Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

You're reading from   Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Arrow left icon
Product type Paperback
Published in May 2022
Last Updated in May 2022
Publisher Packt
ISBN-13 9781801815994
Length 404 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Dwayne Natwick Dwayne Natwick
Author Profile Icon Dwayne Natwick
Dwayne Natwick
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Section 1: Exam Overview
2. Chapter 1: Preparing for Your Microsoft Exam FREE CHAPTER 3. Section 2: The Key Concepts of Security, Compliance, and Identity
4. Chapter 2: Describing Security Methodologies 5. Chapter 3: Understanding Key Security Concepts 6. Chapter 4: Key Microsoft Security and Compliance Principles 7. Section 3: The Microsoft Identity Management Solutions
8. Chapter 5: Defining Identity Principles/Concepts and the Identity Services within Azure AD 9. Chapter 6: Describing the Authentication and Access Management Capabilities of Azure AD 10. Chapter 7: Describing the Identity Protection and Governance Capabilities of Azure AD 11. Section 4: The Microsoft Security Solutions for Microsoft 365 and Azure
12. Chapter 8: Describing Basic Security Services and Management Capabilities in Azure 13. Chapter 9: Describing Security Management and Capabilities of Azure 14. Chapter 10: Describing Threat Protection with Microsoft 365 Defender 15. Chapter 11: Describing the Security Capabilities of Microsoft Sentinel 16. Chapter 12: Describing Security Management and the Endpoint Security Capabilities of Microsoft 365 17. Section 5: The Microsoft Compliance Monitoring Capabilities within Microsoft 365 and Azure
18. Chapter 13: Compliance Management Capabilities in Microsoft 19. Chapter 14: Describing Information Protection and Governance Capabilities of Microsoft 365 20. Chapter 15: Describing Insider Risk, eDiscovery, and Audit Capabilities in Microsoft 365 21. Chapter 16: Describing Resource Governance Capabilities in Azure 22. Chapter 17: Final Assessment/ Mock Exam 23. Other Books You May Enjoy

What this book covers

Chapter 1, Preparing for Your Microsoft Exam, provides guidance on getting prepared for the Microsoft exam, along with resources that can assist in your learning plan. This includes helpful links along with steps on how to gain access to a trial Microsoft 365 subscription for hands-on practice.

Chapter 2, Describing Security Methodologies, covers the methodologies that you should know when planning and architecting a good security posture for your company to properly protect identities and information.

Chapter 3, Understanding Key Security Concepts, provides some basis for common security concepts and the types of threats that may affect your users and information. This chapter provides a high-level overview of how encryption can be used to protect that information.

Chapter 4, Key Microsoft Security and Compliance Principles, focuses on Microsoft's principles and guidelines for protecting the privacy of their customers. This includes the information that is provided in the Service Trust Portal for customers to find information on these principles and compliance reports on Microsoft data centers.

Chapter 5, Defining Identity Principles/Concepts and the Identity Services within Azure AD, covers the concept of identity protection. This includes how authentication and authorization work along with common identity attacks. It also introduces Azure Active Directory and describes identity providers.

Chapter 6, Describing the Authentication and Access Management Capabilities of Azure AD, covers identity management with Azure Active Directory. This includes the protection of identities for cloud and hybrid applications and how to use external users and groups for collaboration.

Chapter 7, Describing the Identity Protection and Governance Capabilities of Azure AD, discusses the different ways to utilize the services within Azure AD to govern and protect identities. This includes access reviews, PIM, and Conditional Access policies.

Chapter 8, Describing Basic Security Services and Management Capabilities in Azure, describes the various security services within Azure for network, compute, and data protection. This includes perimeter and application security services.

Chapter 9, Describing Security Management and Capabilities of Azure, describes the capabilities within Azure to manage, monitor, and protect against security threats and vulnerabilities within your infrastructure.

Chapter 10, Describing Threat Protection with Microsoft 365 Defender, describes the threat protection services within Microsoft 365 Defender for the protection of cloud and hybrid applications. This defines the various services that make up the Defender suite of products environment.

Chapter 11, Describing the Security Capabilities of Microsoft Sentinel, describes the capabilities of a modern security operations center and how Microsoft Sentinel can be used for SIEM and SOAR capabilities for integrated threat management.

Chapter 12, Describing Security Management and Endpoint Security Capabilities of Microsoft 365, describes the security management capabilities within Microsoft 365. This includes how to use Microsoft 365 Defender for security posture and incident management.

Chapter 13, Compliance Management Capabilities in Microsoft, describes how to use the Microsoft compliance center to access and manage security best practices and regulatory compliance with your Microsoft 365 connected applications.

Chapter 14, Describing Information Protection and Governance Capabilities of Microsoft 365, describes the information protection and governance capabilities within Microsoft 365. This includes how to use these services for the protection and retention of data.

Chapter 15, Describing Insider Risk, eDiscovery, and Audit Capabilities in Microsoft 365, describes the services that allow protecting barriers, auditing, and putting a hold on data for the purposes of review and investigation.

Chapter 16, Describing Resource Governance Capabilities in Azure, describes the governance capabilities within Azure to maintain baselines and consistency within our resources. This includes how to prevent unauthorized changes, create a standard for deployment, and create policies to govern cost and security. This chapter closes with an overview of the Cloud Adoption Framework.

Chapter 17, Final Assessment/Mock Exam, provides a final assessment and mock exam questions to complete the final preparations to take the SC-900 exam.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime