HOME > IT & Software > SC-900- Microsoft Security, Compliance, Identity (July 2024)

SC-900- Microsoft Security, Compliance, Identity (July 2024)

SynopsisSC-900: Microsoft Security, Compliance, Identity (July 2024 ,...
SC-900- Microsoft Security, Compliance, Identity (July 2024)  No.1

SC-900: Microsoft Security, Compliance, Identity (July 2024), available at $94.99, has an average rating of 4.57, with 100 lectures, 19 quizzes, based on 2013 reviews, and has 10903 subscribers.

You will learn about Describe the concepts of security, compliance, and identity Describe the capabilities of Microsoft identity and access management solutions Describe the capabilities of Microsoft security solutions Describe the capabilities of Microsoft compliance solutions This course is ideal for individuals who are This course is for you if you want to understand what is available security, compliance and identity on Azure and Microsoft 365. or By the end of this course, with some practice, you could enter (and hopefully pass) Microsofts official SC-900 exam. or Wouldnt the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification look good on your CV or resume? It is particularly useful for This course is for you if you want to understand what is available security, compliance and identity on Azure and Microsoft 365. or By the end of this course, with some practice, you could enter (and hopefully pass) Microsofts official SC-900 exam. or Wouldnt the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification look good on your CV or resume?.

Enroll now: SC-900: Microsoft Security, Compliance, Identity (July 2024)

Summary

Title: SC-900: Microsoft Security, Compliance, Identity (July 2024)

Price: $94.99

Average Rating: 4.57

Number of Lectures: 100

Number of Quizzes: 19

Number of Published Lectures: 100

Number of Published Quizzes: 19

Number of Curriculum Items: 119

Number of Published Curriculum Objects: 119

Number of Practice Tests: 1

Number of Published Practice Tests: 1

Original Price: $89.99

Quality Status: approved

Status: Live

What You Will Learn

  • Describe the concepts of security, compliance, and identity
  • Describe the capabilities of Microsoft identity and access management solutions
  • Describe the capabilities of Microsoft security solutions
  • Describe the capabilities of Microsoft compliance solutions
  • Who Should Attend

  • This course is for you if you want to understand what is available security, compliance and identity on Azure and Microsoft 365.
  • By the end of this course, with some practice, you could enter (and hopefully pass) Microsofts official SC-900 exam.
  • Wouldnt the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification look good on your CV or resume?
  • Target Audiences

  • This course is for you if you want to understand what is available security, compliance and identity on Azure and Microsoft 365.
  • By the end of this course, with some practice, you could enter (and hopefully pass) Microsofts official SC-900 exam.
  • Wouldnt the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification look good on your CV or resume?
  • This course covers the content required for the SC-900 certification exam, current as per the SC-900 exam updates of 25 April 2024 and 26 July 2024.

    What do people like you say about this course?

    Syed says: “I have cleared with 813. Your Explanations where informative and detailed. Thank you!”

    Deepthi says: “Topics are explained clearly and they are easy to understand. For SC-900 this is one of the best course in Udemy.”

    Kunjar says: “The short quiz between chapters is helpful. Practice test at the end of the course is a confidence booster.”

    This course is the foundation for the Microsoft Certificate SC-900 “Microsoft Security, Compliance, and Identity Fundamentals” across cloud-based and related Microsoft services.

    We’ll start off with looking at the concepts of Security, Compliance and Identity (SCI). We’ll look at security methodologies, security concepts and Microsoft Security and compliance principles.

    We’ll then look at Microsoft Identity and Access Management Solutions. We’ll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Microsoft Entra ID.

    Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.

    The final item is Microsoft Compliance Solutions. In this section, we’ll largely concentrate on Microsoft Purview compliance (previously known as Microsoft 365 compliance). We’ll look at information protection and data lifecycle management capabilities, and inside risk. We’ll end with looking at the resource governance capabilities in Azure.

    No prior knowledge is required – we’ll even see how to get a free Microsoft Azure and Microsoft 365 and Purview compliance trial!

    There are regular quizzes to help you remember the information, so you can be sure that you are learning.

    Once you have completed this course, you will have a good introductory knowledge of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. And with some practice, you could even go for the official Microsoft certification SC-900 – wouldn’t that look good on your CV or resume? And if you are an American college student, you might even get college credit for passing that exam.

    So, without any further ado, let’s have a look at how you can use the Udemy interface, and then we’ll have a look at the objectives for the exam and therefore the syllabus for this course. And if you are an American college student, you might even get college credit for passing that exam.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Welcome to Udemy

    Lecture 3: How to get the best out of your Udemy course

    Lecture 4: Do you want auto-translated subtitles in more languages?

    Lecture 5: Curriculum

    Lecture 6: Resources

    Chapter 2: Part 1 – Describe the Concepts of Security, Compliance, and Identity

    Lecture 1: 2. Define defense-in-depth

    Lecture 2: 3. Describe the Zero-Trust methodology

    Lecture 3: On Prem versus the Cloud

    Lecture 4: 1. Describe the shared responsibility model

    Lecture 5: 4. Describe encryption and hashing

    Lecture 6: 47. Describe Microsofts privacy principles

    Lecture 7: 46. Describe the offerings of the service trust portal

    Lecture 8: -. Describe common threats

    Lecture 9: 5. Describe compliance concepts

    Lecture 10: 5. Describe Governance and Risk concepts

    Chapter 3: Part 1 – Define identity principles/concepts

    Lecture 1: 6. Define identity as the primary security perimeter

    Lecture 2: 7, 8. Define authentication and authorization

    Lecture 3: 9. Describe identity providers

    Lecture 4: 10. Describe the concept of directory services and Active Directory

    Lecture 5: 11. Describe the concept of federation

    Lecture 6: -. Define common Identity Attacks

    Chapter 4: Part 2 – Describe function and identity types of Microsoft Entra ID

    Lecture 1: Azure Active Directory (AAD) and Entra ID

    Lecture 2: 12. Describe Microsoft Entra ID

    Lecture 3: 13. Describe types of identities

    Lecture 4: 14. Describe hybrid identity

    Lecture 5: (14). Describe the different external identity types

    Chapter 5: Part 2 – authentication and access management capabilities of Microsoft Entra ID

    Lecture 1: 16, 17. Different AuthN methods, inc. Multi-factor Authentication

    Lecture 2: 19. Describe password protection and management capabilities

    Lecture 3: 20. Describe what conditional access is, and its uses and benefits

    Lecture 4: 21. Describe Microsoft Entra roles

    Lecture 5: 22. Describe Microsoft Entra role-based access control (RBAC)

    Lecture 6: 16. Describe Windows Hello for Business

    Chapter 6: Part 2 – Describe the identity protection & governance capabilities of Entra

    Lecture 1: 23. Describe Microsoft Entra ID Governance

    Lecture 2: 24. Describe access reviews

    Lecture 3: 25. Describe capabilities of Microsoft Entra ID Privileged Identity Management

    Lecture 4: 26. Describe Microsoft Entra ID Protection

    Lecture 5: 26a. Describe Microsoft Entra Permissions Management

    Chapter 7: Part 3 – Describe core infrastructure security services in Azure

    Lecture 1: 31. Describe Network Security Groups (NSGs)

    Lecture 2: 27. Describe Azure distributed denial-of-service (DDoS) Protection

    Lecture 3: 28. Describe Azure Firewall

    Lecture 4: 32. Describe Azure Bastion

    Lecture 5: 29. Describe Web Application Firewall (WAF)

    Lecture 6: 30. Describe Network Segmentation with Azure Virtual Networks (VNets)

    Lecture 7: 33. Describe Azure Key Vault

    Chapter 8: Part 3 – Describe security management capabilities of Azure

    Lecture 1: 35. Describe Microsoft Defender for Cloud

    Lecture 2: 35. Describe secure score in Microsoft Defender for Cloud

    Lecture 3: 36. Describe enhanced security features provided by cloud workload protection

    Lecture 4: 34. Describe Cloud security posture management (CSPM)

    Lecture 5: 37. How security policies and initiatives improve the cloud security posture

    Chapter 9: Part 3 – Describe security capabilities of Azure Sentinel

    Lecture 1: 38. Define the concepts of SIEM and SOAR

    Lecture 2: 39. Describe threat detection and mitigation capabilities in Microsoft Sentinel

    Chapter 10: Part 3 – Describe threat protection with Microsoft 365 Defender

    Lecture 1: 40. Describe Microsoft 365 Defender services

    Lecture 2: 44. Describe Microsoft Defender for Identity (formerly Azure ATP)

    Lecture 3: 41. Describe Microsoft Defender for Office 365 (formerly Office 365 ATP)

    Lecture 4: 42. Describe Microsoft Defender for Endpoint, former Microsoft Defender ATP

    Lecture 5: 43. Describe Microsoft Defender for Cloud Apps

    Lecture 6: 44a. Describe Microsoft Defender Vulnerability Management

    Lecture 7: 44b. Describe Microsoft Defender Threat Intelligence (Defender TI)

    Chapter 11: Part 3 – Describe security management capabilities of Microsoft 365

    Lecture 1: 45. Describe security reports and dashboards

    Lecture 2: 45. Describe how to use Microsoft Secure Score

    Lecture 3: 45. Describe incidents and incident management capabilities

    Lecture 4: 45. Describe the Microsoft 365 Defender Portal (Security Center)

    Chapter 12: Part 4 – Describe compliance management capabilities in Microsoft Purview

    Lecture 1: Microsoft 365 and Microsoft Purview

    Lecture 2: 48. Describe the Microsoft Purview compliance portal

    Lecture 3: 49. Describe Compliance Manager

    Lecture 4: 50. Describe the use and benefits of compliance score

    Chapter 13: Part 4 – Purview Information protection, data lifecycle management, governance

    Lecture 1: 51. Describe the data classification capabilities

    Lecture 2: 53. Describe sensitivity labels and sensitivity label policies

    Lecture 3: 52. Describe the value of Content explorer and Activity explorer

    Lecture 4: 56. Describe Retention Polices, Retention Labels and Retention label policies

    Lecture 5: 55. Describe Records Management

    Lecture 6: 54. Describe Data Loss Prevention (DLP)

    Lecture 7: 57. Describe the Microsoft Purview unified data governance solution

    Lecture 8: 47a. Microsoft Priva

    Instructors

  • SC-900- Microsoft Security, Compliance, Identity (July 2024)  No.2
    Phillip Burton
    Best Selling Instructor – over 800,000 students so far
  • SC-900- Microsoft Security, Compliance, Identity (July 2024)  No.3
    I Do Data Limited
    Improve your skills in SQL, Office, Tableau, Power BI + more
  • Rating Distribution

  • 1 stars: 13 votes
  • 2 stars: 26 votes
  • 3 stars: 180 votes
  • 4 stars: 777 votes
  • 5 stars: 1017 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!