Video description
Identity is the new perimeter. Application developers and infrastructure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it.
This course begins with the concepts of security, compliance, and identity. You’ll look at security methodologies, security concepts, and Microsoft Security and compliance principles. You’ll learn the concepts of zero trust methodology, shared responsibility model, and defense in depth.
After that, you’ll cover Microsoft Identity and Access Management Solutions. You’ll look at identity principles and concepts; basic identity and identity types; authentication, access management, and identity protection; and governance capabilities of Azure Active Directory.
Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure and Azure Sentinel, Microsoft 365 Defender, Intune, and Microsoft 365.
Finally, you’ll look at Microsoft Compliance Solutions. You’ll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery, and audit.
By the end of this course, you will get hands-on knowledge to pass the Microsoft SC 900 exam.
What You Will Learn
- Learn the concepts of security, compliance, and identity
- Explore Microsoft Identity and Access Management Solution
- Identify the capabilities of Microsoft Security solutions
- Identify the capabilities of Microsoft Compliance solutions
- Check the concepts of zero trust methodology
- Look at the capabilities in Microsoft 365
Audience
This course is for a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.
Individuals looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services can also benefit from this course.
Basic knowledge of security, compliance, and identity, and familiarity with Microsoft Azure and Microsoft 365 will be required.
Concepts of Azure Active Directory would be helpful but not mandatory.
About The Author
Anand Rao Nednur: Anand Rao Nednur is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure, AWS, and GCP) but is also well-versed with IAM, security, and automation with PowerShell and Python.
In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in lab examinations and securing certifications.
Anand is also a certified seasoned professional holding several certifications and has delivered instructor-led training in several states in India as well as several countries such as the USA, Bahrain, Kenya, and UAE. He has worked as a Microsoft-certified trainer globally for major corporate clients.
Table of contents
- Chapter 1 : Introduction to the Course
-
Chapter 2 : Module 1 - Describe the Concepts of Security, Compliance, and Identity
- Security Concepts and Methodologies - Introduction
- Zero Trust - Guidelines
- Zero Trust – Six Foundational Pillars
- The Shared Responsibility Models
- Defense in Depth Strategy
- The CIA Triad
- Describe Common Threats
- Describe Encryption, Hashing, and Signing - I
- Describe Encryption, Hashing, and Signing – II
- Summary
- Microsoft Security and Compliance principles - Introduction
- Microsoft's Privacy Principles
- What is Service Trust Portal
- Azure Compliance Documentation
- Module 1: Section Summary
-
Chapter 3 : Module 2 - Describe the Concepts and Capabilities of Microsoft Identity and Access
- Describe Identity Concepts - Introduction
- Common Identity Attacks
- Identity as a Security perimeter
- Four Pillars of Identity
- Modern Authentication and the Role of Identity Provider
- SSO and the Concept of Federation
- The Concept of Directory Services and Active Directory
- Describe the Basic Services and Identity Types – Introduction
- Describe Azure Active Directory
- Azure AD Editions
- Describe the Azure AD Identity types
- Difference between System Assigned and User Assigned Managed Identity
- Describe the Types of External Identities
- Describe the Concept of Hybrid Identities
- Describe the Authentication Capabilities of Azure – Introduction
- Describe the Different Authentication Methods
- Security Defaults and MFA
- MFA in Azure AD - Part 1
- Video 3.2: MFA in Azure AD - Part 2
- Windows Hello
- Why is Windows Hello Safer than a Password
- Self-Service Password Reset in Azure AD
- Password Protection and Management Capabilities of Azure AD
- Protecting against Password Spray
- Hybrid security
- Describe the Access Management Capabilities of Azure AD
- Conditional Access in Azure AD
- Conditional Access in Azure AD – II
- Conditional Access in Azure AD – III
- Azure AD Roles and Custom Roles
- Summary
- Describe the Identity Protection and Governance Capabilities of Azure AD
- What is Identity Governance
- What is Identity Lifecycle
- Access Lifecycle
- Privileged Access lifecycle
- What is Entitlement Management
- Azure AD Access Reviews
- Azure AD Terms of Use
- Capabilities of Privileged Identity Management
-
Chapter 4 : Module 3 - Describe the Capabilities of Microsoft Security Solutions
- Module Introduction
- Network Security Groups
- Inbound and Outbound Security Rules
- What is DDOS
- Azure DDOS Protection Plans and Pricing
- Azure Firewall
- Azure Bastion Host
- Web Application Firewall
- Azure Encryption
- Azure Key Vault
- Lesson Summary
- Cloud Security Posture Management
- Azure Security Center
- Azure Security Center – Features
- Azure Security Center - Security Score
- Azure Defender
- Azure Security Benchmark
- Azure Security Center - Pricing Tier
- Summary
- Describe the Security Capabilities of Azure Sentinel
- Define the Concepts of SIEM, SOAR, and XDR
- Azure Sentinel
- Azure Sentinel Features
- Azure Sentinel – Pricing
- Summary
- Describe the Threat Protection Capabilities of Microsoft 365 – Introduction
- Microsoft 365 Defender Services – Introduction
- Microsoft Defender for Identity
- Microsoft Defender for O365
- Microsoft Defender for Endpoint
- What is CASB
- The Cloud App Security Framework
- Microsoft Cloud App Security Architecture
- O365 Cloud App Security and Azure AD Cloud App Discovery
- Summary
- Security Management Capabilities of M365 – Introduction
- Microsoft 365 Security Center – Introduction
- How to Use Microsoft Secure Score
- Differences Between Azure and Microsoft Secure Score
- Managing Incidents
- Summary
- Describe Endpoint Security with Microsoft Intune – Introduction
- What is Intune
- MDM and MAM
- Endpoint Security with Intune
- Summary
-
Chapter 5 : Module 4 - Describe the Capabilities of Microsoft Compliance Solutions
- Module introduction
- Common Compliance Needs
- Common Compliance Regulations
- Compliance Center
- What is Compliance Manager
- What are Controls
- What are Assessments
- Understand Compliance score
- Summary
- The Information Protection and Governance Capabilities of Microsoft 365
- Know Your Data, Protect Your Data, and Govern Your Data
- Data Classification Capabilities of Compliance Center
- Content Explorer and Activity Explorer
- Sensitivity Labels
- Label Policies
- Data Loss Prevention
- Data Loss Prevention on Endpoints and Teams
- Retention Polices and Retention Labels
- Records Management
- Summary
- The Insider Risk Capabilities in Microsoft – Introduction
- Insider Risk Management
- Insider Risk Management Workflow
- Communications Compliance
- Information Barriers in Microsoft Teams
- Privileged Access Management
- Customer Lockbox
- Summary
- eDiscovery Capabilities of Microsoft M365 – Introduction
- The Purpose of eDiscovery
- The Capabilities of the Content Search
- The Core eDiscovery Workflow
- The Advanced eDiscovery Workflow
- Summary
- The Audit Capabilities of Microsoft 365 - Introduction
- The Core Audit Capabilities of M365
- What are the Advanced Auditing Capabilities
- High Bandwidth for Office 365 API Activities
- Summary
- Describe the Resource Governance Capabilities - Introduction
- Resource Manager – Locks
- What is Azure Blueprint
- What is Azure Policy
- Difference between Azure Policy and RBAC
- Cloud Adoption Framework
Product information
- Title: SC-900: Microsoft Security, Compliance, and Identity Fundamentals
- Author(s):
- Release date: October 2021
- Publisher(s): Packt Publishing
- ISBN: 9781803236445
You might also like
book
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals
Prepare for Microsoft Exam SC-900 and help demonstrate your real-world knowledge of the fundamentals of security, …
book
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900
Understand the fundamentals of security, compliance, and identity solutions across Microsoft Azure, Microsoft 365, and related …
video
SC-300: Microsoft Identity and Access Administrator
The Microsoft Identity and Access Administrator designs, implements, and operates an organization’s identity and access management …
video
SC-200: Microsoft Security Operations Analyst
The Microsoft security operations analyst works with organizational stakeholders to secure the organization’s information technology systems. …