Course Catalog
Microsoft Security, Compliance, and Identity Fundamentals (SC-900T00)
Code: MSC-900T00
Duration: 1 Day
$675 USD

OVERVIEW

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

DELIVERY FORMAT

This course is available in the following formats:

Virtual Classroom

Duration: 1 Day
Classroom

Duration: 1 Day

CLASS SCHEDULE

Delivery Format: Virtual Classroom
Date: Apr 12 2024 - Apr 12 2024 | 09:00 - 17:00 EDT
Location: Online
Course Length: 1 Day

$ 675

Delivery Format: Virtual Classroom
Date: Jun 17 2024 - Jun 17 2024 | 09:00 - 17:00 EDT
Location: Online
Course Length: 1 Day

$ 675

Delivery Format: Virtual Classroom
Date: Aug 29 2024 - Aug 29 2024 | 09:00 - 17:00 EDT
Location: Online
Course Length: 1 Day

$ 675

Delivery Format: Virtual Classroom
Date: Oct 24 2024 - Oct 24 2024 | 09:00 - 17:00 EDT
Location: Online
Course Length: 1 Day

$ 675

Delivery Format: Virtual Classroom
Date: Apr 12 2024 - Apr 12 2024 | 09:00 - 17:00 EDT
Location: Online
Course Length: 1 Day

$ 675

Delivery Format: Virtual Classroom
Date: Apr 12 2024 - Apr 12 2024 | 09:00 - 17:00 EDT
Location: Online
Course Length: 1 Day

$ 675

GOALS

Students will learn to,

  • Describe security and compliance concepts
  • Describe identity concepts
  • Describe the function and identity types of Microsoft Entra ID
  • Describe the authentication capabilities of Microsoft Entra ID
  • Describe access management capabilities of Microsoft Entra ID
  • Describe the identity protection and governance capabilities of Azure AD
  • Describe core infrastructure security services in Azure
  • Describe security management capabilities in Azure
  • Describe security capabilities of Microsoft Sentinel
  • Describe threat protection with Microsoft Defender XDR
  • Describe Microsoft’s Service Trust portal and privacy capabilities
  • Describe the compliance management capabilities in Microsoft Purview
  • Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview
  • Describe the insider risk capabilities in Microsoft Purview
  • Describe the eDiscovery and Audit capabilities in Microsoft Purview
OUTLINE

Module 1: Describe security and compliance concepts

  • Describe the shared responsibility and the defense-in-depth security models.
  • Describe the Zero-Trust model.
  • Describe the concepts of encryption and hashing.
  • Describe some basic compliance concepts.

Module 2: Describe identity concepts

  • Understand the difference between authentication and authorization.
  • Describe the concept of identity as a security perimeter.
  • Describe identity-related services.

Module 3 : Describe the function and identity types of Microsoft Entra ID

  • Describe the function of Microsoft Entra ID.
  • Describe the types of identities Microsoft Entra ID supports.

Module 4 : Describe the authentication capabilities of Microsoft Entra ID

  • Describe the authentication methods of Microsoft Entra ID.
  • Describe multifactor authentication (MFA) in Microsoft Entra ID.
  • Describe self-service password reset (SSPR) in Microsoft Entra ID.
  • Describe the password protection and management capabilities of Microsoft Entra ID.

Module 5 : Describe access management capabilities of Microsoft Entra ID

  • Describe Conditional Access in Microsoft Entra ID.
  • Describe Microsoft Entra roles and role-based access control.

Module 6 : Describe the identity protection and governance capabilities of Azure AD

  • Describe the capabilities of identity governance in Azure.
  • Describe Privileged Identity Management.
  • Describe the capabilities of Azure Identity Protection.

Module 7 : Describe core infrastructure security services in Azure

  • Learn how Azure security capabilities can protect the network
  • Learn how Azure can protect your VMs
  • Learn how to keep secrets safe with Azure Key Vault

Module 8 : Describe the security management capabilities in Azure

  • Describe?Microsoft Defender for Cloud.
  • Describe how security policies and initiatives improve cloud security posture.
  • Describe how the three pillars of Microsoft Defender for Cloud protect against cyber threats and vulnerabilities.

Module 9 : Describe security capabilities of Microsoft Sentinel

  • Describe the security concepts for SIEM and SOAR.
  • Describe how Microsoft Sentinel provides threat detection and mitigation.
  • Describe Microsoft Security Copilot.

Module 10 : Describe threat protection with Microsoft Defender XDR

  • Describe the Microsoft Defender XDR service.
  • Describe how Microsoft Defender XDR provides integrated protection against sophisticated attacks.
  • Describe and explore Microsoft Defender portal.

Module 11 : Describe Microsoft’s Service Trust portal and privacy capabilities

  • Describe the offerings of the Service Trust Portal.
  • Describe Microsoft's Privacy principles.
  • Describe Microsoft Priva.

Module 12 : Describe the compliance management capabilities in Microsoft Purview

  • Describe the Microsoft Purview compliance portal.
  • Describe Compliance Manager.
  • Describe the use and benefits of compliance score.

Module 13 : Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview

  • Describe data classification capabilities.
  • Describe records management.
  • Describe data loss prevention.
  • Describe unified data governance.

Module 14 : Describe the insider risk capabilities in Microsoft Purview

  • Describe insider risk management
  • Describe communication compliance

Module 15 : Describe the eDiscovery and Audit capabilities in Microsoft Purview

  • Describe the eDiscovery capabilities of Microsoft Purview.
  • Describe the auditing capabilities of Microsoft Purview.

Module 1: Describe security and compliance concepts

  • Describe the shared responsibility and the defense-in-depth security models.
  • Describe the Zero-Trust model.
  • Describe the concepts of encryption and hashing.
  • Describe some basic compliance concepts.

Module 2: Describe identity concepts

  • Understand the difference between authentication and authorization.
  • Describe the concept of identity as a security perimeter.
  • Describe identity-related services.

Module 3 : Describe the function and identity types of Microsoft Entra ID

  • Describe the function of Microsoft Entra ID.
  • Describe the types of identities Microsoft Entra ID supports.

Module 4 : Describe the authentication capabilities of Microsoft Entra ID

  • Describe the authentication methods of Microsoft Entra ID.
  • Describe multifactor authentication (MFA) in Microsoft Entra ID.
  • Describe self-service password reset (SSPR) in Microsoft Entra ID.
  • Describe the password protection and management capabilities of Microsoft Entra ID.

Module 5 : Describe access management capabilities of Microsoft Entra ID

  • Describe Conditional Access in Microsoft Entra ID.
  • Describe Microsoft Entra roles and role-based access control.

Module 6 : Describe the identity protection and governance capabilities of Azure AD

  • Describe the capabilities of identity governance in Azure.
  • Describe Privileged Identity Management.
  • Describe the capabilities of Azure Identity Protection.

Module 7 : Describe core infrastructure security services in Azure

  • Learn how Azure security capabilities can protect the network
  • Learn how Azure can protect your VMs
  • Learn how to keep secrets safe with Azure Key Vault

Module 8 : Describe the security management capabilities in Azure

  • Describe?Microsoft Defender for Cloud.
  • Describe how security policies and initiatives improve cloud security posture.
  • Describe how the three pillars of Microsoft Defender for Cloud protect against cyber threats and vulnerabilities.

Module 9 : Describe security capabilities of Microsoft Sentinel

  • Describe the security concepts for SIEM and SOAR.
  • Describe how Microsoft Sentinel provides threat detection and mitigation.
  • Describe Microsoft Security Copilot.

Module 10 : Describe threat protection with Microsoft Defender XDR

  • Describe the Microsoft Defender XDR service.
  • Describe how Microsoft Defender XDR provides integrated protection against sophisticated attacks.
  • Describe and explore Microsoft Defender portal.

Module 11 : Describe Microsoft’s Service Trust portal and privacy capabilities

  • Describe the offerings of the Service Trust Portal.
  • Describe Microsoft's Privacy principles.
  • Describe Microsoft Priva.

Module 12 : Describe the compliance management capabilities in Microsoft Purview

  • Describe the Microsoft Purview compliance portal.
  • Describe Compliance Manager.
  • Describe the use and benefits of compliance score.

Module 13 : Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview

  • Describe data classification capabilities.
  • Describe records management.
  • Describe data loss prevention.
  • Describe unified data governance.

Module 14 : Describe the insider risk capabilities in Microsoft Purview

  • Describe insider risk management
  • Describe communication compliance

Module 15 : Describe the eDiscovery and Audit capabilities in Microsoft Purview

  • Describe the eDiscovery capabilities of Microsoft Purview.
  • Describe the auditing capabilities of Microsoft Purview.
LABS

  • Lab : Explore Azure Active Directory
  • Lab : Explore Azure AD Authentication with self- service password rese
  • Lab : Explore access management in Azure AD with Conditional Access
  • Lab : Explore identity governance in Azure AD with Privileged Identity Management
  • Lab : Explore Microsoft Defender for Cloud Apps
  • Lab : Explore Microsoft Sentinel
  • Lab : Explore Microsoft Defender for Cloud
  • Lab : Explore Azure Network Security Groups (NSGs)
  • Lab : Explore the Microsoft 365 Defender portal
  • Lab : Explore Azure Policy
  • Lab : Explore the Core eDiscovery workflow
  • Lab : Explore the Service Trust Portal
  • Lab : Explore the Microsoft Purview compliance portal & Compliance Manager
  • Lab : Explore sensitivity labels in Microsoft Purview
  • Lab : Explore Insider Risk Management in Microsoft Purview
  • Lab : Explore Azure Active Directory
  • Lab : Explore Azure AD Authentication with self- service password rese
  • Lab : Explore access management in Azure AD with Conditional Access
  • Lab : Explore identity governance in Azure AD with Privileged Identity Management
  • Lab : Explore Microsoft Defender for Cloud Apps
  • Lab : Explore Microsoft Sentinel
  • Lab : Explore Microsoft Defender for Cloud
  • Lab : Explore Azure Network Security Groups (NSGs)
  • Lab : Explore the Microsoft 365 Defender portal
  • Lab : Explore Azure Policy
  • Lab : Explore the Core eDiscovery workflow
  • Lab : Explore the Service Trust Portal
  • Lab : Explore the Microsoft Purview compliance portal & Compliance Manager
  • Lab : Explore sensitivity labels in Microsoft Purview
  • Lab : Explore Insider Risk Management in Microsoft Purview
WHO SHOULD ATTEND

The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

PREREQUISITES

Before attending this course, students must have:

  • General understanding of networking and cloud computing concepts.
  • General IT knowledge or any general experience working in an IT environment.
  • General understanding of Microsoft Azure and Microsoft 365.