Microsoft Security, Compliance, and Identity Fundamentals SC-900
Best Microsoft Security, Compliance, and Identity Fundamentals SC-900 Training Institute in Coimbatore.
It’s impressive to see that nux software Training & Certification Solutions provides top-notch training programs, including the Microsoft Security, Compliance, and Identity Fundamentals SC-900 course. The emphasis on hands-on experience, advanced labs, and the expertise of international trainers reflects a commitment to delivering high-quality training. The flexibility for trainees and the focus on real-time industry experience contribute to making these programs valuable for career growth. Keep up the excellent work!
Course Syllabus
Microsoft Security, Compliance, and Identity Fundamentals SC-900 Syllabus
Describe the Concepts of Security, Compliance, and Identity (10-15%)
- Describe the shared responsibility model
- Describe defense in depth
- Describe the Zero-Trust model
- Describe encryption and hashing
- Describe compliance concepts
- Define identity as the primary security perimeter
- Define authentication
- Define authorization
- Describe identity providers
- Describe Active Directory
- Describe the concept of Federation
Describe the capabilities of Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra (25-30%)
- Describe Azure AD
- Describe Azure AD identities
- Describe hybrid identity
- Describe the different external identity types
- Describe the authentication methods available in Azure AD
- Describe Multi-factor Authentication
- Describe self-service password reset
- Describe password protection and management capabilities available in Azure AD
- Describe conditional access
- Describe the benefits of Azure AD roles
- Describe the benefits of Azure AD role-based access control
- Describe identity governance in Azure AD
- Describe entitlement management and access reviews
- Describe the capabilities of Azure AD Privileged Identity Management (PIM)
- Describe Azure AD Identity Protection
Describe the capabilities of Microsoft Security Solutions (25-30%)
- Describe Azure DDoS protection
- Describe Azure Firewall
- Describe Web Application Firewall
- Describe Network Segmentation with Azure Virtual Networks
- Describe Azure Network Security groups
- Describe Azure Bastion and JIT Access
- Describe ways Azure encrypts data
- Describe Cloud security posture management (CSPM)
- Describe Microsoft Defender for Cloud
- Describe the enhanced security features of Microsoft Defender for Cloud
- Describe security baselines for Azure
- Define the concepts of SIEM and SOAR
- Describe how Microsoft Sentinel provides integrated threat management
- Describe Microsoft 365 Defender services
- Describe Microsoft Defender for Office 365
- Describe Microsoft Defender for Endpoint
- Describe Microsoft Defender for Cloud Apps
- Describe Microsoft Defender for Identity
- Describe the Microsoft 365 Defender portal
Describe the Capabilities of Microsoft Compliance Solutions (25-30%)
- Describe the offerings of the Service Trust portal
- Describe Microsoft’s privacy principles
- Describe the Microsoft Purview compliance portal
- Describe compliance manager
- Describe the use and benefits of compliance score
- Describe data classification capabilities
- Describe the benefits of content explorer and activity explorer
- Describe sensitivity labels and sensitivity label policies
- Describe Data Loss Prevention (DLP)
- Describe Records Management
- Describe Retention Polices, Retention labels and retention label policies
- Describe Insider Risk Management
- Describe communication compliance
- Describe information barriers
- Describe Azure Policy
- Describe Azure Blueprints
- Describe the Microsoft Purview unified data governance solution