SC-900: Microsoft Security, Compliance, and Identity Fundamentals
SC-900: Microsoft Security, Compliance, and Identity Fundamentals is the requirements for the Microsoft Certified: Security, Compliance, and Identity Fundamentals
Exam requirements
The official exam document are published here: https://docs.microsoft.com/en-us/learn/certifications/exams/sc-900
Exam preparation
Video training for the exam
PluralSight
- Introduction to the Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Exam
https://app.pluralsight.com/library/courses/msft-security-compliance-identity-fundamentals-exam-intro/table-of-contents - Microsoft Security, Compliance, and Identity Fundamentals: Concepts
https://app.pluralsight.com/library/courses/msft-security-compliance-identity-fundamentals-concepts/table-of-contents - Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions
https://app.pluralsight.com/library/courses/msft-security-compliance-identity-fundamentals-management-solutions/table-of-contents - Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions
https://app.pluralsight.com/library/courses/msft-security-compliance-identity-fundamentals-security-solutions/table-of-contents
Youtube
- John Savill, SC-900 Microsoft Security, Compliance, and Identity Fundamentals Study Cram
https://www.youtube.com/watch?v=Bz-8jM3jg-8 - SC-900 C.E.R.T. | Microsoft Security, Compliance, and Identity Fundamentals
https://www.youtube.com/watch?v=zdZ8B7K7zl4
Online training
Microsoft Learn (free)
- SC-900 part 1: Describe the concepts of security, compliance, and identity
https://docs.microsoft.com/en-us/learn/paths/describe-concepts-of-security-compliance-identity/ - SC-900 part 2: Describe the capabilities of Microsoft Identity and access management solutions
https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-identity-access/ - SC-900 part 3: Describe the capabilities of Microsoft security solutions
https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-security-solutions/ - SC-900 part 4: Describe the capabilities of Microsoft compliance solutions
https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-compliance-solutions/
Microsoft Ninja Training (free)
- Microsoft 365 Defender Ninja Training
- Azure Security Center Ninja Training
- Azure Sentinel Ninja Training
Instructor-led training
Microsoft Learning Partner
- TBA
Exam Objectives
Describe the Concepts of Security, Compliance, and Identity (5-10%)
- Describe security methodologies
- describe the Zero-Trust methodology
- describe the shared responsibility model
- define defense in depth
- Describe security concepts
- describe common threats
- describe encryption
- Describe Microsoft Security and compliance principles
- describe Microsoft’s privacy principles
- describe the offerings of the service trust portal
Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)
- Define identity principles/concepts
- define identity as the primary security perimeter
- define authentication
- define authorization
- describe what identity providers are
- describe what Active Directory is
- describe the concept of Federated services
- define common Identity Attacks
- Describe the basic identity services and identity types of Azure AD
- describe what Azure Active Directory is
- describe Azure AD identities (users, devices, groups, service principals/applications)
- describe what hybrid identity is
- describe the different external identity types (Guest Users)
- Describe the authentication capabilities of Azure AD
- describe the different authentication methods
- describe self-service password reset
- describe password protection and management capabilities
- describe Multi-factor Authentication
- describe Windows Hello for Business
- Describe access management capabilities of Azure AD
- describe what conditional access is
- describe uses and benefits of conditional access
- describe the benefits of Azure AD roles
- Describe the identity protection & governance capabilities of Azure AD
- describe what identity governance is
- describe what entitlement management and access reviews is
- describe the capabilities of PIM
- describe Azure AD Identity Protection
Describe the capabilities of Microsoft Security Solutions (30-35%)
- Describe basic security capabilities in Azure
- describe Azure Network Security groups
- describe Azure DDoS protection
- describe what Azure Firewall is
- describe what Azure Bastion is
- describe what Web Application Firewall is
- describe ways Azure encrypts data
- Describe security management capabilities of Azure
- describe the Azure Security center
- describe Azure Secure score
- describe the benefit and use cases of Azure Defender – previously the cloud workload protection platform (CWPP)
- describe Cloud security posture management (CSPM)
- describe security baselines for Azure
- Describe security capabilities of Azure Sentinel
- define the concepts of SIEM, SOAR, XDR
- describe the role and value of Azure Sentinel to provide integrated threat protection
- Describe threat protection with Microsoft 365 Defender (formerly Microsoft Threat Protection)
- describe Microsoft 365 Defender services
- describe Microsoft Defender for Identity (formerly Azure ATP)
- describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
- describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
- describe Microsoft Cloud App Security
- Describe security management capabilities of Microsoft 365
- describe the Microsoft 365 Security Center
- describe how to use Microsoft Secure Score
- describe security reports and dashboards
- describe incidents and incident management capabilities
- Describe endpoint security with Microsoft Intune
- describe what Intune is
- describe endpoint security with Intune
- describe the endpoint security with the Microsoft Endpoint Manager admin center
Describe the Capabilities of Microsoft Compliance Solutions (25-30%)
- Describe the compliance management capabilities in Microsoft
- describe the compliance center
- describe compliance manager
- describe use and benefits of compliance score
- Describe information protection and governance capabilities of Microsoft 365
- describe data classification capabilities
- describe the value of content and activity explorer
- describe sensitivity labels
- describe Retention Policies and Retention Labels
- describe Records Management
- describe Data Loss Prevention
- Describe insider risk capabilities in Microsoft 365
- describe Insider risk management solution
- describe communication compliance
- describe information barriers
- describe privileged access management
- describe customer lockbox
- Describe the eDiscovery capabilities of Microsoft 365
- describe the purpose of eDiscovery
- describe the capabilities of the content search tool
- describe the core eDiscovery workflow
- describe the advanced eDisovery workflow
- Describe the audit capabilities in Microsoft 365
- describe the core audit capabilities of M365
- describe purpose and value of Advanced Auditing
- Describe resource governance capabilities in Azure
- describe the use of Azure Resource locks
- describe what Azure Blueprints is
- define Azure Policy and describe its use cases
- describe cloud adoption framework