Microsoft Security, Compliance, and Identity Fundamentals Exam Syllabus

Security Compliance and Identity Fundamentals PDF, SC-900 Dumps, SC-900 PDF, Security Compliance and Identity Fundamentals VCE, SC-900 Questions PDF, Microsoft SC-900 VCE, Microsoft Security Compliance and Identity Fundamentals Dumps, Microsoft Security Compliance and Identity Fundamentals PDFUse this quick start guide to collect all the information about Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the SC-900 Microsoft Security Compliance and Identity Fundamentals exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Microsoft Security, Compliance, and Identity Fundamentals certification exam.

The Microsoft Security, Compliance, and Identity Fundamentals certification is mainly targeted to those candidates who want to build their career in Microsoft Security Compliance and Identity domain. The Microsoft Certified - Security Compliance and Identity Fundamentals exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Microsoft Security, Compliance, and Identity Fundamentals.

Microsoft Security, Compliance, and Identity Fundamentals Exam Summary:

Exam Name Microsoft Certified - Security Compliance and Identity Fundamentals
Exam Code SC-900
Exam Price $99 (USD)
Duration 120 mins
Number of Questions 40-60
Passing Score 700 / 1000
Books / Training Course SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals
Schedule Exam Pearson VUE
Sample Questions Microsoft Security, Compliance, and Identity Fundamentals Sample Questions
Practice Exam Microsoft SC-900 Certification Practice Exam

Microsoft SC-900 Exam Syllabus Topics:

Topic Details

Describe the Concepts of Security, Compliance, and Identity (5-10%)

Describe security and compliance concepts & methodologies - describe the Zero-Trust methodology
- describe the shared responsibility model
- define defense in depth
- describe common threats
- describe encryption and hashing
- describe cloud adoption framework
Define identity concepts - define identity as the primary security perimeter
- define authentication
- define authorization
- describe what identity providers are
- describe what Active Directory is
- describe the concept of Federated services
- define common Identity Attacks

Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)

Describe the basic identity services and identity types of Azure AD - describe what Azure Active Directory is
- describe Azure AD identity types (users, devices, groups, service principals/applications)
- describe what hybrid identity is
- describe the different external identity types (Guest Users)
Describe the authentication capabilities of Azure AD - describe the different authentication methods
- describe self-service password reset
- describe password protection and management capabilities
- describe Multi-factor Authentication
- describe Windows Hello for Business
Describe access management capabilities of Azure AD - describe what conditional access is
- describe uses and benefits of conditional access
- describe the benefits of Azure AD roles
Describe the identity protection & governance capabilities of Azure AD - describe what identity governance is
- describe what entitlement management and access reviews is
- describe the capabilities of PIM
- describe Azure AD Identity Protection

Describe the capabilities of Microsoft Security Solutions (30-35%)

Describe basic security capabilities in Azure - describe Azure Network Security groups
- describe Azure DDoS protection
- describe what Azure Firewall is
- describe what Azure Bastion is
- describe what Web Application Firewall is
- describe ways Azure encrypts data
Describe security management capabilities of Azure - describe Cloud security posture management (CSPM)
- describe Microsoft Defender for Cloud
- describe secure score in Microsoft Defender Cloud
- describe enhanced security of Microsoft Defender for Cloud
- describe security baselines for Azure
Describe security capabilities of Microsoft Sentinel - define the concepts of SIEM, SOAR, XDR
- describe how of Microsoft Sentinel provides integrated threat protection
Describe threat protection with Microsoft 365 Defender - describe Microsoft 365 Defender services
- describe Microsoft Defender for Identity (formerly Azure ATP)
- describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
- describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
- describe Microsoft Defender for Cloud Apps
Describe security management capabilities of Microsoft 365 - describe the Microsoft 365 Defender portal
- describe how to use Microsoft Secure Score
- describe security reports and dashboards
- describe incidents and incident management capabilities
Describe endpoint security with Microsoft Intune - describe what Intune is
- describe endpoint security with Intune
- describe the endpoint security with the Microsoft Endpoint Manager admin center

Describe the Capabilities of Microsoft Compliance Solutions (25-30%)

Describe the compliance management capabilities in Microsoft - describe the offerings of the Service Trust portal
- describe Microsoft’s privacy principles
- describe the compliance center
- describe compliance manager
- describe use and benefits of compliance score
Describe information protection and governance capabilities of Microsoft 365 - describe data classification capabilities
- describe the value of content and activity explorer
- describe sensitivity labels
- describe Retention Polices and Retention Labels
- describe Records Management
- describe Data Loss Prevention
Describe insider risk capabilities in Microsoft 365 - describe Insider risk management solution
- describe communication compliance
- describe information barriers
- describe privileged access management
- describe customer lockbox
Describe the eDiscovery and audit capabilities of Microsoft 365 - describe the purpose of eDiscovery
- describe the capabilities of the content search tool
- describe the core eDiscovery workflow
- describe the advanced eDiscovery workflow
- describe the core audit capabilities of M365
- describe purpose and value of Advanced Auditing
Describe resource governance capabilities in Azure - describe the use of Azure Resource locks
- describe what Azure Blueprints is
- define Azure Policy and describe its use cases

To ensure success in Microsoft Security, Compliance, and Identity Fundamentals certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Microsoft Security Compliance and Identity Fundamentals (SC-900) exam.

Rating: 5 / 5 (71 votes)