity Management2m
Module 3 : Describe the capabilties of Microsoft security solutions
-
1. Module Introduction2m
-
2. Network security groups3m
-
3. Inbound and outbound security rules4m
-
4. What is DDOS3m
-
5. Azure DDOS protection plans and pricing3m
-
6. Azure Firewall4m
-
7. Azure Bastion Host4m
-
8. Web Application Firewall2m
-
9. Azure Encryption3m
-
10. Azure Key Vault2m
-
11. Lesson Summary2m
-
12. Cloud Security Posture management4m
-
13. Azure Security Center4m
-
14. Azure Security Center - Features4m
-
15. Azure Security Center - Security Score2m
-
16. Azure defender6m
-
17. Azure Security Benchmark5m
-
18. Azure Security Center - Pricing Tier1m
-
19. Chapter Summary1m
-
20. Describe the security capabilities of Azure Sentinel2m
-
21. Define the concepts of SIEM, SOAR and XDR6m
-
22. Azure Sentinel2m
-
23. Azure Sentinel Features6m
-
24. Azure Sentinel - Pricing1m
-
26. Describe the threat protection capabilities of - Introduction2m
-
27. Microsoft 365 Defender services - Introduction3m
-
28. Microsoft Defender for Identity5m
-
29. Microsoft Defender for O3655m
-
30. Microsoft Defender for Endpoint4m
-
31. What is CASB3m
-
32. The Cloud App Security framework2m
-
33. Microsoft Cloud App Security architecture3m
-
34. O365 Cloud App security And Azure AD Cloud App Discovery1m
-
36. Security Management Capabilties of M365 - Introduction2m
-
37. Microsoft 365 Security Center - Intro5m
-
38. How to use Microsoft Secure Score3m
-
39. Differences between the Azure and Microsoft Secure Score1m
-
40. Managing Incidents2m
-
42. Describe endpoint security with Microsoft Intune - Introduction1m
-
43. What is Intune2m
-
44. MDM and MAM3m
-
45. Endpoint Security with Intune7m
Module 4 : Describe the capabilities of Microsoft compliance solutions
-
1. Module 4 introduction1m
-
2. Common Compliance Needs2m
-
3. Common compliance regulations3m
-
4. Compliance Center2m
-
5. What is Compliance Manager2m
-
6. What are Controls1m
-
7. What are Assesments2m
-
8. Understand Compliance score3m
-
9. Chapter Summary1m
-
10. The information protection and governance capabiliities of Microsoft 3651m
-
11. Know your data, protect your data, and govern your data3m
-
12. Data classification capabilities of compliance Center5m
-
13. Content Explorer and Activity Explorer4m
-
14. Sensitivity labels5m
-
15. Label Policies3m
-
16. Data Loss Prevention3m
-
17. Data Loss Prevention on endpoints and teams2m
-
18. Retention Polices and Retention Labels4m
-
19. Records Management3m
-
21. The insider risk capabilities in Microsoft - Introduction1m
-
22. Insider Risk management2m
-
23. Insider Risk management Workflow3m
-
24. Communications Compliance5m
-
25. Information barriers in Microsoft Teams2m
-
26. Privileged Access Management4m
-
27. Customer Lockbox4m
-
28. Lesson Summary1m
-
29. eDiscovery capabilities of Microsoft M365 - Introduction1m
-
30. The Purpose of eDiscovery2m
-
31. The capabilities of the content search5m
-
32. The Core eDiscovery Workflow6m
-
33. The advanced eDiscovery workflow4m
-
35. The audit capabilities of Microsoft 365- introduction1m
-
36. The core audit capabilities of M3654m
-
37. What are the Advance Auditing Capabilities5m
-
38. High Bandwidth for Office 365 API Activities2m
-
40. Describe the resource governance capabilities- introduction1m
-
41. Resource Manager - Locks2m
-
42. What is Azure Blueprints3m
-
43. What is Azure Policy4m
-
44. Difference between Azure Policy and RBAC2m
-
45. Cloud Adoption Framework2m