Microsoft Certified SC-900: Security, Compliance, and Identity Fundamentals

0 (0 Ratings)
Enrolled:0
Course level:Beginner
Last Updated:July 13, 2025
Categories Microsoft, Security

This learning path offers you resources to prepare for Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals. It introduces required skills through online micro-learning on Microsoft Learn.

You will learn to describe the concepts of security, compliance, and identity; the capabilities of Microsoft Identity and access management solutions; the capabilities of Microsoft security solutions; and the capabilities of Microsoft compliance solutions. This learning path will help you prepare for some of the requirements of the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

What I will learn?

  • Describe the concepts of security, compliance, and identity
  • The capabilities of Microsoft Entra
  • The capabilities of Microsoft security solutions
  • The capabilities of Microsoft compliance solutions

Course Curriculum

Describe the concepts of security, compliance, and identity
Learn about core concepts that are foundational to security, compliance, and identity solutions, including shared responsibility, Zero Trust, data residency, the role of identity providers, and more. Here are all the learning paths in preparation for the SC-900 exam: Microsoft Security, Compliance, and Identity Fundamentals.

  • Book your First Expert Led 1-on-1 Personalised Session
  • Introduction to security, compliance, and identity
  • Describe the shared responsibility model
  • Defence in Depth: A Layered Security Approach
  • What Is the Zero Trust Model?
  • Describe encryption and hashing
  • Describe governance, risk, and compliance (GRC) concepts
  • Summary and resources

Describe identity concepts
Learn about the key concepts of authentication and authorization and why identity is important in securing corporate resources. You'll also learn about some identity-related services. Learning objectives After completing this module, you'll be able to: - Understand the difference between authentication and authorization. - Describe the concept of identity as a security perimeter. - Describe identity-related services.

Introduction to the capabilities of Microsoft Entra
When it comes to security, your organization can no longer rely on its network boundary. To allow employees, partners, and customers to collaborate securely, organizations need to shift to an approach whereby identity becomes the new security perimeter. Using an identity provider helps organizations manage that shift and all the aspects of identity security. In this module, you'll learn about Microsoft Entra ID, Microsoft’s cloud-based identity and access management service. You'll also learn about the identity types supported and how you can use Microsoft Entra ID to support external users. After completing this module, you'll be able to: - Describe the core functionality of Microsoft Entra ID. - Describe the types of identities supported by Microsoft Entra ID - Describe the concept of hybrid identity as supported by Microsoft Entra ID.

Describe the authentication capabilities of Microsoft Entra ID
Learn about the authentication capabilities of Microsoft Entra ID, including multifactor authentication, and how they improve security. You'll also learn about self-service password reset (SSPR) and the password protection and management capabilities. Learning objectives After completing this module, you'll be able to: - Describe the authentication methods of Microsoft Entra ID. - Describe multifactor authentication (MFA) in Microsoft Entra ID. - Describe self-service password reset (SSPR) in Microsoft Entra ID. - Describe the password protection and management capabilities of Microsoft Entra ID.

Describe access management capabilities of Microsoft Entra
A key function of Microsoft Entra is to manage access. Learn about Microsoft's Security Service Edge (SSE) solution, conditional access, and how Microsoft Entra roles and role-based access control (RBAC) help organizations manage access. Learning objectives: By the end of this module, you'll be able to: - Describe Conditional Access in Microsoft Entra ID. - Describe Microsoft Entra roles and role-based access control. - Describe Global Secure Access in Microsoft Entra. Prerequisites: - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Describe the identity protection and governance capabilities of Microsoft Entra
Microsoft Entra provides identity protection and governance capabilities. Learn about these capabilities, the use cases, and benefits. Learning objectives After completing this module, you'll be able to: - Describe the capabilities of Microsoft Entra ID Governance. - Describe Privileged Identity Management. - Describe the capabilities of Microsoft Entra ID Protection. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Introduction to Microsoft security solutions
Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft Defender XDR and Microsoft 365 security management. Here are all the learning paths in preparation for the SC-900 exam: Microsoft Security, Compliance, and Identity Fundamentals. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Describe core infrastructure security services in Azure
Learn about capabilities Azure supports to protect your network, VMs, and your data. Learning objectives After completing this module, you'll be able to: - Learn how Azure security capabilities can protect the network. - Learn how Azure can protect your VMs. - Learn how to keep secrets safe with Azure Key Vault. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365. - Get started with Azure Choose the Azure account that's right for you. Pay as you go or try Azure free for up to 30 days. Sign up.

Describe the security management capabilities in Azure
Learn about Microsoft Defender for Cloud and the capabilities it brings together to protect your cloud through secure score, recommendations, and enhanced features that provide cloud workload protection. Learning objectives After completing this module, you'll be able to: - Describe Microsoft Defender for Cloud. - Describe how security policies and initiatives improve cloud security posture. - Describe how the three pillars of Microsoft Defender for Cloud protect against cyber threats and vulnerabilities. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365. This module is part of these learning paths: Introduction to Microsoft security solutions

Describe security capabilities of Microsoft Sentinel
Learn about Microsoft Sentinel a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. In this module, you’ll also be introduced to Microsoft Security Copilot. Learning objectives After completing this module, you'll be able to: - Describe the security concepts for SIEM and SOAR. - Describe how Microsoft Sentinel provides threat detection and mitigation. - Describe Microsoft Security Copilot. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Describe the capabilities of Microsoft Priva and Microsoft Purview
Learn about compliance solutions in Microsoft. Topics covered will include the Microsoft Purview compliance portal, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities. Here are all the learning paths in preparation for the SC-900 exam: Microsoft Security, Compliance, and Identity Fundamentals.

Describe the data security solutions of Microsoft Purview
Learning objectives By the end of this module, you'll be able to: - Describe how Microsoft Purview Information Protection helps organizations discover, classify, and protect sensitive information. - Describe how Microsoft Purview Data Loss Prevention helps organizations prevent their users from inappropriately sharing sensitive data with people who shouldn't have it. - Describe how Microsoft Purview Insider Risk Management helps minimize internal risks. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Describe the data compliance solutions of Microsoft Purview
Learn how Microsoft Purview data compliance solutions help organizations manage risk and regulatory requirements. Learning objectives By the end of this module, you will be able to: - Describe Microsoft Purview eDiscovery and Audit - Describe Microsoft Purview Compliance Manager - Describe Microsoft Purview Communication Compliance - Describe Microsoft Purview Data Lifecycle Management - Describe Microsoft Purview Records Management Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Describe the data governance solutions of Microsoft Purview
Learn about Microsoft Purview data governance solutions that leverage AI and modern technologies to ensure data quality, security, and compliance while also accelerating value creation. Learning objectives By the end of this module, you'll be able to: - Describe the concepts and benefits of data governance. - Describe the capabilities of Microsoft Purview Data Catalog. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Describe basic cybersecurity threats, attacks, and mitigations
Knowing the fundamentals of cybersecurity is a first step toward protecting against cyberthreats. In this learning path you will learn about cybersecurity concepts and ways to protect yourself and your business from cyberattacks. Cyberattacks are impacting individuals and businesses at alarming rates. Being informed about the evolving threat landscape and common types of attacks are key to learning how to protect against attacks.

Describe concepts of cryptography
Cryptography is foundational to protecting the confidentiality, integrity, and availability of information; and defending against cyberattacks. Throughout this module, you'll learn about the different elements of cryptography and their application in cybsecurity. Learning objectives After completing this module, you'll be able to: Describe some of the basic concepts of cryptography. Describe encryption and is uses in cybersecurity. Describe hashing and digital signing. Describe the concept and use of digital certificates.

Describe authentication and authorization in cybersecurity
Secure authentication and authorization are a cornerstone of protecting against cybersecurity threats. Learn about common identity-based attacks, different authentication methods, and ways to protect against unauthorized access. Learning objectives After completing this module, you'll be able to: - Define authentication. - Describe common authentication-based attacks. - Describe authorization security techniques. Prerequisites None Get started with Azure Choose the Azure account that's right for you. Pay as you go or try Azure free for up to 30 days.

Describe network-based threats and mitigations
Networks form the backbone of our digitally connected world. They also represent an entry point for cyberattacks. In this module, you'll learn about threats to network security and how to mitigate those threats. Learning objectives - Describe the basics of networks. - Describe the threats to network security. - Describe ways to protect your network. - Describe ways to securely connect to and communicate over a network. Get started with Azure Choose the Azure account that's right for you. Pay as you go or try Azure free for up to 30 days. Sign up.

Describe device-based threats and security controls
Internet connected devices are everywhere, and users and organizations depend on them for pretty much every facet of daily life and business use. Throughout this module, you'll learn about device threats and mitigation techniques. Learning objectives - Describe what your device knows about you. - Describe how devices and become cybersecurity threats. - Describe how to mitigate against device-related threats. Get started with Azure Choose the Azure account that's right for you. Pay as you go or try Azure free for up to 30 days. Sign up.

Describe application-based threats and how to protect against them
The proliferation of applications across the digital landscape presents an increased opportunity for cybercriminals. Throughout this module, you’ll learn about the threat landscape of application-based attacks and how to protect your applications. Learning objectives - Describe what are applications. - Describe the threat landscape of applications. - Describe how to protect your applications.

Describe threat protection with Microsoft Defender XDR
Protect against cyber threats with Microsoft Defender XDR across endpoints, identities, email, and applications. Learning objectives After completing this module, you'll be able to: - Describe the Microsoft Defender XDR service. - Describe how Microsoft Defender XDR provides integrated protection against sophisticated attacks. - Describe and explore Microsoft Defender portal. Prerequisites - General understanding of networking and cloud computing concepts. - General IT knowledge or any general experience working in an IT environment. - General understanding of Microsoft Azure and Microsoft 365.

Student Ratings & Reviews

No Review Yet
No Review Yet
$500.00 $1,000.00
« Previous Next »