What this book covers
Chapter 1, Preparing for Your Microsoft Exam, provides guidance on getting prepared for the Microsoft exam, along with resources that can assist in your learning plan. This includes helpful links along with steps on how to gain access to a trial Microsoft 365 subscription for hands-on practice.
Chapter 2, Describing Security Methodologies, covers the methodologies that you should know when planning and architecting a good security posture for your company to properly protect identities and information.
Chapter 3, Understanding Key Security Concepts, provides some basis for common security concepts and the types of threats that may affect your users and information. This chapter provides a high-level overview of how encryption can be used to protect that information.
Chapter 4, Key Microsoft Security and Compliance Principles, focuses on Microsoft's principles and guidelines for protecting the privacy of their customers. This includes the information that is provided in the Service Trust Portal for customers to find information on these principles and compliance reports on Microsoft data centers.
Chapter 5, Defining Identity Principles/Concepts and the Identity Services within Azure AD, covers the concept of identity protection. This includes how authentication and authorization work along with common identity attacks. It also introduces Azure Active Directory and describes identity providers.
Chapter 6, Describing the Authentication and Access Management Capabilities of Azure AD, covers identity management with Azure Active Directory. This includes the protection of identities for cloud and hybrid applications and how to use external users and groups for collaboration.
Chapter 7, Describing the Identity Protection and Governance Capabilities of Azure AD, discusses the different ways to utilize the services within Azure AD to govern and protect identities. This includes access reviews, PIM, and Conditional Access policies.
Chapter 8, Describing Basic Security Services and Management Capabilities in Azure, describes the various security services within Azure for network, compute, and data protection. This includes perimeter and application security services.
Chapter 9, Describing Security Management and Capabilities of Azure, describes the capabilities within Azure to manage, monitor, and protect against security threats and vulnerabilities within your infrastructure.
Chapter 10, Describing Threat Protection with Microsoft 365 Defender, describes the threat protection services within Microsoft 365 Defender for the protection of cloud and hybrid applications. This defines the various services that make up the Defender suite of products environment.
Chapter 11, Describing the Security Capabilities of Microsoft Sentinel, describes the capabilities of a modern security operations center and how Microsoft Sentinel can be used for SIEM and SOAR capabilities for integrated threat management.
Chapter 12, Describing Security Management and Endpoint Security Capabilities of Microsoft 365, describes the security management capabilities within Microsoft 365. This includes how to use Microsoft 365 Defender for security posture and incident management.
Chapter 13, Compliance Management Capabilities in Microsoft, describes how to use the Microsoft compliance center to access and manage security best practices and regulatory compliance with your Microsoft 365 connected applications.
Chapter 14, Describing Information Protection and Governance Capabilities of Microsoft 365, describes the information protection and governance capabilities within Microsoft 365. This includes how to use these services for the protection and retention of data.
Chapter 15, Describing Insider Risk, eDiscovery, and Audit Capabilities in Microsoft 365, describes the services that allow protecting barriers, auditing, and putting a hold on data for the purposes of review and investigation.
Chapter 16, Describing Resource Governance Capabilities in Azure, describes the governance capabilities within Azure to maintain baselines and consistency within our resources. This includes how to prevent unauthorized changes, create a standard for deployment, and create policies to govern cost and security. This chapter closes with an overview of the Cloud Adoption Framework.
Chapter 17, Final Assessment/Mock Exam, provides a final assessment and mock exam questions to complete the final preparations to take the SC-900 exam.