starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. SC-900: Microsoft Security, Compliance and Identity Fundamentals - Certification Program

SC-900: Microsoft Security, Compliance and Identity Fundamentals - Certification Program

This course is a comprehensive overview of what effective business analysts really do - their strategies, techniques, tools and methods – all which apply to any process whether it’s a traditional large project, and Agile or DevOps project.

Anand Rao Nednur
Anand Rao Nednur
Cloud | core | 7 hours |   Published: Aug 2021
In partnership with:  Coursera

    Discussions

Overview

2.3KSTUDENTS*
96.7%RECOMMEND*

This certification includes:

  • 7 hours of on-demand video
  • 4 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services. This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions. Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Identity is the new perimeter. Application developers and infrastructure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it. This course begins with the concepts of Security, Compliance and Identity. We'll look at security methodologies, security concepts and Microsoft Security and compliance principles. We will check the concepts of zero trust methodology , shared responsibility model and defense in depth . We'll then look at Microsoft Identity and Access Management Solutions. We'll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory. Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365. The final module is Microsoft Compliance Solutions. We'll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery and audit. Here is the course coverage :
  • Describe the Concepts of Security, Compliance, and Identity (5-10%)
  • Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
  • Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
  • Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
 

Skills You Will Gain

Azure Sentinel
Microsoft 365 Defender
Microsoft Azure
Microsoft Security
SC 900

Learning Outcomes (At the end of this program you will be able to)

  • Describe the concepts of Information security, compliance, and identity as it relates to Azure and related Microsoft Products 
  • Describe the capabilities of Microsoft compliance solutions 
  • Identify the capabilities of Microsoft security solutions 
  • Describe the capabilities of Microsoft identity and access management solutions 

 

Prerequisites

  • Basic Knowledge of security , compliance and Identity 
  • Candidates should be familiar with Microsoft Azure and Microsoft 365 
  • Concepts of Azure Active Directory would be helpful 

 

Who Should Attend

  • This course is for broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions. 
  • Participants looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. 
  • Participants must have the passion to learn and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. 

Curriculum

Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Welcome to the course!
2Module 1: Describe the concepts of security, compliance and identity
3Module 2: Describe the capabilities of Microsoft identity and access
4Module 3: Describe the capabilities of Microsoft security solution
5Module 4: Describe the capabilities of Microsoft compliance solution
Anand Rao Nednur

Anand Rao Nednur

He is a distinguished expert in cloud computing and cybersecurity with a deep passion for advancing IT infrastructure and security solutions. With extensive experience in Active Directory, AWS, Azure, and Google Cloud Platform, he has led numerous projects that integrate complex cloud technologies and enhance security measures.

His background spans a diverse range of roles, from senior cloud architect to cybersecurity consultant, where he has designed and implemented scalable cloud solutions, conducted security assessments, and guided organizations through successful cloud migrations. His expertise includes managing and optimizing cloud environments, with a focus on Azure governance, monitoring, and compliance.

He has a proven track record in advising on cloud security frameworks, identity and access management, and developing automation scripts to streamline processes. His approach is rooted in practical, hands-on experience, ensuring that theoretical knowledge is grounded in real-world application and addresses the latest challenges in cloud and security domains.

Committed to sharing his knowledge and insights, he delivers comprehensive training programs and consulting services to equip professionals with the skills needed to excel in cloud environments and cybersecurity. Whether through hands-on labs, practical case studies, or strategic consultations, his goal is to empower individuals and organizations to navigate the complexities of modern IT landscapes effectively.

VIEW MY CHANNEL

Segment - 01 - Course Introduction

Segment - 02 - Security Concepts and Methodologies - Introduction

Segment - 03 - Zero Trust Guidelines

Segment - 04 - Zero Trust Six Foundational Pillars

Segment - 05 - Shared Responsibility Model

Segment - 06 - Defense in Depth Edited

Segment - 07 - The CIA Triad Edited

Segment - 08 - Describe Common Threats

Segment - 09 - Describe Encryption , hashing and Signing - I

Segment - 10 - Describe Encryption , hashing and Signing - II

Segment - 11 - Conclusion

Segment - 12 - Microsoft security and compliance principles - Introduction

Segment - 13 - Microsoft Privacy Principles

Segment - 14 - What is Service Trust Portal?

Segment - 15 - Azure Compliance Documentation

Segment - 16 - Chapter Summary

About this course: Overview, Learning Outcomes, Who Should Enroll...

Segment - 57 - Introduction

Segment - 58 - Network security groups

Segment - 59 - Inbound and outbound security rules

Segment - 60 - What is DDOS?

Segment - 61 - Azure DDOS protection plans and pricing

Segment - 62 - Azure Firewall

Segment - 63 - Azure Bastion Host

Segment - 64 - Web Application Firewall

Segment - 65 - Azure Encryption

Segment - 66 - Azure Key vault

Segment - 67 - Lesson Summary

Segment - 68 - Cloud Security Posture management

Segment - 69 - Azure Security Center

Segment - 70 - Azure Security Center - Features

Segment - 71 - Azure Security Center - Security Score

Segment - 72 - Azure Defender

Segment - 73 - Azure Security Benchmark

Segment - 74 - Azure Security Center - Pricing Tiers

Segment - 75 - Lesson Summary

Segment - 76 - Describe the Security Capabilities of Azure Sentinel - Introduction

Segment - 77 - Define the concepts of SIEM, SOAR, XDR

Segment - 78 - Azure Sentinel

Segment - 79 - Azure Sentinel Features

Segment - 80 - Azure Sentinel - Pricing

Segment - 81 - Lesson Summary

Segment - 82 - Describe the threat protection capabilities of - Introduction

Segment - 83 - Microsoft 365 Defender services - Introduction

Segment - 84 - Microsoft Defender for Identity

Segment - 85 - Microsoft Defender for O365

Segment - 86 - Microsoft Defender for Endpoint

Segment - 87 - What is CASB

Segment - 88 - The Cloud App Security framework

Segment - 89 - Microsoft Cloud App Security architecture

Segment - 90 - O365 Cloud App security And Azure AD Cloud App Discovery

Segment - 91 - Chapter Summary

Segment - 92 - Security Management Capabilities of M365 - Introduction

Segment - 93 - Microsoft 365 Security Center - Introduction

Segment - 94 - How to use Microsoft Secure Score

Segment - 95 - Differences between the Azure and Microsoft Secure Score

Segment - 96 - Managing Incidents

Segment - 97 - Chapter Summary

Segment - 98 - Describe Endpoint Security with Microsoft Intune - Introduction

Segment - 99 - What is Intune

Segment - 100 - MDM and MAM

Segment - 101 - Endpoint Security with Intune

Segment - 102 - Chapter Summary

Segment - 17 - Describe identity concepts - Introduction

Segment - 18 - Common identity attacks

Segment - 19 - Identity As a Security perimeter

Segment - 20 - Four pillars of identity

Segment - 21 - Modern authentication and the role of the identity

Segment - 22 - SSO and the Concept of Federation

Segment - 23 - The concept of directory services and Active Directory

Segment - 24 - Describe the basic services and identity types - Introduction

Segment - 25 - Describe Azure Active Directory

Segment - 26 - Azure AD Editions

Segment - 27 - Describe the Azure AD Identity Types

Segment - 28 - Difference Between System and User Assigned Managed Identity

Segment - 29 - Describe the Types External Identities

Segment - 30 - Describe the Concept of Hybrid Identities

Segment - 31 - Describe the Authentication Capabilities of Azure - Introduction

Segment - 32 - Describe the Different Authentication Methods

Segment - 33 - Security Defaults and MFA

Segment - 34 - MFA in Azure AD - Part 1

Segment - 35 - MFA in Azure AD - Part 2

Segment - 36 - Windows Hello

Segment - 37 - Why is Windows Hello Safer than a Password

Segment - 38 - Self-Service Password Reset in Azure AD

Segment - 39 - Password Protection and Management Capabilities of Azure AD

Segment - 40 - Protecting Against Password Spray

Segment - 41 - Hybrid security

Segment - 42 - Describe the access management Capabilities of Azure AD

Segment - 43 - Conditional access in Azure AD

Segment - 44 - Conditional access in Azure AD - II

Segment - 45 - Conditional access in Azure AD - III

Segment - 46 - Azure AD Roles Custom Roles

Segment - 47 - Chapter Summary

Segment - 48 - Describe the identity protection and governance capabilities of Azure AD

Segment - 49 - What is Identity Governance?

Segment - 50 - What is Identity lifecycle?

Segment - 51 - Access Lifecycle-edited

Segment - 52 - Privileged access lifecycle

Segment - 53 - What is Entitlement management?

Segment - 54 - Azure AD access reviews

Segment - 55 - Azure AD terms of use

Segment - 56 - Capabilities of Privileged identity Management

Segment - 103 - Module 4 introduction

Segment - 104 - Common Compliance Needs

Segment - 105 - Common Compliance Regulations

Segment - 106 - Compliance Center

Segment - 107 - What is Compliance Manager

Segment - 108 - What are Controls

Segment - 109 - What are Assessments

Segment - 110 - Understand Compliance Score

Segment - 111 - Chapter Summary

Segment - 112 - The Information Protection and Governance Capabilities of Microsoft 365

Segment - 113 - Know Your Data, Protect Your Data, and Govern Your Data

Segment - 114 - Data Classification Capabilities of Compliance Center

Segment - 115 - Content Explorer and Activity Explorer

Segment - 116 - Sensitivity Labels

Segment - 117 - Label Policies

Segment - 118 - Data Loss Prevention

Segment - 119 - Data Loss Prevention on Endpoints and Teams

Segment - 120 - Retention Polices and Retention Labels

Segment - 121 - Records Management

Segment - 122 - Chapter Summary

Segment - 123 - The Insider Risk Capabilities in Microsoft - Introduction

Segment - 124 - Insider Risk Management Workflow

Segment - 125 - Insider Risk Management Workflow

Segment - 126 - Communication Compliance

Segment - 127 - Information Barriers in Microsoft Teams

Segment - 128 - Privileged Access Management

Segment - 129 - Customer Lockbox

Segment - 130 - Lesson Summary

Segment - 131 - eDiscovery Capabilities of Microsoft M365 - Introduction

Segment - 132 - The Purpose of eDiscovery

Segment - 133 - The Capabilities of the Content Search

Segment - 134 - The Core eDiscovery Workflow

Segment - 135 - The Advanced eDiscovery workflow

Segment - 136 - Lesson Summary

Segment - 137 - The Audit Capabilities of Microsoft 365- Introduction

Segment - 138 - The Core Audit Capabilities of M365

Segment - 139 - What are the Advance Auditing Capabilities

Segment - 140 - High Bandwidth for O365 APi Activities

Segment - 141 - Lesson Summary

Segment - 142 - Describe the Resource Governance Capabilities- Introduction

Segment - 143 - Resource Manager - Locks

Segment - 144 - What is Azure Blueprints

Segment - 145 - What is Azure Policy

Segment - 146 - Difference between Azure Policy and RBAC

Segment - 147 - Cloud Adoption Framework