Microsoft Security, Compliance, and Identity Fundamentals

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Interested in attending?
Register your interest now


Course Objectives

  • Describe basic concepts of security, compliance, and identity.
  • Describe the concepts and capabilities of Microsoft identity and access management solutions.
  • Describe the capabilities of Microsoft security solutions.
  • Describe the compliance management capabilities in Microsoft.


1 - Describe security and compliance concepts

  • Describe the shared responsibility model
  • Describe defense in depth
  • Describe the Zero Trust model
  • Describe compliance concepts

2 - Describe identity concepts

  • Define authentication and authorization
  • Define Identity as the primary security perimeter
  • Describe the role of the identity provider
  • Describe the concept of directory services and Active Directory
  • Describe the concept of Federation

3 - Describe the services and identity types of Azure AD

  • Describe Azure Active Directory
  • Describe the available Azure AD editions
  • Describe Azure AD identity types
  • Describe the types of external identities
  • Describe the concept of hybrid identity

4 - Describe the authentication capabilities of Azure AD

  • Describe the authentication methods available in Azure AD
  • Describe multi-factor authentication (MFA) in Azure AD
  • Describe self-service password reset (SSPR) in Azure AD
  • Describe password protection and management capabilities of Azure AD

5 - Describe the access management capabilities of Azure AD

  • Describe Conditional Access in Azure AD
  • Describe the benefits of Azure AD roles and role-based access control

6 - Describe the identity protection and governance capabilities of Azure AD

  • Describe identity governance in Azure AD
  • Describe what is entitlement management and access reviews
  • Describe the capabilities of Privileged identity Management
  • Describe Azure Identity Protection

7 - Describe basic security capabilities in Azure

  • Describe Azure DDoS protection
  • Describe Azure Firewall
  • Describe Web Application Firewall
  • Describe network segmentation in Azure
  • Describe Azure Network Security groups
  • Describe Azure Bastion and JIT Access
  • Describe ways Azure encrypts data

8 - Describe security management capabilities of Azure

  • Describe Cloud security posture management
  • Describe Microsoft Defender for Cloud
  • Describe the enhanced security of Microsoft Defender for Cloud
  • Describe the Microsoft cloud security benchmark and security baselines for Azure

9 - Describe security capabilities of Microsoft Sentinel

  • Describe how Microsoft Sentinel provides integrated threat management
  • Understand Sentinel costs

10 - Describe threat protection with Microsoft 365 Defender

  • Describe Microsoft 365 Defender services
  • Describe Microsoft Defender for Office 365
  • Describe Microsoft Defender for Endpoint
  • Describe Microsoft Defender for Cloud Apps
  • Describe Microsoft Defender for Identity
  • Describe the Microsoft 365 Defender portal

11 - Describe the Service Trust Portal and privacy at Microsoft

  • Describe the Service Trust Portal
  • Describe Microsoft's privacy principles
  • Describe Microsoft Priva

12 - Describe the compliance management capabilities in Microsoft Purview

  • Describe the Microsoft Purview compliance portal
  • Describe Compliance Manager
  • Describe use and benefits of compliance score

13 - Describe information protection and data lifecycle management in Microsoft Purview

  • Know your data, protect your data, and govern your data
  • Describe the data classification capabilities of the compliance portal
  • Describe sensitivity labels and policies
  • Describe data loss prevention
  • Describe retention policies and retention labels
  • Describe records management

14 - Describe insider risk capabilities in Microsoft Purview

  • Describe insider risk management
  • Describe communication compliance
  • Describe information barriers

15 - Describe the eDiscovery and audit capabilities of Microsoft Purview

  • Describe the eDiscovery solutions in Microsoft Purview
  • Describe the audit solutions in Microsoft Purview

16 - Describe resource governance capabilities in Azure

  • Describe Azure Policy
  • Describe the use of Azure Blueprints
  • Describe the capabilities in the Microsoft Purview governance portal


Course Prerequisites

There are no prerequisites for this course.

Who Should Attend

The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.