Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

You're reading from   Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Arrow left icon
Product type Paperback
Published in May 2022
Last Updated in May 2022
Publisher Packt
ISBN-13 9781801815994
Length 404 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Dwayne Natwick Dwayne Natwick
Author Profile Icon Dwayne Natwick
Dwayne Natwick
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Section 1: Exam Overview
2. Chapter 1: Preparing for Your Microsoft Exam FREE CHAPTER 3. Section 2: The Key Concepts of Security, Compliance, and Identity
4. Chapter 2: Describing Security Methodologies 5. Chapter 3: Understanding Key Security Concepts 6. Chapter 4: Key Microsoft Security and Compliance Principles 7. Section 3: The Microsoft Identity Management Solutions
8. Chapter 5: Defining Identity Principles/Concepts and the Identity Services within Azure AD 9. Chapter 6: Describing the Authentication and Access Management Capabilities of Azure AD 10. Chapter 7: Describing the Identity Protection and Governance Capabilities of Azure AD 11. Section 4: The Microsoft Security Solutions for Microsoft 365 and Azure
12. Chapter 8: Describing Basic Security Services and Management Capabilities in Azure 13. Chapter 9: Describing Security Management and Capabilities of Azure 14. Chapter 10: Describing Threat Protection with Microsoft 365 Defender 15. Chapter 11: Describing the Security Capabilities of Microsoft Sentinel 16. Chapter 12: Describing Security Management and the Endpoint Security Capabilities of Microsoft 365 17. Section 5: The Microsoft Compliance Monitoring Capabilities within Microsoft 365 and Azure
18. Chapter 13: Compliance Management Capabilities in Microsoft 19. Chapter 14: Describing Information Protection and Governance Capabilities of Microsoft 365 20. Chapter 15: Describing Insider Risk, eDiscovery, and Audit Capabilities in Microsoft 365 21. Chapter 16: Describing Resource Governance Capabilities in Azure 22. Chapter 17: Final Assessment/ Mock Exam 23. Other Books You May Enjoy

Conventions used

There are a number of text conventions used throughout this book.

Code in text: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "To configure the host side of the network, you need the tunctl command from the User Mode Linux (UML) project."

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Once someone has authenticated to the systems that they are attempting to access, then authorization takes place. Authorization verifies the permissions for that user and determines what they are allowed to do when accessing the company systems."

Tips or Important Notes

Appear like this.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime