SC-900 Microsoft Security, Compliance, and Identity Fundamentals (SC-900T00)

Seminarinformationen

Seminar - Ziel

Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, and automate processes with Power Automate.

Teilnehmer - Zielgruppe

Candidates for this exam are users who aspire to improve productivity by automating business processes, analyzing data to produce business insights, and acting more effectively by creating simple app experiences.

Kurs - Voraussetzungen

No prerequisites for this course

Seminardauer

  • 1 Tag
  • 09:00 Uhr bis 17:00 Uhr

Schulungsunterlagen

  • nach Absprache

Seminar-Inhalt / Agenda

Describe security and compliance concepts

Learn about common security and compliance concepts that are foundational to Microsoft solutions. Topics include the shared responsibility and Zero Trust models, encryption, data residency and data sovereignty, and more.
Learning objectives

  • Describe the shared responsibility and the defense-in-depth security models.
  • Describe the Zero-Trust model.
  • Describe the concepts of encryption and hashing.
  • Describe some basic compliance concepts.

Describe identity concepts

Learn about the key concepts of authentication and authorization and why identity is important in securing corporate resources. You'll also learn about some identity-related services.

  • Describe the shared responsibility and the defense-in-depth security models.
  • Describe the Zero-Trust model.
  • Describe the concepts of encryption and hashing.
  • Describe some basic compliance concepts.

Describe the services and identity types of Azure AD

Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service. Learn about Azure AD, its services and the types of identities it supports.

  • Describe what Azure AD does.
  • Describe the types of identities Azure AD supports.

Describe the authentication capabilities of Azure AD

Learn about the authentication capabilities of Azure AD, multi-factor authentication, and how it improves security. You'll also learn about the password protection and management capabilities of Azure AD.

  • Describe the authentication methods of Azure AD.
  • Describe multi-factor authentication in Azure AD.
  • Describe the password protection and management capabilities of Azure AD.

Describe the access management capabilities of Azure AD

A key function of Azure AD is to manage access. Learn about the access management capabilities, its use cases, and benefits.

  • Describe Conditional Access in Azure AD.
  • Describe the benefits of Azure AD roles and role-based access control.

Describe the identity protection and governance capabilities of Azure AD

Azure AD provides identity protection and governance capabilities. Learn about these capabilities, the use cases, and benefits.

  • Describe the capabilities of identity governance in Azure.
  • Describe Privileged Identity Management.
  • Describe the capabilities of Azure Identity Protection.

Describe basic security capabilities in Azure

Learn about capabilities Azure supports to protect your network, VMs, and your data.

  • Learn how Azure security capabilities can protect the network
  • Learn how Azure can protect your VMs
  • Learn how encryption on Azure can protect your data

Describe security management capabilities of Azure

Learn about cloud security posture management and how Microsoft Defender for Cloud protects your cloud through secure score, recommendations, and enhanced features that provide cloud workload protection. You’ll also learn about security baselines in Azure.

  • Describe cloud security posture management.
  • Describe the capabilities of Microsoft Defender for Cloud
  • Understand the Azure Security Benchmark and the security baselines in Azure.

Describe security capabilities of Microsoft Sentinel

Learn about Microsoft Sentinel a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution

  • Describe the security concepts for SIEM and SOAR.
  • Describe how Microsoft Sentinel provides integrated threat management.
  • Describe the pricing models of Microsoft Sentinel.

Describe threat protection with Microsoft 365 Defender

Learn about Microsoft 365 Defender, a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.

  • Describe the Microsoft 365 Defender service.
  • Describe how Microsoft 365 Defender provides integrated protection against sophisticated attacks.
  • Describe and explore Microsoft 365 Defender portal.

Describe the Service Trust Portal and privacy at Microsoft

Microsoft runs on trust! Here you’ll explore the Service Trust Portal for content on how Microsoft delivers on our commitment of trust. You’ll also learn about Microsoft Priva, a solution to help meet privacy goals.

  • Describe the offerings of the Service Trust Portal.
  • Describe Microsoft's Privacy principles.
  • Describe Microsoft Priva.

Describe the compliance management capabilities in Microsoft Purview

Explore the Microsoft Purview compliance portal, the portal for organizations to manage their compliance needs. Learn about the Compliance Manager and compliance score, which can help organizations manage, simplify, and improve compliance across their organization.

  • Describe the Microsoft Purview compliance portal.
  • Describe Compliance Manager.
  • Describe the use and benefits of compliance score.

Describe information protection and data lifecycle management in Microsoft Purview

Information protection and data lifecycle management in Microsoft Purview helps organizations classify, protect, and retain their data where it lives and wherever it goes. Learn about data classification capabilities, data loss prevention, and records management.

  • Describe data classification capabilities
  • Describe records management
  • Describe data loss prevention

Describe insider risk capabilities in Microsoft Purview

Insider risks are a top concern for organizations. These risks can be challenging to identify and mitigate. Learn how Microsoft Purview enables organizations to identify, analyze, and remediate internal risks before they cause harm.

  • Describe insider risk management
  • Describe communication compliance
  • Describe information barriers

Describe the eDiscovery and audit capabilities of Microsoft Purview

Organizations may need to identify, collect, and/or audit information for legal, regulatory, or business reasons. Learn how the eDiscovery and audit capabilities of Microsoft Purview help organizations find relevant data quickly.

  • Describe the eDiscovery capabilities of Microsoft Purview.
  • Describe the auditing capabilities of Microsoft Purview.

Describe resource governance capabilities in Azure

Azure governance capabilities provide mechanisms and processes for organizations to maintain control over their applications and resources. Learn how Azure policy, Blueprints, and Microsoft Purview help organizations govern their resources and applications.

  • Describe Azure Policy.
  • Describe Azure Blueprints
  • Describe Microsoft Purview

Weitere Schulungen zu Thema Microsoft Security

SC-400 Microsoft Information Protection Administrator (SC-400T00)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, ...

SC-300 Microsoft Identity and Access Administrator (SC-300T00)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to ...

SC-200 Microsoft Security Operations Analyst (SC-200T00)

- u.a. in Bremen, Hamburg, Stuttgart, Essen, Koblenz

Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft ...

SC-100 Microsoft Cybersecurity Architect (SC-100T00)

- u.a. in Paderborn, Dresden, Essen, Koblenz, Freiburg

This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect ...