Loading...

SC-900 Security, Compliance, and Identity Fundamentals

Czas trwania kursu: 1 dzień
Cena: 999 zł netto

CERTYFIKACJE ZAWODOWE

Certyfikacja podstawowa CertyfIkacja specjalistyczna Certyfikacja ekspercka
FUNDAMENTALS ASSOCIATE EXPERT

 

POZIOM SZKOLENIA

podstawowy średniozaawansowany zaawansowany ekspercki
100 200 300 400

 

TEMATYKA ZAJĘĆ

  • Module 1: Describe security methodologies
    Describe the Zero-Trust methodology
    Describe the shared responsibility model
    Define defense in depth

 

  • Module 2: Describe security concepts
    Describe common threats
    Describe encryption

 

  • Module 3: Describe Microsoft Security and compliance principles
    Describe Microsoft’s privacy principles
    Describe the offerings of the service trust portal

 

  • Module 4: Define identity principles/concepts
    Define identity as the primary security perimeter
    Define authentication
    Define authorization
    Describe what identity providers are
    Describe what Active Directory is
    Describe the concept of Federated services
    Define common Identity Attacks

 

  • Module 5: Describe the basic identity services and identity types of Azure AD
    Describe what Azure Active Directory is
    Describe Azure AD identities (users, devices, groups, service principals/applications)
    Describe what hybrid identity isdescribe the different external identity types (Guest Users)

 

  • Module 6: Describe the authentication capabilities of Azure AD
    Describe the different authentication methods
    Describe self-service password reset
    Describe password protection and management capabilities
    Describe Multi-factor Authentication
    Describe Windows Hello for Business

 

  • Module 7: Describe access management capabilities of Azure AD
    Describe what conditional access is
    Describe uses andbenefits of conditional access
    Describe the benefits of Azure AD roles

 

  • Module 8: Describe the identity protection & governance capabilities of Azure AD
    Describe what identity governance is
    Describe what entitlement management and access reviews is
    Describe the capabilities of PIM
    Describe Azure AD Identity Protection

 

  • Module 9 : Describe basic security capabilities in Azure
    Describe Azure Network Security groups
    Describe Azure DDoS protection
    Describe what Azure Firewall is
    Describe what Azure Bastion isdescribe what Web Application Firewall is
    Describe ways Azure encrypts data

 

  • Module 10: Describe security management capabilities of Azure
    Describe the Azure Security center
    Describe Azure Secure score
    Describe the benefit and use cases of Azure Defender -previously the cloud workload protection platform (CWPP)
    Describe Cloud security posture management (CSPM)
    Describe security baselines for Azure

 

  • Module 11: Describe security capabilities of Azure Sentinel
    Define theconcepts of SIEM, SOAR, XDR
    Describe the role and value of Azure Sentinel to provide integrated threat protection

 

  • Module 12: Describe threat protection with Microsoft 365 Defender (formerly Microsoft Threat Protection)
    describe Microsoft 365 Defender servicesdescribe Microsoft Defender for Identity (formerly Azure ATP)
    Describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
    Describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
    Describe Microsoft Cloud App Security

 

  • Module 13: Describe securitymanagement capabilities of Microsoft 365
    Describe the Microsoft 365 Security Center
    Describe how to use Microsoft Secure Score
    Describe security reports and dashboards
    Describe incidents and incident management capabilities

 

  • Module 14: Describe endpoint security with Microsoft Intune
    Describe what Intune is
    Describe endpoint security with Intune
    Describe the endpoint security with the Microsoft Endpoint Manager admin center

 

  • Module 15: Describe the compliance management capabilities in Microsoft
    describe the compliance center
    Describe compliance manager
    Describe use and benefits of compliance score

 

  • Module 16: Describe information protection and governance capabilities of Microsoft 365
    Describe data classification capabilities
    Describe the value of content and activity explorer
    Describe sensitivity labels
    Describe Retention Polices and Retention Labels
    Describe Records Management
    Describe Data Loss Prevention

 

  • Module 17: Describe insider risk capabilities in Microsoft 365
    Describe Insider risk management solution
    Describe communication compliance
    Describe information barriers
    Describe privileged access management
    Describe customer lockbox

 

  • Module 18: Describe the eDiscovery capabilities of Microsoft 365
    Describe the purpose of eDiscovery
    Describe the capabilities of the content search tool
    Describe the core eDiscovery workflow
    Describe the advanced eDisovery workflow

 

  • Module 19: Describe the audit capabilities in Microsoft 365
    Describe the core audit capabilities of M365
    Describe purpose and value of Advanced Auditing

 

  • Module 20: Describe resource governance capabilities in Azure
    Describe the use of Azure Resource locks
    Describe what Azure Blueprints is
    Define Azure Policy and describe its use cases
    Describe cloud adoption framework