Testprep Training Blog
Microsoft Certified: Security, Compliance, Identity Fundamentals certifications show that candidates are familiar with Microsoft Azure. They also know how Microsoft security, compliance and identity solutions can be combined across these areas to provide a holistic, end-to-end solution. The Microsoft Certified: Security, Compliance, and Identification Fundamentals exam is part of the Microsoft Certified. The Microsoft Exam SC-900 tests the ability of an aspirant or candidate to describe security, compliance, identity, and other concepts; capabilities and access management solutions of Microsoft; capabilities and capabilities of Microsoft security solutions; compliance solutions of Microsoft.
Ideal Candidates for Exam SC-900
Business stakeholders, whether they are new or experienced IT professionals, or
Students with an interest in Microsoft security, compliance and identity solutions.
This certification is also for those who wish to learn the fundamentals and compliance of security, identity, and compliance (SCI) across cloud-based services and related Microsoft services.
Knowledge is required
Candidates must be familiar with Microsoft Azure and Microsoft 365 in order to pass the SC-900 Exam. They should also be able to understand how Microsoft security and compliance solutions can be used across these areas to provide a holistic, end-to-end solution.
A Course Outline
Testprep Training believes that providing candidates with a complete course outline and the relevant documentation can make them stand out. Let’s start with Exam SC-900 course outline.
Describe the concepts of security, compliance, and identity (5-10%)
Describe security methods
Describing the Zero-Trust methodology (Microsoft Documentation:zero-trust methodology)
Explaining the shared responsibility model (Microsoft Docation:shared Responsibility Model, Shared responsibility in the Cloud)
Defining defense in depth (Microsoft Documentation:What is defense in depth?)
Describe security concepts
Describing common threats (Microsoft Documentation:Understanding malware & other threats)
Also, Encryption (Microsoft Documentation:Encryption)
Describe Microsoft Security and Compliance Principles
Representing Microsoft’s privacy principles (Microsoft Documentation:Microsoft’s privacy principles,Microsoft Privacy)
Describing the offerings of the service trust portal (Microsoft Documentation:offerings of the Service Trust Portal)
Describe the capabilities and benefits of Microsoft Identity & Access Management Solutions (25-30%)
Define identity principles/concepts
Defining identity as the primary security perimeter (Microsoft Documentation:Identity as the primary security perimeter)
Next, defining authentication (Microsoft Documentation:Authentication vs. authorization)
Also, authorization (Microsoft Documentation:Authentication vs. authorization)
Then, describing what identity providers are (Microsoft Documentation:Identity Providers for External Identities)
Descriptive description of Active Directory
The concept of Federated services (Microsoft Documentation:concept of Federated Services)
Further, Identity Attacks are defined.
Describe the basic identity services of Azure AD and the identity types.
Describe what Azure Active Directory is (Microsoft Doction:Azure Active Directory,Explaining What is Azure Active Directory).
Azure AD identities (users, devices, groups, service principals/applications) (Microsoft Documentation:Azure AD identity types)
Explaining what hybrid identity is (Microsoft Documentation:concept of hybrid identities)
The various types of external identities (Guest Users) (Microsoft documentation:types external identities)
Describe Azure AD’s authentication capabilities
Describing the different authentication methods (Microsoft Documentation:Describe the diff