Skip to content
Role Based Certifications

SC-900: Microsoft Security, Compliance, and Identity Fundamentals


Course
Quantity
For someone else
Quantity
For someone else
For information on how to enroll in this course, click below.
Contact us

Duration: 1 Day
Level: Beginner
Learning Mode: Live Online Instructor-Led Training
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

Audience Profile

The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

  Skill

  • Describe basic concepts of security, compliance, and identity.
  • Describe the concepts and capabilities of Microsoft identity and access management solutions.
  • Describe the capabilities of Microsoft security solutions.
  • Describe the compliance management capabilities in Microsoft.

Pre-requisites

Before attending this course, students must have:

  • General understanding of networking and cloud computing concepts.
  • General IT knowledge or any general experience working in an IT environment.
  • General understanding of Microsoft Azure and Microsoft 365.
Course Agenda

Module 1: Describe basic concepts of security, compliance, and identity.

Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.

Lessons

  • Describe security concepts and methodologies.
  • Describe Microsoft security and compliance principles.

After completing this module, students will be able to:

  • Describe security concepts and methodologies.
  • Explore the Service Trust Portal.
  • Know where to go to find and review Azure compliance documentation.

Module 2: Describe the concepts and capabilities of Microsoft identity and access management solutions

Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.

Lessons

  • Describe identity concepts
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD
  • Describe the access management capabilities of Azure AD
  • Describe the identity protection and governance capabilities of Azure AD

After completing this module, you will be able to:

  • Describe basic identity concepts.
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD.
  • Describe the access management capabilities of Azure AD.
  • Describe the identity protection and governance capabilities of Azure AD.

Module 3: Describe the capabilities of Microsoft security solutions

Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you'll explore endpoint protection with Intune.

Lessons

  • Describe the basic security capabilities in Azure
  • Describe the security management capabilities of Azure
  • Describe the security capabilities of Azure Sentinel
  • Describe the threat protection capabilities of Microsoft 365
  • Describe the security management capabilities of Microsoft 365
  • Describe endpoint security with Microsoft Intune
  • Module summary

After completing this module, you will be able to:

  • Describe the basic security capabilities in Azure.
  • Describe the security management capabilities of Azure.
  • Describe the security capabilities of Azure Sentinel.
  • Describe the threat protection capabilities of Microsoft 365.
  • Describe the security management capabilities of Microsoft 365.
  • Describe endpoint security with Microsoft Intune.

Module 4: Describe the capabilities of Microsoft compliance solutions

Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.

Lessons

  • Describe the compliance management capabilities in Microsoft
  • Describe the information protection and governance capabilities of Microsoft 365
  • Describe the insider risk capabilities in Microsoft 365
  • Describe the eDiscovery capabilities of Microsoft 365
  • Describe the audit capabilities of Microsoft 365
  • Describe the resource governance capabilities in Azure

After Manage and maintain Azure AD from creation to solution

  • Describe the compliance management capabilities in Microsoft.
  • Describe the information protection and governance capabilities of Microsoft 365.
  • Describe the insider risk capabilities in Microsoft 365.
  • Describe the eDiscovery capabilities of Microsoft 365.
  • Describe the audit capabilities of Microsoft 365.
  • Describe the resource governance capabilities in Azure.

Here is the course outline:

1. Implement an identity management solution

Learn to create and manage your initial Azure Active Directory (Azure AD) implementation and configure the users, groups, and external identities you will use to run your solution.

2. Implement an authentication and access management solution

Implement and administer your access management using Azure AD. Use MFA, conditional access, and identity protection to manager your identity solution.

3. Implement access management for Apps

Explore how applications can and should be added to your identity and access solution with application registration in Azure AD.

4. Plan and implement an identity governance strategy

Design and implement identity governance for your identity solution using entitlement, access reviews, privileged access, and monitoring your Azure Active Directory (Azure AD).

Back to top