% Off Udemy Coupon - CoursesWyn

SC-900: Microsoft Security, Compliance and Identity

Pass SC-900 | Elevate your Career

$9.99 (92% OFF)
Get Course Now

About This Course

<div>This course contains the use of artificial intelligence.</div><div><br></div><div>This SC-900 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the SC-900: Microsoft Security, Compliance and Identity exam. This course systematically guides you from the basics to advanced concepts of Microsoft Security, Compliance and Identity.</div><div><br></div><div>By mastering Microsoft Security, Compliance and Identity, you're developing expertise in essential topics in today's cybersecurity landscape.</div><div><br></div><div>The course is always aligned with Microsoft's latest study guide and exam objectives:</div><div><br></div><div>Skills at a glance</div><div><br></div><div><ul><li>Describe the concepts of security, compliance, and identity (10–15%)</li><li><span style="font-size: 1rem;">Describe the capabilities of Microsoft Entra (25–30%)</span></li><li><span style="font-size: 1rem;">Describe the capabilities of Microsoft security solutions (35–40%)</span></li><li><span style="font-size: 1rem;">Describe the capabilities of Microsoft compliance solutions (20–25%)</span></li></ul><span style="font-size: 1rem;">Describe the concepts of security, compliance, and identity (10–15%)</span></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">Describe security and compliance concepts</span></div><div><ul><li><span style="font-size: 1rem;">Describe the shared responsibility model</span></li><li><span style="font-size: 1rem;">Describe defense-in-depth</span></li><li><span style="font-size: 1rem;">Describe the Zero Trust model</span></li><li><span style="font-size: 1rem;">Describe encryption and hashing</span></li><li><span style="font-size: 1rem;">Describe Governance, Risk, and Compliance (GRC) concepts</span></li></ul></div><div><span style="font-size: 1rem;">Define identity concepts</span></div><div><ul><li><span style="font-size: 1rem;">Define identity as the primary security perimeter</span></li><li><span style="font-size: 1rem;">Define authentication</span></li><li><span style="font-size: 1rem;">Define authorization</span></li><li><span style="font-size: 1rem;">Describe identity providers</span></li><li><span style="font-size: 1rem;">Describe the concept of directory services and Active Directory</span></li><li><span style="font-size: 1rem;">Describe the concept of federation</span></li></ul></div><div><span style="font-size: 1rem;">Describe the capabilities of Microsoft Entra (25–30%)</span></div><div><br></div><div>Describe function and identity types of Microsoft Entra ID</div><div><ul><li><span style="font-size: 1rem;">Describe Microsoft Entra ID</span></li><li><span style="font-size: 1rem;">Describe types of identities</span></li><li><span style="font-size: 1rem;">Describe hybrid identity</span></li></ul></div><div><span style="font-size: 1rem;">Describe authentication capabilities of Microsoft Entra ID</span></div><div><ul><li>Describe the authentication methods</li><li><span style="font-size: 1rem;">Describe multi-factor authentication (MFA)</span></li><li><span style="font-size: 1rem;">Describe password protection and management capabilities</span></li></ul></div><div><span style="font-size: 1rem;">Describe access management capabilities of Microsoft Entra ID</span></div><div><ul><li><span style="font-size: 1rem;">Describe Conditional Access</span></li><li><span style="font-size: 1rem;">Describe Microsoft Entra roles and role-based access control (RBAC)</span></li></ul></div><div><span style="font-size: 1rem;">Describe identity protection and governance capabilities of Microsoft Entra</span></div><div><ul><li>Describe Microsoft Entra ID Governance</li><li><span style="font-size: 1rem;">Describe access reviews</span></li><li><span style="font-size: 1rem;">Describe the capabilities of Microsoft Entra Privileged Identity Management</span></li><li><span style="font-size: 1rem;">Describe Microsoft Entra ID Protection</span></li><li><span style="font-size: 1rem;">Describe Microsoft Entra Permissions Management</span></li></ul></div><div><span style="font-size: 1rem;">Describe the capabilities of Microsoft security solutions (35–40%)</span></div><div><br></div><div>Describe core infrastructure security services in Azure</div><div><ul><li><span style="font-size: 1rem;">Describe Azure distributed denial-of-service (DDoS) Protection</span></li><li><span style="font-size: 1rem;">Describe Azure Firewall</span></li><li><span style="font-size: 1rem;">Describe Web Application Firewall (WAF)</span></li><li><span style="font-size: 1rem;">Describe network segmentation with Azure virtual networks</span></li><li><span style="font-size: 1rem;">Describe network security groups (NSGs)</span></li><li><span style="font-size: 1rem;">Describe Azure Bastion</span></li><li><span style="font-size: 1rem;">Describe Azure Key Vault</span></li></ul></div><div><span style="font-size: 1rem;">Describe security management capabilities of Azure</span></div><div><ul><li><span style="font-size: 1rem;">Describe Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Describe Cloud Security Posture Management (CSPM)</span></li><li><span style="font-size: 1rem;">Describe how security policies and initiatives improve the cloud security posture</span></li><li><span style="font-size: 1rem;">Describe enhanced security features provided by cloud workload protection</span></li></ul></div><div><span style="font-size: 1rem;">Describe capabilities of Microsoft Sentinel</span></div><div><ul><li><span style="font-size: 1rem;">Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)</span></li><li><span style="font-size: 1rem;">Describe threat detection and mitigation capabilities in Microsoft Sentinel</span></li></ul></div><div><span style="font-size: 1rem;">Describe threat protection with Microsoft Defender XDR</span></div><div><ul><li><span style="font-size: 1rem;">Describe Microsoft Defender XDR services</span></li><li><span style="font-size: 1rem;">Describe Microsoft Defender for Office 365</span></li><li><span style="font-size: 1rem;">Describe Microsoft Defender for Endpoint</span></li><li><span style="font-size: 1rem;">Describe Microsoft Defender for Cloud Apps</span></li><li><span style="font-size: 1rem;">Describe Microsoft Defender for Identity</span></li><li><span style="font-size: 1rem;">Describe Microsoft Defender Vulnerability Management</span></li><li><span style="font-size: 1rem;">Describe Microsoft Defender Threat Intelligence (Defender TI)</span></li><li><span style="font-size: 1rem;">Describe the Microsoft Defender portal</span></li></ul></div><div><span style="font-size: 1rem;">Describe the capabilities of Microsoft compliance solutions (20–25%)</span></div><div><br></div><div>Describe Microsoft Service Trust Portal and privacy principles</div><div><ul><li><span style="font-size: 1rem;">Describe the Service Trust Portal offerings</span></li><li><span style="font-size: 1rem;">Describe the privacy principles of Microsoft</span></li><li><span style="font-size: 1rem;">Describe Microsoft Priva</span></li></ul></div><div><span style="font-size: 1rem;">Describe compliance management capabilities of Microsoft Purview</span></div><div><ul><li>Describe the Microsoft Purview compliance portal</li><li><span style="font-size: 1rem;">Describe Compliance Manager</span></li><li><span style="font-size: 1rem;">Describe the uses and benefits of compliance score</span></li></ul></div><div><span style="font-size: 1rem;">Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview</span></div><div><ul><li><span style="font-size: 1rem;">Describe the data classification capabilities</span></li><li><span style="font-size: 1rem;">Describe the benefits of Content explorer and Activity explorer</span></li><li><span style="font-size: 1rem;">Describe sensitivity labels and sensitivity label policies</span></li><li><span style="font-size: 1rem;">Describe data loss prevention (DLP)</span></li><li><span style="font-size: 1rem;">Describe records management</span></li><li><span style="font-size: 1rem;">Describe retention policies, retention labels, and retention label policies</span></li><li><span style="font-size: 1rem;">Describe unified data governance solutions in Microsoft Purview</span></li></ul></div><div><span style="font-size: 1rem;">Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview</span></div><div><ul><li>Describe insider risk management</li><li><span style="font-size: 1rem;">Describe eDiscovery solutions in Microsoft Purview</span></li><li><span style="font-size: 1rem;">Describe audit solutions in Microsoft Purview</span></li></ul></div><div><span style="font-size: 1rem;">This course contains promotional materials.</span></div>

What you'll learn:

  • Describe security and compliance concepts
  • Define identity concepts
  • Describe function and identity types of Microsoft Entra ID
  • Describe authentication capabilities of Microsoft Entra ID
  • Describe access management capabilities of Microsoft Entra ID
  • Describe identity protection and governance capabilities of Microsoft Entra
  • Describe core infrastructure security services in Azure
  • Describe security management capabilities of Azure
  • Describe capabilities of Microsoft Sentinel
  • Describe threat protection with Microsoft Defender XDR
  • Describe Microsoft Service Trust Portal and privacy principles
  • Describe compliance management capabilities of Microsoft Purview
  • Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
  • Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview