From the course: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep by Microsoft Press
Get started with Microsoft Security, Compliance, and Identity Fundamentals (SC-900) exam
From the course: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep by Microsoft Press
Get started with Microsoft Security, Compliance, and Identity Fundamentals (SC-900) exam
- Hello and welcome. This video session is intended to familiarize you with the core skills and understanding of the security, identity, and compliance cloud-based services offered by Microsoft to prepare you for the SC-900 exam. My name's Chris Wojahn. I'm currently working for Microsoft, CSS, or what most known as customer support services organization, covering the readiness for our teams responsible for the security, compliance, identity, now known as Entra, and management teams. Our members deal with the full breadth of the products and services from installation, configuration through incident management, and mitigation or response. The lessons that follow are intended to serve as an overview of the concepts and fundamentals at the level that will target a broad scope of community members from entry level students through SOC analysts and many in between. It's important to have a solid familiarity with the Microsoft Azure Services discussed and Microsoft 365 compliance capabilities to be able to discuss and explain to others the full solution needed to secure an environment to the best of your ability. If you're able to converse and debate this content, then the exam should be easy next step in your journey. Taking time for the hands-on activities and test driving the services will help to ensure your familiarity with the subjects that are discussed. The SC-900 exam validation of learning focuses on the following weighted areas, describing the concepts of security and compliance, and identity. This is 10 to 15% of the exam. Describing the capabilities of Microsoft Entra or Azure AD. This is 25 to 30% of the exam. Then describing the capabilities of the Microsoft Security solutions. This is 25 to 30% of the exam. And lastly, describing the capabilities of Microsoft compliance solutions. This is also 25 to 30% of the exam. So again, we will begin with establishing a baseline understanding of the concepts at hand, looking at how security, identity, and compliance compliment each other in building the core structure of capabilities to serve, identify, and respond to the common concerns of today's infrastructure. Well, are you ready? If so, let's begin our wander and explore these concepts further.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Learning objectives28s
-
(Locked)
Describe the shared responsibility model4m 18s
-
(Locked)
Describe defense in depth4m 25s
-
(Locked)
Describe the Zero-Trust model2m 24s
-
(Locked)
Describe encryption and hashing3m 13s
-
(Locked)
Describe governance, risk, and compliance (GRC) concepts3m 49s
-
(Locked)
Lesson one: Recap1m 33s
-
-
-
Learning objectives29s
-
(Locked)
Define identity as the primary security perimeter2m 53s
-
(Locked)
Define authentication2m 20s
-
(Locked)
Define authorization2m 36s
-
(Locked)
Describe identity providers2m 47s
-
(Locked)
Describe Active Directory2m 50s
-
(Locked)
Describe the concept of federation2m 32s
-
(Locked)
Lesson two: Recap1m 38s
-
-
-
Learning objectives29s
-
(Locked)
Describe Microsoft Entra ID governance2m 32s
-
(Locked)
Describe entitlement management and access reviews2m 52s
-
(Locked)
Describe the capabilities of privileged identity management (PIM)2m 52s
-
(Locked)
Describe Entra ID protection2m 22s
-
(Locked)
Lesson six: Recap26s
-
-
-
(Locked)
Learning objectives37s
-
(Locked)
Describe Azure distributed denial-of-service (DDoS) protection50s
-
(Locked)
Describe Azure Firewall2m 35s
-
(Locked)
Describe a web application firewall (WAF)1m 27s
-
(Locked)
Describe network segmentation with Azure virtual networks2m 9s
-
(Locked)
Describe network security groups (NSGs)45s
-
(Locked)
Describe Azure Bastion1m 5s
-
(Locked)
Describe Azure Key Vault53s
-
(Locked)
Lesson seven: Recap38s
-
(Locked)
-
-
(Locked)
Learning objectives31s
-
(Locked)
Describe Microsoft Defender for Cloud1m 9s
-
(Locked)
Describe cloud security posture management (CSPM)1m 22s
-
(Locked)
Describe how security policies and initiatives improve the cloud security posture2m 9s
-
(Locked)
Describe enhanced security features provided by cloud workload protection1m 49s
-
(Locked)
Lesson eight: Recap30s
-
(Locked)
-
-
(Locked)
Learning objectives45s
-
(Locked)
Describe Microsoft 365 Defender services2m 50s
-
(Locked)
Describe Microsoft Defender for Office 3651m 5s
-
(Locked)
Describe Microsoft Defender for Endpoint56s
-
(Locked)
Describe Microsoft Defender for Cloud Apps1m 45s
-
(Locked)
Describe Microsoft Defender for Identity1m 1s
-
(Locked)
Describe Microsoft Defender Vulnerability Management1m 19s
-
(Locked)
Describe Microsoft Defender Threat Intelligence (Defender TI)1m 30s
-
(Locked)
Describe the Microsoft 365 Defender portal2m 14s
-
(Locked)
Lesson 10: Recap40s
-
(Locked)
-
-
(Locked)
Learning objectives47s
-
(Locked)
Describe the data classification capabilities2m 15s
-
(Locked)
Describe the benefits of content explorer and activity explorer1m 54s
-
(Locked)
Describe sensitivity labels and sensitivity label policies2m
-
(Locked)
Describe data loss prevention (DLP)1m 31s
-
(Locked)
Describe records management2m 27s
-
(Locked)
Describe retention policies, retention labels, and retention label policies2m 5s
-
(Locked)
Describe unified data governance solutions in Microsoft Purview1m 45s
-
(Locked)
Lesson 13: Recap43s
-
(Locked)