SC-900: Microsoft Security, Compliance, & Identity with SIMS
What you'll learn
- Learn the concepts and perform hands on activities needed to pass the SC-900 exam
- Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services
- Get loads of hands on experience with securing Microsoft 365 / Azure Services
- Utilize hands on simulations that can be access anytime, anywhere!
Requirements
- Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more then the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
Welcome to the course
Understanding the Microsoft Environment
Having a Solid Foundation of Active Directory Domains
Having a Solid Foundation of RAS, DMZ, and Virtualization
Having a Solid Foundation of the Microsoft Cloud Services
Questions for John Christopher
Performing hands on activities
IMPORTANT Using Assignments in the course
Creating a free Microsoft 365 Azure AD Account
Getting your free Azure credit
Describe security and compliance concepts
Describe the shared responsibility model
Describe defense in depth
Describe the Zero-Trust model
Describe encryption and hashing
Describe compliance concepts
Define identity concepts
Define identity as the primary security perimeter
Define authentication
Define authorization
Describe identity providers and the concept of Federation
Describe Active Directory
Describe the basic identity services and identity types of Azure AD
Describe Azure AD
Describe Azure AD identities including external identities
Describe hybrid identity
Describe the authentication capabilities of Azure AD
Describe the authentication methods available in Azure AD
Describe Multi-factor Authentication
Describe self-service password reset
Describe password protection and management capabilities available in Azure AD
Describe access management capabilities of Azure AD
Describe conditional access
Describe the benefits of Azure AD roles
Describe the benefits of Azure AD role-based access control
Describe the identity protection and governance capabilities of Azure AD
Describe identity governance in Azure AD
Describe entitlement management
Describe access reviews
Describe the capabilities of Azure AD Privileged Identity Management (PIM)
Implementing Azure AD Privileged Identity Management (PIM)
Describe Azure AD Identity Protection
Describe basic security capabilities in Azure
Visualizing general Azure networking
Describe Azure DDoS protection
Describe Azure Firewall
Describe Network Segmentation with VNet
Describe Azure Network Security groups
Create a virtual machine in Azure
Describe Azure Bastion and JIT Access
Describe ways Azure encrypts data
Describe security management capabilities of Azure
Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)
Describe the enhanced security features of Microsoft Defender for Cloud
Describe security baselines for Azure
Describe security capabilities of Microsoft Sentinel
Define the concepts of SIEM and SOAR
Setting up a log analytics workspace for using Sentinel
Describe how Microsoft Sentinel provides integrated threat management
Describe threat protection with Microsoft 365 Defender
Describe Microsoft 365 Defender services
Describe Microsoft Defender for Office 365
Describe Microsoft Defender for Endpoint
Describe Microsoft Defender for Cloud Apps
Using Microsoft Defender for Cloud Apps for policy creation
Describe Microsoft Defender for Identity
Basics of setting up Microsoft Defender for Identity
Describe the Microsoft 365 Defender portal
Describe Microsoft’s Service Trust Portal and privacy principles
Describe the offerings of the Service Trust portal
Describe Microsoft’s privacy principles
Describe the compliance management capabilities of Microsoft Purview
Describe the Microsoft Purview compliance portal
Describe compliance manager
Describe the use and benefits of compliance score
Describe information protection & data lifecycle management of Microsoft Purview
Describe data classification capabilities
Describe the benefits of content explorer and activity explorer
Describe sensitivity labels
Basics of using sensitivity labels
Describe Data Loss Prevention (DLP)
Basics of using Data Loss Prevention (DLP)
Describe Records Management
Describe Retention Polices and Retention Labels
Describe insider risk capabilities in Microsoft Purview
Describe Insider Risk Management
Describe communication compliance
Describe information barriers
Describe resource governance capabilities in Azure
Describe Azure Policy
Describe Azure Blueprints
Describe the capabilities of the Microsoft Purview governance portal
Finishing Up
Where do I go from here?
Who this course is for:
- IT people interested in learning and passing the Microsoft SC-900 exam!
- IT people interested in learning a tremendous amount about security in Microsoft 365 / Azure Services
Instructor
John Christopher is a Technical Instructor that has been in the business for 25 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.
In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company in 2001
For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from the company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.