No.1 Azure SC-900 Certification Training | Join Emigo

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Emigo Networks offers comprehensive training for the SC-900 certification, providing expert-led sessions, hands-on labs, and practical insights to help you master the skills needed to pass the exam

SC-900: Microsoft Security, Compliance, and Identity Fundamentals Certification & Training

Emigo Networks offers comprehensive training for the SC-900 certification, designed to build foundational knowledge of Microsoft security, compliance, and identity solutions. This course covers core concepts, cloud security principles, and Microsoft’s security services across Azure and Microsoft 365. Ideal for professionals starting their journey in cybersecurity or compliance, it equips learners with essential skills to understand security and compliance frameworks in modern enterprise environments.



Course Overview

The SC-900 course provides foundational knowledge of security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions. Designed for individuals seeking to understand how Microsoft SCI solutions span across Microsoft Azure and Microsoft 365, this course covers key topics such as the Zero Trust model, Microsoft Entra ID, Microsoft Defender, and Microsoft compliance solutions. It is ideal for business stakeholders, new or existing IT professionals, and students aiming to build a career in cybersecurity or compliance.

What You'll Learn

  • Understand fundamental concepts of security, compliance, and identity (SCI)
  • Gain knowledge of Microsoft security solutions and their role in cloud services
  • Learn about Zero Trust principles and how to apply them
  • Explore Microsoft Entra ID (Azure AD) features and identity management
  • Understand Microsoft Defender and threat protection capabilities
  • Learn compliance management and data governance with Microsoft 365 and Azure
  • Familiarize with security management tools and reporting within Microsoft environments

Syllabus Summary

Describe the concepts of security, compliance, and identity (10–15%)

a. Describe security and compliance concepts

  • Describe the shared responsibility model
  • Describe defense-in-depth
  • Describe the Zero Trust model
  • Describe encryption and hashing
  • Describe Governance, Risk, and Compliance (GRC) concepts

b. Define identity concepts

  • Define identity as the primary security perimeter
  • Define authentication
  • Define authorization
  • Describe identity providers
  • Describe the concept of directory services and Active Directory
  • Describe the concept of federation
Describe the capabilities of Microsoft Entra (25–30%)

a. Describe function and identity types of Microsoft Entra ID

  • Describe Microsoft Entra ID
  • Describe types of identities
  • Describe hybrid identity

b. Describe authentication capabilities of Microsoft Entra ID

  • Describe the authentication methods
  • Describe multi-factor authentication (MFA)
  • Describe password protection and management capabilities

c. Describe access management capabilities of Microsoft Entra ID

  • Describe Conditional Access
  • Describe Microsoft Entra roles and role-based access control (RBAC)

d. Describe identity protection and governance capabilities of Microsoft Entra

  • Describe Microsoft Entra ID Governance
  • Describe access reviews
  • Describe the capabilities of Microsoft Entra Privileged Identity Management
  • Describe Microsoft Entra ID Protection
Describe the capabilities of Microsoft security solutions (35–40%)

a. Describe core infrastructure security services in Azure

  • Describe Azure distributed denial-of-service (DDoS) Protection
  • Describe Azure Firewall
  • Describe Web Application Firewall (WAF)
  • Describe network segmentation with Azure virtual networks
  • Describe network security groups (NSGs)
  • Describe Azure Bastion
  • Describe Azure Key Vault

b. Describe security management capabilities of Azure

  • Describe Microsoft Defender for Cloud
  • Describe Cloud Security Posture Management (CSPM)
  • Describe how security policies and initiatives improve the cloud security posture
  • Describe enhanced security features provided by cloud workload protection

c. Describe capabilities of Microsoft Sentinel

  • Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)
  • Describe threat detection and mitigation capabilities in Microsoft Sentinel

d. Describe threat protection with Microsoft Defender XDR

  • Describe Microsoft Defender XDR services
  • Describe Microsoft Defender for Office 365
  • Describe Microsoft Defender for Endpoint
  • Describe Microsoft Defender for Cloud Apps
  • Describe Microsoft Defender for Identity
  • Describe Microsoft Defender Vulnerability Management
  • Describe Microsoft Defender Threat Intelligence (Defender TI)
  • Describe the Microsoft Defender portal
Describe the capabilities of Microsoft compliance solutions (20–25%)

a. Describe Microsoft Service Trust Portal and privacy principles

  • Describe the Service Trust Portal offerings
  • Describe the privacy principles of Microsoft
  • Describe Microsoft Priva

b. Describe compliance management capabilities of Microsoft Purview

  • Describe the Microsoft Purview portal
  • Describe Compliance Manager
  • Describe the uses and benefits of compliance score

c. Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview

  • Describe the data classification capabilities
  • Describe the benefits of Content explorer and Activity explorer
  • Describe sensitivity labels and sensitivity label policies
  • Describe data loss prevention (DLP)
  • Describe records management
  • Describe retention policies, retention labels, and retention label policies

d. Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview

  • Describe insider risk management
  • Describe eDiscovery solutions in Microsoft Purview
  • Describe audit solutions in Microsoft Purview

Pre-requisites

  • There are no mandatory prerequisites

Required Exams

  • Exam Codes: SC-900: Microsoft Security, Compliance, and Identity Fundamentals
  • Length: 45 minutes
  • Registration fee: $99 USD (+taxes applicable)

Who Should Attend

  • IT professionals new to security, compliance, and identity concepts
  • Security administrators and compliance officers beginning their Microsoft journey
  • Individuals seeking foundational knowledge of Microsoft security and compliance solutions
  • Business decision makers interested in understanding security and compliance principles
  • Anyone preparing for advanced Microsoft security certifications
  • Students and professionals aiming to enhance their understanding of Microsoft security fundamentals

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry