SC-900: Microsoft Security, Compliance, & Identity with SIMS

- 85%

0
Certificate

Paid

Language

Level

Beginner

Last updated on September 11, 2024 2:37 am

Gain hands-on knowledge and secure Microsoft 365/Azure Services with our comprehensive SC-900 exam training. Learn from an experienced instructor and access simulations anytime, anywhere!

Add your review

What you’ll learn

  • Learn the concepts and perform hands on activities needed to pass the SC-900 exam
  • Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services
  • Get loads of hands on experience with securing Microsoft 365 / Azure Services
  • Utilize hands on simulations that can be access anytime, anywhere!

We really hope you’ll agree, this training is way more then the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • Having a Solid Foundation of Active Directory Domains

  • Having a Solid Foundation of RAS, DMZ, and Virtualization

  • Having a Solid Foundation of the Microsoft Cloud Services

  • Questions for John Christopher

Performing hands on activities

  • IMPORTANT Using Assignments in the course

  • Creating a free Microsoft 365 Azure AD Account

  • Getting your free Azure credit

Describe security and compliance concepts

  • Describe the shared responsibility model

  • Describe defense in depth

  • Describe the Zero-Trust model

  • Describe encryption and hashing

  • Describe compliance concepts

Define identity concepts

  • Define identity as the primary security perimeter

  • Define authentication

  • Define authorization

  • Describe identity providers and the concept of Federation

  • Describe Active Directory

Describe the basic identity services and identity types of Azure AD

  • Describe Azure AD

  • Describe Azure AD identities including external identities

  • Describe hybrid identity

Describe the authentication capabilities of Azure AD

  • Describe the authentication methods available in Azure AD

  • Describe Multi-factor Authentication

  • Describe self-service password reset

  • Describe password protection and management capabilities available in Azure AD

Describe access management capabilities of Azure AD

  • Describe conditional access

  • Describe the benefits of Azure AD roles

  • Describe the benefits of Azure AD role-based access control

Describe the identity protection and governance capabilities of Azure AD

  • Describe identity governance in Azure AD

  • Describe entitlement management

  • Describe access reviews

  • Describe the capabilities of Azure AD Privileged Identity Management (PIM)

  • Implementing Azure AD Privileged Identity Management (PIM)

  • Describe Azure AD Identity Protection

Describe basic security capabilities in Azure

  • Visualizing general Azure networking

  • Describe Azure DDoS protection

  • Describe Azure Firewall

  • Describe Network Segmentation with VNet

  • Describe Azure Network Security groups

  • Create a virtual machine in Azure

  • Describe Azure Bastion and JIT Access

  • Describe ways Azure encrypts data

Describe security management capabilities of Azure

  • Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)

  • Describe the enhanced security features of Microsoft Defender for Cloud

  • Describe security baselines for Azure

Describe security capabilities of Microsoft Sentinel

  • Define the concepts of SIEM and SOAR

  • Setting up a log analytics workspace for using Sentinel

  • Describe how Microsoft Sentinel provides integrated threat management

Describe threat protection with Microsoft 365 Defender

  • Describe Microsoft 365 Defender services

  • Describe Microsoft Defender for Office 365

  • Describe Microsoft Defender for Endpoint

  • Describe Microsoft Defender for Cloud Apps

  • Using Microsoft Defender for Cloud Apps for policy creation

  • Describe Microsoft Defender for Identity

  • Basics of setting up Microsoft Defender for Identity

  • Describe the Microsoft 365 Defender portal

Describe Microsoft’s Service Trust Portal and privacy principles

  • Describe the offerings of the Service Trust portal

  • Describe Microsoft’s privacy principles

Describe the compliance management capabilities of Microsoft Purview

  • Describe the Microsoft Purview compliance portal

  • Describe compliance manager

  • Describe the use and benefits of compliance score

Describe information protection & data lifecycle management of Microsoft Purview

  • Describe data classification capabilities

  • Describe the benefits of content explorer and activity explorer

  • Describe sensitivity labels

  • Basics of using sensitivity labels

  • Describe Data Loss Prevention (DLP)

  • Basics of using Data Loss Prevention (DLP)

  • Describe Records Management

  • Describe Retention Polices and Retention Labels

Describe insider risk capabilities in Microsoft Purview

  • Describe Insider Risk Management

  • Describe communication compliance

  • Describe information barriers

Describe resource governance capabilities in Azure

  • Describe Azure Policy

  • Describe Azure Blueprints

  • Describe the capabilities of the Microsoft Purview governance portal

Finishing Up

  • Where do I go from here?

Who this course is for:

  • IT people interested in learning and passing the Microsoft SC-900 exam!
  • IT people interested in learning a tremendous amount about security in Microsoft 365 / Azure Services

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “SC-900: Microsoft Security, Compliance, & Identity with SIMS”

×

    Your Email (required)

    Report this page
    SC-900: Microsoft Security, Compliance, & Identity with SIMS
    SC-900: Microsoft Security, Compliance, & Identity with SIMS
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.