SC-900: Microsoft Security, Compliance and Identity Fundamentals - Certification Program
This course is a comprehensive overview of what effective business analysts really do - their strategies, techniques, tools and methods – all which apply to any process whether it’s a traditional large project, and Agile or DevOps project.
This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.
This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.
Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Identity is the new perimeter. Application developers and infrastructure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it.
This course begins with the concepts of Security, Compliance and Identity. We'll look at security methodologies, security concepts and Microsoft Security and compliance principles. We will check the concepts of zero trust methodology , shared responsibility model and defense in depth .
We'll then look at Microsoft Identity and Access Management Solutions. We'll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.
Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.
The final module is Microsoft Compliance Solutions. We'll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery and audit.
Here is the course coverage :
Describe the Concepts of Security, Compliance, and Identity (5-10%)
Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
Skills You Will Gain
Azure Sentinel
Microsoft 365 Defender
Microsoft Azure
Microsoft Security
SC 900
Learning Outcomes (At The End Of This Program, You Will Be Able To...)
Describe the concepts of Information security, compliance, and identity as it relates to Azure and related Microsoft Products
Describe the capabilities of Microsoft compliance solutions
Identify the capabilities of Microsoft security solutions
Describe the capabilities of Microsoft identity and access management solutions
Prerequisites
Basic Knowledge of security , compliance and Identity
Candidates should be familiar with Microsoft Azure and Microsoft 365
Concepts of Azure Active Directory would be helpful
Who Should Attend
This course is for broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.
Participants looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Participants must have the passion to learn and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Curriculum
Instructors
*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Welcome to the course!
2Module 1: Describe the concepts of security, compliance and identity
3Module 2: Describe the capabilities of Microsoft identity and access
4Module 3: Describe the capabilities of Microsoft security solution
5Module 4: Describe the capabilities of Microsoft compliance solution
Segment - 01 - Course Introduction
Segment - 02 - Security Concepts and Methodologies - Introduction
Segment - 03 - Zero Trust Guidelines
Segment - 04 - Zero Trust Six Foundational Pillars
Segment - 05 - Shared Responsibility Model
Segment - 06 - Defense in Depth Edited
Segment - 07 - The CIA Triad Edited
Segment - 08 - Describe Common Threats
Segment - 09 - Describe Encryption , hashing and Signing - I
Segment - 10 - Describe Encryption , hashing and Signing - II
Segment - 11 - Conclusion
Segment - 12 - Microsoft security and compliance principles - Introduction
Segment - 21 - Modern authentication and the role of the identity
Segment - 22 - SSO and the Concept of Federation
Segment - 23 - The concept of directory services and Active Directory
Segment - 24 - Describe the basic services and identity types - Introduction
Segment - 25 - Describe Azure Active Directory
Segment - 26 - Azure AD Editions
Segment - 27 - Describe the Azure AD Identity Types
Segment - 28 - Difference Between System and User Assigned Managed Identity
Segment - 29 - Describe the Types External Identities
Segment - 30 - Describe the Concept of Hybrid Identities
Segment - 31 - Describe the Authentication Capabilities of Azure - Introduction
Segment - 32 - Describe the Different Authentication Methods
Segment - 33 - Security Defaults and MFA
Segment - 34 - MFA in Azure AD - Part 1
Segment - 35 - MFA in Azure AD - Part 2
Segment - 36 - Windows Hello
Segment - 37 - Why is Windows Hello Safer than a Password
Segment - 38 - Self-Service Password Reset in Azure AD
Segment - 39 - Password Protection and Management Capabilities of Azure AD
Segment - 40 - Protecting Against Password Spray
Segment - 41 - Hybrid security
Segment - 42 - Describe the access management Capabilities of Azure AD
Segment - 43 - Conditional access in Azure AD
Segment - 44 - Conditional access in Azure AD - II
Segment - 45 - Conditional access in Azure AD - III
Segment - 46 - Azure AD Roles Custom Roles
Segment - 47 - Chapter Summary
Segment - 48 - Describe the identity protection and governance capabilities of Azure AD
Segment - 49 - What is Identity Governance?
Segment - 50 - What is Identity lifecycle?
Segment - 51 - Access Lifecycle-edited
Segment - 52 - Privileged access lifecycle
Segment - 53 - What is Entitlement management?
Segment - 54 - Azure AD access reviews
Segment - 55 - Azure AD terms of use
Segment - 56 - Capabilities of Privileged identity Management
About this course: Overview, Learning Outcomes, Who Should Enroll...
Anand Rao Nednur
He is a distinguished expert in cloud computing and cybersecurity with a deep passion for advancing IT infrastructure and security solutions. With extensive experience in Active Directory, AWS, Azure, and Google Cloud Platform, he has led numerous projects that integrate complex cloud technologies and enhance security measures.
His background spans a diverse range of roles, from senior cloud architect to cybersecurity consultant, where he has designed and implemented scalable cloud solutions, conducted security assessments, and guided organizations through successful cloud migrations. His expertise includes managing and optimizing cloud environments, with a focus on Azure governance, monitoring, and compliance.
He has a proven track record in advising on cloud security frameworks, identity and access management, and developing automation scripts to streamline processes. His approach is rooted in practical, hands-on experience, ensuring that theoretical knowledge is grounded in real-world application and addresses the latest challenges in cloud and security domains.
Committed to sharing his knowledge and insights, he delivers comprehensive training programs and consulting services to equip professionals with the skills needed to excel in cloud environments and cybersecurity. Whether through hands-on labs, practical case studies, or strategic consultations, his goal is to empower individuals and organizations to navigate the complexities of modern IT landscapes effectively.