SC-900: Microsoft Security, Compliance, and Identity Fundamentals

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Course Introduction
Lectures | Duration |
---|---|
1. Course Introduction | 4m |
1. Course Introduction
4m
Module 1 Describe the concepts of security, compliance, and identity
Lectures | Duration |
---|---|
1. Chapter 1 : Security concepts and methodologies - Introduction | 1m |
2. Zero Trust - Guidelines | 3m |
3. Zero Trust - Six Foundational Pillars | 4m |
4. The Shared Responsibility Model | 6m |
5. Defence in Depth Strategy | 3m |
6. The CIA Triad | 6m |
7. Describe Common Threats | 6m |
8. Describe Encryption , hashing and Signing -I | 4m |
9. Describe Encryption , hashing and Signing - II | 4m |
10. Lesson Conclusion | 1m |
11. Microsoft security and compliance principles - Lesson Introduction | 1m |
12. Microsoft's Privacy Principles | 2m |
13. What is Service Trust Portal | 2m |
14. Azure Compliance Documentation | 1m |
15. Module 1 : Chapter Summary | 1m |
1. Chapter 1 : Security concepts and methodologies - Introduction
1m
2. Zero Trust - Guidelines
3m
3. Zero Trust - Six Foundational Pillars
4m
4. The Shared Responsibility Model
6m
5. Defence in Depth Strategy
3m
6. The CIA Triad
6m
7. Describe Common Threats
6m
8. Describe Encryption , hashing and Signing -I
4m
9. Describe Encryption , hashing and Signing - II
4m
10. Lesson Conclusion
1m
11. Microsoft security and compliance principles - Lesson Introduction
1m
12. Microsoft's Privacy Principles
2m
13. What is Service Trust Portal
2m
14. Azure Compliance Documentation
1m
15. Module 1 : Chapter Summary
1m
Module 2 Describe the concepts & capabilities of Microsoft identity and access
Lectures | Duration |
---|---|
1. Describe Identity Concepts - Introduction | 1m |
2. Common Identity Attacks | 5m |
3. Identity As a Security perimeter | 4m |
4. Four Pillars of Identity | 6m |
5. Modern Authentication and the role of Identity provider | 3m |
6. SSO and the Concept of Federation | 4m |
7. The concept of directory services and Active Directory | 3m |
8. Describe the basic services and identity types - Introduction | 1m |
9. Describe Azure Active Directory | 3m |
10. Azure AD Editions | 4m |
11. Describe the Azure AD identity types | 8m |
12. Difference between System assigned and user assigned managed Identity | 3m |
13. Describe the types external identities | 5m |
14. Describe the concept of hybrid Identities | 4m |
15. Describe the authentication capabilities of Azure - Introduction | 1m |
16. Describe the different authentication methods | 3m |
17. Security defaults and MFA | 4m |
18. MFA in Azure AD - Part 1 | 2m |
19. MFA in Azure AD - Part 2 | 3m |
20. Windows Hello | 3m |
21. Why is Windows Hello safer than a password | 2m |
22. Self-service password reset in Azure AD | 5m |
23. Password protection and management capabilities of Azure AD | 5m |
24. Protecting against password spray | 2m |
25. Hybrid security | 2m |
26. Describe the access management capabilties of AzureAD | 1m |
27. Conditional access in Azure AD | 4m |
28. Conditional access in Azure AD - II | 6m |
29. Conditional access in Azure AD - III | 3m |
30. Azure AD Roles & Custom Roles | 3m |
31. Chapter Summary | 1m |
32. Describe the identity protection and governance capabilties of Azure AD | 1m |
33. What is Identity Governance | 1m |
34. What is Identity lifecycle | 4m |
35. Access Lifecycle | 2m |
36. Privileged access lifecycle | 2m |
37. What is Entitlement management | 3m |
38. Azure AD access reviews | 3m |
39. Azure AD terms of use | 2m |
40. Capabilities of Privileged identity Management | 2m |
1. Describe Identity Concepts - Introduction
1m
2. Common Identity Attacks
5m
3. Identity As a Security perimeter
4m
4. Four Pillars of Identity
6m
5. Modern Authentication and the role of Identity provider
3m
6. SSO and the Concept of Federation
4m
7. The concept of directory services and Active Directory
3m
8. Describe the basic services and identity types - Introduction
1m
9. Describe Azure Active Directory
3m
10. Azure AD Editions
4m
11. Describe the Azure AD identity types
8m
12. Difference between System assigned and user assigned managed Identity
3m
13. Describe the types external identities
5m
14. Describe the concept of hybrid Identities
4m
15. Describe the authentication capabilities of Azure - Introduction
1m
16. Describe the different authentication methods
3m
17. Security defaults and MFA
4m
18. MFA in Azure AD - Part 1
2m
19. MFA in Azure AD - Part 2
3m
20. Windows Hello
3m
21. Why is Windows Hello safer than a password
2m
22. Self-service password reset in Azure AD
5m
23. Password protection and management capabilities of Azure AD
5m
24. Protecting against password spray
2m
25. Hybrid security
2m
26. Describe the access management capabilties of AzureAD
1m
27. Conditional access in Azure AD
4m
28. Conditional access in Azure AD - II
6m
29. Conditional access in Azure AD - III
3m
30. Azure AD Roles & Custom Roles
3m
31. Chapter Summary
1m
32. Describe the identity protection and governance capabilties of Azure AD
1m
33. What is Identity Governance
1m
34. What is Identity lifecycle
4m
35. Access Lifecycle
2m
36. Privileged access lifecycle
2m
37. What is Entitlement management
3m
38. Azure AD access reviews
3m
39. Azure AD terms of use
2m
40. Capabilities of Privileged identity Management
2m
Module 3 : Describe the capabilties of Microsoft security solutions
Lectures | Duration |
---|---|
1. Module Introduction | 2m |
2. Network security groups | 3m |
3. Inbound and outbound security rules | 4m |
4. What is DDOS | 3m |
5. Azure DDOS protection plans and pricing | 3m |
6. Azure Firewall | 4m |
7. Azure Bastion Host | 4m |
8. Web Application Firewall | 2m |
9. Azure Encryption | 3m |
10. Azure Key Vault | 2m |
11. Lesson Summary | 2m |
12. Cloud Security Posture management | 4m |
13. Azure Security Center | 4m |
14. Azure Security Center - Features | 4m |
15. Azure Security Center - Security Score | 2m |
16. Azure defender | 6m |
17. Azure Security Benchmark | 5m |
18. Azure Security Center - Pricing Tier | 1m |
19. Chapter Summary | 1m |
20. Describe the security capabilities of Azure Sentinel | 2m |
21. Define the concepts of SIEM, SOAR and XDR | 6m |
22. Azure Sentinel | 2m |
23. Azure Sentinel Features | 6m |
24. Azure Sentinel - Pricing | 1m |
26. Describe the threat protection capabilities of - Introduction | 2m |
27. Microsoft 365 Defender services - Introduction | 3m |
28. Microsoft Defender for Identity | 5m |
29. Microsoft Defender for O365 | 5m |
30. Microsoft Defender for Endpoint | 4m |
31. What is CASB | 3m |
32. The Cloud App Security framework | 2m |
33. Microsoft Cloud App Security architecture | 3m |
34. O365 Cloud App security And Azure AD Cloud App Discovery | 1m |
36. Security Management Capabilties of M365 - Introduction | 2m |
37. Microsoft 365 Security Center - Intro | 5m |
38. How to use Microsoft Secure Score | 3m |
39. Differences between the Azure and Microsoft Secure Score | 1m |
40. Managing Incidents | 2m |
42. Describe endpoint security with Microsoft Intune - Introduction | 1m |
43. What is Intune | 2m |
44. MDM and MAM | 3m |
45. Endpoint Security with Intune | 7m |
1. Module Introduction
2m
2. Network security groups
3m
3. Inbound and outbound security rules
4m
4. What is DDOS
3m
5. Azure DDOS protection plans and pricing
3m
6. Azure Firewall
4m
7. Azure Bastion Host
4m
8. Web Application Firewall
2m
9. Azure Encryption
3m
10. Azure Key Vault
2m
11. Lesson Summary
2m
12. Cloud Security Posture management
4m
13. Azure Security Center
4m
14. Azure Security Center - Features
4m
15. Azure Security Center - Security Score
2m
16. Azure defender
6m
17. Azure Security Benchmark
5m
18. Azure Security Center - Pricing Tier
1m
19. Chapter Summary
1m
20. Describe the security capabilities of Azure Sentinel
2m
21. Define the concepts of SIEM, SOAR and XDR
6m
22. Azure Sentinel
2m
23. Azure Sentinel Features
6m
24. Azure Sentinel - Pricing
1m
26. Describe the threat protection capabilities of - Introduction
2m
27. Microsoft 365 Defender services - Introduction
3m
28. Microsoft Defender for Identity
5m
29. Microsoft Defender for O365
5m
30. Microsoft Defender for Endpoint
4m
31. What is CASB
3m
32. The Cloud App Security framework
2m
33. Microsoft Cloud App Security architecture
3m
34. O365 Cloud App security And Azure AD Cloud App Discovery
1m
36. Security Management Capabilties of M365 - Introduction
2m
37. Microsoft 365 Security Center - Intro
5m
38. How to use Microsoft Secure Score
3m
39. Differences between the Azure and Microsoft Secure Score
1m
40. Managing Incidents
2m
42. Describe endpoint security with Microsoft Intune - Introduction
1m
43. What is Intune
2m
44. MDM and MAM
3m
45. Endpoint Security with Intune
7m
Module 4 : Describe the capabilities of Microsoft compliance solutions
Lectures | Duration |
---|---|
1. Module 4 introduction | 1m |
2. Common Compliance Needs | 2m |
3. Common compliance regulations | 3m |
4. Compliance Center | 2m |
5. What is Compliance Manager | 2m |
6. What are Controls | 1m |
7. What are Assesments | 2m |
8. Understand Compliance score | 3m |
9. Chapter Summary | 1m |
10. The information protection and governance capabiliities of Microsoft 365 | 1m |
11. Know your data, protect your data, and govern your data | 3m |
12. Data classification capabilities of compliance Center | 5m |
13. Content Explorer and Activity Explorer | 4m |
14. Sensitivity labels | 5m |
15. Label Policies | 3m |
16. Data Loss Prevention | 3m |
17. Data Loss Prevention on endpoints and teams | 2m |
18. Retention Polices and Retention Labels | 4m |
19. Records Management | 3m |
21. The insider risk capabilities in Microsoft - Introduction | 1m |
22. Insider Risk management | 2m |
23. Insider Risk management Workflow | 3m |
24. Communications Compliance | 5m |
25. Information barriers in Microsoft Teams | 2m |
26. Privileged Access Management | 4m |
27. Customer Lockbox | 4m |
28. Lesson Summary | 1m |
29. eDiscovery capabilities of Microsoft M365 - Introduction | 1m |
30. The Purpose of eDiscovery | 2m |
31. The capabilities of the content search | 5m |
32. The Core eDiscovery Workflow | 6m |
33. The advanced eDiscovery workflow | 4m |
35. The audit capabilities of Microsoft 365- introduction | 1m |
36. The core audit capabilities of M365 | 4m |
37. What are the Advance Auditing Capabilities | 5m |
38. High Bandwidth for Office 365 API Activities | 2m |
40. Describe the resource governance capabilities- introduction | 1m |
41. Resource Manager - Locks | 2m |
42. What is Azure Blueprints | 3m |
43. What is Azure Policy | 4m |
44. Difference between Azure Policy and RBAC | 2m |
45. Cloud Adoption Framework | 2m |
1. Module 4 introduction
1m
2. Common Compliance Needs
2m
3. Common compliance regulations
3m
4. Compliance Center
2m
5. What is Compliance Manager
2m
6. What are Controls
1m
7. What are Assesments
2m
8. Understand Compliance score
3m
9. Chapter Summary
1m
10. The information protection and governance capabiliities of Microsoft 365
1m
11. Know your data, protect your data, and govern your data
3m
12. Data classification capabilities of compliance Center
5m
13. Content Explorer and Activity Explorer
4m
14. Sensitivity labels
5m
15. Label Policies
3m
16. Data Loss Prevention
3m
17. Data Loss Prevention on endpoints and teams
2m
18. Retention Polices and Retention Labels
4m
19. Records Management
3m
21. The insider risk capabilities in Microsoft - Introduction
1m
22. Insider Risk management
2m
23. Insider Risk management Workflow
3m
24. Communications Compliance
5m
25. Information barriers in Microsoft Teams
2m
26. Privileged Access Management
4m
27. Customer Lockbox
4m
28. Lesson Summary
1m
29. eDiscovery capabilities of Microsoft M365 - Introduction
1m
30. The Purpose of eDiscovery
2m
31. The capabilities of the content search
5m
32. The Core eDiscovery Workflow
6m
33. The advanced eDiscovery workflow
4m
35. The audit capabilities of Microsoft 365- introduction
1m
36. The core audit capabilities of M365
4m
37. What are the Advance Auditing Capabilities
5m
38. High Bandwidth for Office 365 API Activities
2m
40. Describe the resource governance capabilities- introduction
1m
41. Resource Manager - Locks
2m
42. What is Azure Blueprints
3m
43. What is Azure Policy
4m
44. Difference between Azure Policy and RBAC
2m
45. Cloud Adoption Framework
2m