Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A Course Overview

Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A Course Overview

The Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A course is designed to provide learners with foundational knowledge of security, compliance, and Identity management across cloud-based and related Microsoft services. The course is divided into four modules, each focusing on a different aspect of Microsoft's security and compliance capabilities.

In Module 1, participants are introduced to the basic concepts of security, compliance, and identity, setting the stage for a deeper dive into these areas.

Module 2 covers the capabilities of Microsoft Azure Active Directory (Azure AD), which is an integral part of Microsoft Entra. This module provides hands-on labs to explore Azure AD services, Authentication, Access management, and Identity protection.

Module 3 focuses on the security solutions available within Microsoft's ecosystem, including Azure security features, Azure Sentinel, and Microsoft 365 Defender. Learners will engage with labs to gain practical experience with these tools.

Lastly, Module 4 delves into Microsoft's compliance solutions, discussing the Information protection, Governance, eDiscovery, and Audit capabilities provided by Microsoft Purview and other tools, complemented by practical labs.

This course will benefit learners by equipping them with the skills to understand and leverage Microsoft's security and compliance features to protect data and comply with legal and regulatory standards.

CoursePage_session_icon

Successfully delivered 145 sessions for over 7,154 professionals

Purchase This Course

525

  • Live Training (Duration : 8 Hours)
  • Per Participant
  • Guaranteed-to-Run (GTR)

Filter By:

♱ Excluding VAT/GST

Classroom Training price is on request

You can request classroom training in any city on any date by Requesting More Information

  • Live Training (Duration : 8 Hours)
  • Per Participant

♱ Excluding VAT/GST

Classroom Training price is on request

You can request classroom training in any city on any date by Requesting More Information

Request More Information

Email:  WhatsApp:

Koenig's Unique Offerings

Course Prerequisites

Certainly! Below are the minimum required prerequisites for successfully undertaking the Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A course:

 

  • Familiarity with basic IT concepts and terminology.
  • Understanding of general security principles and challenges that organizations face.
  • Basic knowledge of Microsoft Azure services and the concept of cloud computing.
  • Awareness of general data protection regulations and standards (such as GDPR).
  • Access to a reliable internet connection and a computer to perform the labs and access course materials.
  • No prior experience with Microsoft 365 or Azure Active Directory is required, but any experience would be beneficial.

 

Please note that these prerequisites are designed to ensure that students have a foundational understanding of the topics that will be covered in the course. The course itself is intended to be an entry point for those looking to learn more about Microsoft's security, compliance, and identity solutions.

RoadMaps

Target Audience for Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A

The Microsoft SC-900 course offers foundational knowledge in security, compliance, and identity across cloud-based and related Microsoft services.

  • IT professionals looking to understand Microsoft security and compliance solutions

  • Security administrators seeking knowledge of Microsoft's security, compliance, and identity ecosystem

  • Compliance officers who need to grasp Microsoft's compliance solutions

  • Systems administrators aiming to learn about Azure Active Directory and Microsoft security capabilities

  • Network administrators interested in Azure's security management and threat protection

  • Identity managers exploring identity concepts and Azure AD's identity protection and governance

  • Data protection officers requiring insight into Microsoft 365's information protection and governance

  • IT support staff who provide troubleshooting and support for security-related issues

  • Risk management professionals wanting to understand Microsoft's insider risk capabilities

  • Legal professionals or paralegals involved in eDiscovery and audit processes within Microsoft solutions

  • Cloud architects interested in Microsoft's security and compliance features

  • Security-focused sales engineers and pre-sales architects who advise clients on Microsoft 365 and Azure security solutions

  • Fresh graduates and IT enthusiasts beginning their career in cloud security and compliance

  • Business stakeholders who need to ensure their organization meets compliance standards with Microsoft tools

  • Managed service providers offering security and compliance services for Microsoft environments

  • Cybersecurity consultants looking to expand their knowledge of Microsoft security solutions

  • Government officials or employees in regulatory roles who oversee or implement compliance standards

  • Security trainers and educators who provide training on Microsoft security and compliance solutions

  • Technical decision-makers evaluating or planning to implement Microsoft security and compliance solutions in their organizations

  • Professionals preparing for the Microsoft Security, Compliance, and Identity Fundamentals certification exam

Learning Objectives - What you will Learn in this Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A?

Introduction to Learning Outcomes:

Gain foundational knowledge in Microsoft Security, Compliance, and Identity (SCI) concepts and tools, focusing on Azure AD capabilities, Microsoft security and compliance solutions, and hands-on labs to reinforce learning.

Learning Objectives and Outcomes:

  • Understand key security principles and how they apply to the Microsoft ecosystem.
  • Describe the various identity types and services provided by Azure Active Directory (Azure AD).
  • Identify and explain Azure AD's authentication methods, including multi-factor authentication and conditional access.
  • Explore Azure AD's access management capabilities, such as role-based access control and Privileged Identity Management.
  • Comprehend the basics of Azure's security features, including secure network connectivity and threat protection strategies.
  • Learn about Azure Sentinel's security information and event management (SIEM) and security orchestration automated response (SOAR) capabilities.
  • Understand Microsoft 365 Defender's threat protection services and how they integrate with Microsoft's security solutions.
  • Discover the elements of Microsoft's compliance solutions, including information protection, governance, and risk management in Microsoft Purview.
  • Explore data lifecycle management, eDiscovery, and audit functions, and how these play a role in organizational compliance.
  • Apply knowledge through practical labs, including exploring Azure policies, sensitivity labels, and insider risk management in Microsoft Purview.

Technical Topic Explanation

Microsoft Azure Active Directory (Azure AD)

Microsoft Azure Active Directory (Azure AD) is a cloud-based service that helps organizations manage user identities and create secure access policies for applications and data. Essentially, it's a platform that ensures only authorized users can access certain resources, helping businesses maintain security and compliance. Azure AD provides tools for identity protection, single sign-on, and multi-factor authentication, making it easier to manage and protect user identities across an organization’s cloud and hybrid environments. This service is crucial for businesses looking to streamline their security and access management while leveraging the cloud.

Authentication

Authentication is a security process that verifies the identity of a user or device attempting to access a system. It ensures that individuals or machines are who they claim to be before granting access to sensitive data or functionalities. This is typically achieved through credentials like passwords, biometric data, or security tokens. Effective authentication minimizes unauthorized access and is crucial in maintaining data integrity and protection across various platforms, including those outlined in the Microsoft Security, Compliance, and Identity fundamentals (SC 900) training.

Access management

Access management is a crucial security practice that controls who can access and use company resources and data. It involves identifying, authenticating, and authorizing individuals or groups to have appropriate access to applications, systems, and networks. Effective access management ensures that the right individuals have the right access at the right times, thus safeguarding sensitive information from unauthorized access or breaches. This process plays a fundamental role in maintaining operational integrity and protecting the company's assets in both physical and digital realms.

Identity management

Identity management involves the processes and technologies that manage and secure an individual's identification within a system, such as an organization. It ensures that the right people access the appropriate resources and services at the right times for legitimate reasons. Identity management systems include elements of overseeing user access through roles and policies, protecting data and ensuring compliance with various regulations. These systems are critical in all tech environments for maintaining operational integrity and preventing unauthorized access.

Authentication

Authentication is the process of verifying the identity of a user or device before granting access to a system or network. It ensures that only authorized individuals can enter or interact with secured environments. This function is vital for maintaining system integrity and protecting sensitive information. Common methods include passwords, biometric scans, or security tokens. Authentication is a cornerstone of security protocols and a fundamental element in maintaining digital security and compliance.

Security

Security in the context of Microsoft's SC 900 training focuses on teaching the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services. This certification covers core concepts of security and compliance, key components of Microsoft security solutions, and the integration of Microsoft services in protecting data, apps, and resources. It aims to equip professionals with the knowledge to uphold security standards and ensure compliance while managing identities effectively, crucial for any organization leveraging Microsoft technology for secure operations.

Compliance

Compliance in the Microsoft security framework refers to adhering to a set of standards and regulations that govern data protection and privacy. This involves understanding and implementing the right controls and policies to ensure that an organization's data and applications, stored on Microsoft platforms, are secure. Training through programs like the SC 900 course, formally known as Microsoft Security Compliance and Identity Fundamentals, is critical. This course equips professionals with essential knowledge regarding Microsoft's security, compliance, and identity solutions to manage compliance effectively across their digital environments.

Microsoft Azure Active Directory (Azure AD)

Microsoft Azure Active Directory (Azure AD) is a cloud-based service that manages employee access to various applications and services. It acts like a virtual directory where you can add, modify, and manage users and groups, establishing who can access what within your organization. Azure AD includes features to enhance security such as multi-factor authentication and conditional access policies. It also integrates smoothly with other Microsoft services, supporting overall security and compliance management efforts in areas like identity protection and data governance, crucial for business operations in today's digital environment.

Access management

Access management is the process of identifying, tracking, and controlling who has access to a system or network. This involves granting or denying permissions to users or groups based on their roles to ensure they can only access the information necessary to perform their duties. Effective access management helps protect against unauthorized access, reduces the risk of security breaches, and ensures compliance with data protection regulations. Techniques used include password management, multi-factor authentication, and user activity reviews, all critical for maintaining the integrity and security of information systems.

Identity protection

Identity protection in the context of Microsoft Security Compliance and Identity, specifically covered in the SC 900 training, involves securing and managing user identities and access within a digital environment. This includes safeguarding personal and organizational data from unauthorized access, theft, or compromise. The Microsoft SC 900 course, part of the Microsoft Security Compliance and Identity Fundamentals program, educates professionals on how to implement and manage security protocols, ensuring that identities are verified and protected effectively across various platforms and systems.

Security

Azure security features encompass a range of tools and protocols designed to protect data, applications, and resources hosted on the Microsoft Azure platform. This includes network security, identity management, threat protection, and information protection. Key elements include Azure Active Directory for identity services, Azure Security Center for unified security management, and Azure Information Protection for data encryption and access control. These features help in meeting the compliance standards necessary for many businesses, ensuring that security and privacy requirements are met effectively.

Azure Sentinel

Azure Sentinel is a cloud-native security information and event management (SIEM) solution by Microsoft. It collects data across your entire IT environment, detecting threats using built-in AI. This tool enables you to respond rapidly to incidents by offering clear, actionable insights. Azure Sentinel helps to automate threat response, and integrates with various Microsoft products for a seamless security setup. It is part of the broader Microsoft Security, Compliance, and Identity offerings. This integration ensures that organizations not only detect threats but also enhance their compliance and governance posture efficiently.

Microsoft 365 Defender

Microsoft 365 Defender is an integrated security solution that helps protect organizations across various Microsoft services. It unifies security management, providing comprehensive defense against threats like phishing, malware, and ransomware, by combining threat protection for email, applications, devices, and identities. This tool utilizes advanced analytics and automation to detect, investigate, and respond to cyber threats in real time, ensuring enhanced security for business data and reducing the complexity typically associated with managing multiple security products. Microsoft 365 Defender simplifies the security landscape, making it more manageable and effective for businesses of all sizes.

Audit capabilities

Audit capabilities in technology refer to the processes and tools that track and record user activities and system changes to ensure security and compliance with internal policies and external regulations. These capabilities help organizations monitor and analyze operations to detect unauthorized access, data manipulation, and potential security breaches. Effective auditing helps in maintaining integrity and accountability, increasing transparency, and protecting sensitive information from threats, which is paramount in upholding an organization's credibility and compliance standards.

Information protection

Information protection is a critical aspect of cybersecurity that focuses on safeguarding sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction. This includes personal information, intellectual property, and other types of confidential data. Protecting this information ensures privacy, maintains trust between parties, and complies with regulatory requirements. Techniques used include encryption, access control, data masking, and information rights management. Microsoft's Security, Compliance, and Identity Fundamentals SC-900 training covers these concepts, helping professionals understand Microsoft's security, compliance, and identity solutions in a cloud-based environment.

Governance

Governance in a professional setting involves developing and implementing policies, procedures, and controls to manage an organization's operations and ensure compliance with laws and regulations. It includes overseeing strategic decision-making, managing risks, and ensuring ethical conduct. Effective governance helps organizations maintain transparency, accountability, and efficiency, enhancing trust among stakeholders and facilitating long-term success. In technology environments, especially involving platforms like Microsoft Security Compliance and Identity, it ensures alignment of IT systems with business goals and compliance with security standards.

eDiscovery

eDiscovery, or electronic discovery, refers to the process where electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. In today’s digital age, eDiscovery is crucial for legal and compliance issues because it can uncover significant information relevant to a case from vast amounts of digital data. This process is pivotal in managing and extracting relevant data during legal proceedings and is influenced by principles found in both the Microsoft Security Compliance and Identity, particularly in courses like SC 900, where basics of managing, controlling, and protecting data are covered.

Microsoft Purview

Microsoft Purview is a comprehensive data governance service that helps organizations manage and secure their data across various platforms. It integrates tools for data discovery, classification, protection, and compliance, allowing businesses to understand and control their data landscape effectively. Purview supports multiple regulations, ensuring data compliance and simplifying the management of security and privacy risks. By offering a unified data governance solution, Microsoft Purview plays a crucial role in enhancing organizational transparency and accountability in data handling.

Identity protection

Identity protection involves safeguarding personal and organizational data from unauthorized access, theft, and misuse. It focuses on technologies and policies that verify and manage the identity of users and devices accessing sensitive information. Key strategies include multifactor authentication, secure access management, and continuous monitoring of security activities. Training courses like the Microsoft SC 900 cover these aspects under the umbrella of Microsoft Security Compliance and Identity, providing foundational knowledge necessary to understand and implement effective security measures in a digital environment. These fundamentals are essential for maintaining privacy and preventing potential security breaches.

Security

Azure security features provide robust protection for your data and applications on Microsoft's cloud platform. They offer a multi-layered security model, securing both data at rest and in transit. Tools like Azure Active Directory and Azure Security Center help manage identity access, detect threats, and enhance security compliance. Features such as advanced threat protection and multi-factor authentication ensure that only authorized users can access sensitive information, while compliance managers help meet legal and regulatory standards. These capabilities are crucial aspects of the Microsoft Security Compliance and Identity Fundamentals (SC 900) training, aiming to deepen understanding of these critical security measures.

Azure Sentinel

Azure Sentinel is a cloud-native security information and event management (SIEM) platform by Microsoft. It gathers data across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds. Sentinel uses advanced AI to analyze and detect potential threats quickly and provides tools for automating common security tasks. With Sentinel, organizations can visualize and investigate threats, respond to incidents effectively, and improve their overall security posture, integrating seamlessly with other Microsoft security products. This makes it a powerful and flexible tool for modern cybersecurity needs.

Governance

Governance in technology refers to the framework of policies and practices that ensure an organization’s IT systems and data are managed compliantly and responsibly while supporting business strategies and objectives. It involves oversight mechanisms, standards, and guidelines for achieving accountability in the use of technology. Effective governance ensures that IT resources are utilized wisely, risks are managed properly, and IT supports the overall operational integrity and compliance with laws and regulations.

Microsoft 365 Defender

Microsoft 365 Defender is a comprehensive security solution designed to protect organizations across various domains including emails, documents, identity, and endpoints. It integrates multiple security technologies to provide a unified pre- and post-breach defense, offering preventative protection, post-breach detection, automated investigation, and response capabilities. This tool leverages artificial intelligence to analyze and combat cyber threats, thus helping to secure business data and enhance security operations within an organization. Microsoft 365 Defender simplifies administration and strengthens the security posture by giving a holistic view across multiple layers of defense in a single dashboard.

Information protection

Information protection is the practice of securing sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction. This is key in maintaining privacy, ensuring compliance with regulations, and protecting the integrity and confidentiality of information. Courses like SC-900 training, part of the Microsoft Security Compliance and Identity fundamentals, are designed to educate professionals on these principles, enhancing skills in managing security protocols and compliance standards within Microsoft environments. This knowledge is critical in today’s digital landscape, where data breaches can have significant financial and reputational impacts.

eDiscovery

eDiscovery, or electronic discovery, refers to the process where electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. It involves managing large volumes of digital data and ensures that this information is preserved in a legal and secure way. This procedure is crucial in civil litigation and is becoming increasingly important in corporate settings for compliance and recovery purposes. Methods from IT solutions are often employed to handle the complexity and volume of data, streamlining the search and retrieval processes efficiently.

Audit capabilities

Audit capabilities in technology allow organizations to monitor and record various actions and changes within their IT systems and applications. This is crucial for ensuring compliance with regulatory standards, identifying security threats, and maintaining operational integrity. Through logging activities, systems administrators can track who accessed or modified information, when this was done, and what specific changes were made. This ensures transparency and allows for a thorough analysis in case of discrepancies or breaches. Audit capabilities form the backbone of effective security compliance and play a pivotal role in managing organizational risk.

Microsoft Purview

Microsoft Purview is a comprehensive governance, risk management, and compliance platform designed to help organizations better understand and control their data across various services and devices. It integrates functionalities to manage, monitor, and protect data, ensuring it adheres to legal and regulatory standards. Purview facilitates transparency and control over data use, helping businesses ensure privacy and compliance while enabling effective data governance and risk assessment to support broader security and compliance goals within their IT environments.

Access management

Access management is the process of regulating who can view or use resources in a computing environment. It encompasses identification, authentication, and authorization, ensuring only approved users can perform actions or access information. This practice is critical for maintaining security and compliance within organizations, aiding in protecting sensitive data from unauthorized access. Technologies like Microsoft Security Compliance and Identity Fundamentals SC 900 are fundamental to mastering access management strategies, helping ensure systems' security through meticulous user and identity governance.

Audit capabilities

Audit capabilities refer to the systems and features that monitor, verify, and record various business operations and transactions, ensuring compliance with regulatory standards and internal policies. These capabilities provide a detailed and traceable history of events, helping organizations to identify, analyze, and respond to potential risks or breaches. With effective audit functions, businesses can enhance their security measures, improve transparency, and maintain the integrity of their data, which is essential for both managing risks and supporting business decision-making processes.

Authentication

Authentication is a security process that verifies the identity of a user or device accessing a network or system. It ensures that individuals or entities are who they claim to be before granting access to sensitive data and resources. Common methods include passwords, biometric data, or security tokens. By accurately verifying identity, authentication helps protect against unauthorized access and breaches, maintaining the integrity and confidentiality of systems.

Identity management

Security, compliance, and identity management involve protecting information and systems from unauthorized access and ensuring they adhere to standards and laws. Security encompasses measures that defend data, compliance refers to obeying legal and policy requirements, and identity management is about controlling who can access certain information. The Microsoft Security, Compliance, and Identity Fundamentals SC 900 course offers training on these concepts, helping professionals understand the basics essential for safeguarding their IT environment. This knowledge is crucial for anyone involved in the technical aspects of an organization to ensure secure and compliant practices.

Microsoft Azure Active Directory (Azure AD)

Microsoft Azure Active Directory (Azure AD) is a cloud-based service for managing identity and access. It helps organizations ensure that the right people have the right access to technology resources. Azure AD manages user IDs and passwords, provides a secure login process, and works seamlessly across devices and applications. It supports Microsoft Office applications and a variety of third-party applications, offering a robust platform for ensuring security and compliance in managing identities. This feature is integral to maintaining cybersecurity and effective business operations, particularly relevant for learning in courses like Microsoft Security, Compliance, and Identity Fundamentals (SC 900).

Identity protection

Identity protection involves safeguarding personal and organizational information from unauthorized access, use, disclosure, disruption, modification, or destruction. Methods such as strong authentication procedures, encryption, and monitoring systems are key. Focusing on areas covered in Microsoft SC 900 training, this topic is essential within frameworks like Microsoft Security Compliance and Identity Fundamentals SC 900. It ensures that identity-related security risks are managed effectively in Microsoft environments, emphasizing the importance of establishing robust protocols that protect both individual and corporate identities. Understanding this forms a fundamental part of mastering Microsoft Security Compliance and Identity practices.

Microsoft Purview

Microsoft Purview is a unified data governance service that helps organizations manage and govern their data across various platforms. It enables businesses to map, classify, protect, and monitor data no matter where it resides. By providing comprehensive tools for data compliance and risk management, Purview helps enterprises meet legal and regulatory standards effectively. This service integrates with multiple Microsoft products, enhancing security, privacy, and compliance capabilities, making it crucial for businesses focused on maintaining robust data governance and management practices.

Security

Azure security features encompass a variety of tools and protocols designed to safeguard data, apps, and infrastructure from cyber threats. Key features include identity and access management through Azure Active Directory, threat protection with Azure Security Center, and information protection via Azure Information Protection. Microsoft emphasizes security compliance and identity fundamentals, especially in courses like SC 900 Training, which orient users on leveraging Microsoft security tools effectively. This security framework helps maintain privacy and compliance standards, crucial for businesses in today's digital landscape.

Azure Sentinel

Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that provides security analytics and threat intelligence across an enterprise. It aggregates data from various sources, including users, applications, servers, and devices, to detect, investigate, and respond to potential threats. With Azure Sentinel, organizations can visualize security data, set automated responses to certain alerts, and use advanced AI to identify patterns that may indicate a security issue. By integrating with various tools and providing a scalable, secure environment, Azure Sentinel helps streamline security operations and improve overall cybersecurity posture.

Microsoft 365 Defender

Microsoft 365 Defender is an integrated platform for protecting all of Microsoft 365's services. It combines threat protection for email, collaboration tools, identity, and endpoints. Specifically designed to counter various cyber threats, Microsoft 365 Defender prevents, detects, and responds to potential threats in real-time. By utilizing advanced artificial intelligence, it consolidates alerts and automates responses, elevating security operations and simplifying threat management. This holistic approach ensures that organizations can protect their data and resources from emerging cyber threats effectively, enhancing overall productivity and compliance.

Governance

Governance in the context of technology refers to the structures, policies, and mechanisms used to control, manage, and audit the use, security, performance, and integrity of IT systems and data within an organization. It ensures that IT resources are used responsibly and align with the organization's goals and regulatory requirements, optimizing efficiency and reducing risk. Effective governance enables organizations to achieve compliance and enhance decision-making processes while safeguarding assets and maintaining stakeholders' trust.

Information protection

Information protection refers to securing sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction. This aspect of cybersecurity is crucial for maintaining the privacy and integrity of data across various platforms. Microsoft Security, Compliance, and Identity fundamentals (SC 900) focus on this area by teaching key concepts and methods through the SC 900 training. These include how to manage compliance and identity solutions in Microsoft environments effectively, ensuring that data is safe and regulatory requirements are met, keeping organizations secure and compliant.

eDiscovery

eDiscovery, or electronic discovery, refers to the process of identifying, collecting, and producing electronically stored information (ESI) in response to a legal request, such as a lawsuit or investigation. ESI includes emails, documents, presentations, databases, voicemails, audio and video files, and social media content. The aim of eDiscovery is to provide a comprehensive compilation of relevant digital data, ensuring compliance with legal obligations and supporting important decision-making during legal proceedings, regulatory compliance, or governmental inquiries. This process requires the integration of legal, technological, and security measures to properly handle and protect sensitive information.

Target Audience for Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A

The Microsoft SC-900 course offers foundational knowledge in security, compliance, and identity across cloud-based and related Microsoft services.

  • IT professionals looking to understand Microsoft security and compliance solutions

  • Security administrators seeking knowledge of Microsoft's security, compliance, and identity ecosystem

  • Compliance officers who need to grasp Microsoft's compliance solutions

  • Systems administrators aiming to learn about Azure Active Directory and Microsoft security capabilities

  • Network administrators interested in Azure's security management and threat protection

  • Identity managers exploring identity concepts and Azure AD's identity protection and governance

  • Data protection officers requiring insight into Microsoft 365's information protection and governance

  • IT support staff who provide troubleshooting and support for security-related issues

  • Risk management professionals wanting to understand Microsoft's insider risk capabilities

  • Legal professionals or paralegals involved in eDiscovery and audit processes within Microsoft solutions

  • Cloud architects interested in Microsoft's security and compliance features

  • Security-focused sales engineers and pre-sales architects who advise clients on Microsoft 365 and Azure security solutions

  • Fresh graduates and IT enthusiasts beginning their career in cloud security and compliance

  • Business stakeholders who need to ensure their organization meets compliance standards with Microsoft tools

  • Managed service providers offering security and compliance services for Microsoft environments

  • Cybersecurity consultants looking to expand their knowledge of Microsoft security solutions

  • Government officials or employees in regulatory roles who oversee or implement compliance standards

  • Security trainers and educators who provide training on Microsoft security and compliance solutions

  • Technical decision-makers evaluating or planning to implement Microsoft security and compliance solutions in their organizations

  • Professionals preparing for the Microsoft Security, Compliance, and Identity Fundamentals certification exam

Learning Objectives - What you will Learn in this Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A?

Introduction to Learning Outcomes:

Gain foundational knowledge in Microsoft Security, Compliance, and Identity (SCI) concepts and tools, focusing on Azure AD capabilities, Microsoft security and compliance solutions, and hands-on labs to reinforce learning.

Learning Objectives and Outcomes:

  • Understand key security principles and how they apply to the Microsoft ecosystem.
  • Describe the various identity types and services provided by Azure Active Directory (Azure AD).
  • Identify and explain Azure AD's authentication methods, including multi-factor authentication and conditional access.
  • Explore Azure AD's access management capabilities, such as role-based access control and Privileged Identity Management.
  • Comprehend the basics of Azure's security features, including secure network connectivity and threat protection strategies.
  • Learn about Azure Sentinel's security information and event management (SIEM) and security orchestration automated response (SOAR) capabilities.
  • Understand Microsoft 365 Defender's threat protection services and how they integrate with Microsoft's security solutions.
  • Discover the elements of Microsoft's compliance solutions, including information protection, governance, and risk management in Microsoft Purview.
  • Explore data lifecycle management, eDiscovery, and audit functions, and how these play a role in organizational compliance.
  • Apply knowledge through practical labs, including exploring Azure policies, sensitivity labels, and insider risk management in Microsoft Purview.
Microsoft Security, Compliance, and Identity Fundamentals SC-900T00-A