https://docs.microsoft.com/en-us/certifications/security-compliance-and-identity-fundamentals/
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Mr81
Free Sample Questions
https://docs.microsoft.com/en-us/certifications/resources/sc-900-sample-questions?azure-portal=true
https://docs.microsoft.com/en-us/learn/paths/describe-concepts-of-security-compliance-identity/
https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-identity-access/
https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-security-solutions/
More helpful information directly from Microsoft, divided into the functional groups (Skills measured)!
Describe the concepts of security, compliance, and identity:
https://www.microsoft.com/en-us/security/business/zero-trust
https://azure.microsoft.com/en-us/resources/videos/
https://docs.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility
https://www.microsoft.com/videoplayer/embed/RE4J3ms
https://docs.microsoft.com/en-us/windows/win32/seccrypto/digital-signatures
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview
https://docs.microsoft.com/en-us/azure/active-directory/develop/authentication-vs-authorization
https://www.microsoft.com/videoplayer/embed/RE4Kdt9
Describe the capabilities of Microsoft identity and access management solutions:
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-hybrid-identity
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b
https://docs.microsoft.com/en-us/azure/active-directory-b2c/overview
https://docs.microsoft.com/en-us/azure/active-directory/authentication/overview-authentication
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
https://docs.microsoft.com/en-us/azure/active-directory/roles/custom-overview
https://docs.microsoft.com/en-us/azure/active-directory/governance/identity-governance-overview
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Describe the capabilities of Microsoft Security solutions:
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview
https://docs.microsoft.com/en-us/azure/firewall/overview
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview
https://docs.microsoft.com/en-us/azure/web-application-firewall/overview
https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-overview
https://docs.microsoft.com/en-ca/azure/defender-for-cloud/defender-for-cloud-introduction
https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls
https://docs.microsoft.com/en-ca/azure/defender-for-cloud/enhanced-security-features-overview
https://docs.microsoft.com/en-us/security/benchmark/azure/security-baselines-overview
https://docs.microsoft.com/en-in/azure/sentinel/overview
https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender
https://docs.microsoft.com/en-us/defender-for-identity/what-is
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/defender-for-office-365
https://docs.microsoft.com/en-us/defender-cloud-apps/what-is-defender-for-cloud-apps
https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender
https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score
https://docs.microsoft.com/en-us/microsoft-365/admin/activity-reports/activity-reports
https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview
https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune
https://docs.microsoft.com/en-us/mem/intune/protect/endpoint-security
https://docs.microsoft.com/en-us/mem/endpoint-manager-overview
Describe the capabilities of Microsoft compliance solutions:
https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation
https://privacy.microsoft.com/en-US/
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal
https://docs.microsoft.com/en-us/azure/compliance/
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-overview
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-content-explorer
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-activity-explorer
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels
https://docs.microsoft.com/en-us/microsoft-365/compliance/retention
https://docs.microsoft.com/en-us/microsoft-365/compliance/records-management
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp
https://docs.microsoft.com/en-us/microsoft-365/compliance/insider-risk-solution-overview
https://docs.microsoft.com/en-us/microsoft-365/compliance/communication-compliance-solution-overview
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-barriers-solution-overview
https://docs.microsoft.com/en-us/microsoft-365/compliance/privileged-access-management
https://docs.microsoft.com/en-us/microsoft-365/compliance/customer-lockbox-requests
https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-for-content
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-core-ediscovery
https://docs.microsoft.com/en-us/microsoft-365/compliance/overview-ediscovery-20
https://docs.microsoft.com/en-us/microsoft-365/compliance/advanced-audit
https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources
https://docs.microsoft.com/en-us/azure/governance/blueprints/overview
https://docs.microsoft.com/en-us/azure/governance/policy/overview