Nux Solutions whatsapp

Microsoft Security, Compliance, and Identity Fundamentals SC-900 Certification in Coimbatore Nux Software Solutions.


Best Microsoft Security, Compliance, and Identity Fundamentals SC-900 Training Institute in Coimbatore.

Best Microsoft Security, Compliance, and Identity Fundamentals SC-900 training courses classes deliver by Nux software solutions in coimbatore. Nux software solutions in coimbatore has excellent and advanced training programs that will give you better performance & hands on experience. Our industry's expert trainers offer a wide range of skills and experience in their graded areas. The Training center environment is too good for professional, individual, corporate, live project training and industrial training. Labs infrastructure is advanced, well managed and you can access LAB 24X7 from anywhere. Training center has international expert trainers and they have excellent knowledge, real time industry experience. Our Training programs combine with several innovative learning methods and delivery models. We understand your requirement and it will give you 100 percent growth for your career and provide the cost effective training programs and also work with flexibility for the trainees.


Microsoft Security, Compliance, and Identity Fundamentals SC-900 Syllabus


Describe the Concepts of Security, Compliance, and Identity (10-15%)

  • Describe security and compliance concepts
  • - Describe the shared responsibility model


    - Describe defense in depth


    - Describe the Zero-Trust model


    - Describe encryption and hashing


    - Describe compliance concepts


  • Define identity concepts
  • - Define identity as the primary security perimeter


    - Define authentication


    - Define authorization


    - Describe identity providers


    - Describe Active Directory


    - Describe the concept of Federation


    Describe the capabilities of Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra (25-30%)

  • Describe the basic identity services and identity types of Azure AD
  • - Describe Azure AD


    - Describe Azure AD identities


    - Describe hybrid identity


    - Describe the different external identity types


  • Describe the authentication capabilities of Azure AD
  • - Describe the authentication methods available in Azure AD


    - Describe Multi-factor Authentication


    - Describe self-service password reset


    - Describe password protection and management capabilities available in Azure AD


  • Describe access management capabilities of Azure AD
  • - Describe conditional access


    - Describe the benefits of Azure AD roles


    - Describe the benefits of Azure AD role-based access control


  • Describe the identity protection and governance capabilities of Azure AD
  • - Describe identity governance in Azure AD


    - Describe entitlement management and access reviews


    - Describe the capabilities of Azure AD Privileged Identity Management (PIM)


    - Describe Azure AD Identity Protection


    Describe the capabilities of Microsoft Security Solutions (25-30%)

  • Describe basic security capabilities in Azure
  • - Describe Azure DDoS protection


    - Describe Azure Firewall


    - Describe Web Application Firewall


    - Describe Network Segmentation with Azure Virtual Networks


    - Describe Azure Network Security groups


    - Describe Azure Bastion and JIT Access


    - Describe ways Azure encrypts data


  • Describe security management capabilities of Azure
  • - Describe Cloud security posture management (CSPM)


    - Describe Microsoft Defender for Cloud


    - Describe the enhanced security features of Microsoft Defender for Cloud


    - Describe security baselines for Azure


  • Describe security capabilities of Microsoft Sentinel
  • - Define the concepts of SIEM and SOAR


    - Describe how Microsoft Sentinel provides integrated threat management


  • Describe threat protection with Microsoft 365 Defender
  • - Describe Microsoft 365 Defender services


    - Describe Microsoft Defender for Office 365


    - Describe Microsoft Defender for Endpoint


    - Describe Microsoft Defender for Cloud Apps


    - Describe Microsoft Defender for Identity


    - Describe the Microsoft 365 Defender portal


    Describe the Capabilities of Microsoft Compliance Solutions (25-30%)

  • Describe Microsoft’s Service Trust Portal and privacy principles
  • - Describe the offerings of the Service Trust portal


    - Describe Microsoft’s privacy principles


  • Describe the compliance management capabilities of Microsoft Purview
  • - Describe the Microsoft Purview compliance portal


    - Describe compliance manager


    - Describe the use and benefits of compliance score


  • Describe information protection and data lifecycle management capabilities of Microsoft Purview
  • - Describe data classification capabilities


    - Describe the benefits of content explorer and activity explorer


    - Describe sensitivity labels and sensitivity label policies


    - Describe Data Loss Prevention (DLP)


    - Describe Records Management


    - Describe Retention Polices, Retention labels and retention label policies


  • Describe insider risk capabilities in Microsoft Purview
  • - Describe Insider Risk Management


    - Describe communication compliance


    - Describe information barriers


  • Describe resource governance capabilities in Azure
  • - Describe Azure Policy


    - Describe Azure Blueprints


    - Describe the Microsoft Purview unified data governance solution


    To ensure success in Microsoft Security, Compliance, and Identity Fundamentals certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Microsoft Security Compliance and Identity Fundamentals (SC-900) exam.