Skip to content

Latest commit

 

History

History
190 lines (98 loc) · 7.63 KB

File metadata and controls

190 lines (98 loc) · 7.63 KB

Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)!

https://docs.microsoft.com/en-us/certifications/security-compliance-and-identity-fundamentals/

https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Mr81

Free Sample Questions
https://docs.microsoft.com/en-us/certifications/resources/sc-900-sample-questions?azure-portal=true

Microsoft Learn:

https://docs.microsoft.com/en-us/learn/paths/describe-concepts-of-security-compliance-identity/

https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-identity-access/

https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-security-solutions/

https://docs.microsoft.com/en-us/learn/paths/describe-capabilities-of-microsoft-compliance-solutions/

Thomas Maurer's Study Guide

https://www.thomasmaurer.ch/2021/04/sc-900-study-guide-microsoft-security-compliance-and-identity-fundamentals/

More helpful information directly from Microsoft, divided into the functional groups (Skills measured)!

Describe the concepts of security, compliance, and identity:

https://www.microsoft.com/en-us/security/business/zero-trust

https://azure.microsoft.com/en-us/resources/videos/

https://docs.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility

https://www.microsoft.com/videoplayer/embed/RE4J3ms

https://docs.microsoft.com/en-us/windows/win32/seccrypto/digital-signatures

https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/

https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview

https://docs.microsoft.com/en-us/azure/active-directory/develop/authentication-vs-authorization

https://www.microsoft.com/videoplayer/embed/RE4Kdt9

https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview

Describe the capabilities of Microsoft identity and access management solutions:

https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis

https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-hybrid-identity

https://docs.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b

https://docs.microsoft.com/en-us/azure/active-directory-b2c/overview

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods

https://docs.microsoft.com/en-us/azure/active-directory/authentication/overview-authentication

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks

https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-overview

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview

https://docs.microsoft.com/en-us/azure/active-directory/roles/custom-overview

https://docs.microsoft.com/en-us/azure/active-directory/governance/identity-governance-overview

https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview

https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview

https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure

https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection

Describe the capabilities of Microsoft Security solutions:

https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview

https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview

https://docs.microsoft.com/en-us/azure/firewall/overview

https://docs.microsoft.com/en-us/azure/bastion/bastion-overview

https://docs.microsoft.com/en-us/azure/web-application-firewall/overview

https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-overview

https://docs.microsoft.com/en-ca/azure/defender-for-cloud/defender-for-cloud-introduction

https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls

https://docs.microsoft.com/en-ca/azure/defender-for-cloud/enhanced-security-features-overview

https://docs.microsoft.com/en-us/security/benchmark/azure/security-baselines-overview

https://docs.microsoft.com/en-in/azure/sentinel/overview

https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender

https://docs.microsoft.com/en-us/defender-for-identity/what-is

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/defender-for-office-365

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint

https://docs.microsoft.com/en-us/defender-cloud-apps/what-is-defender-for-cloud-apps

https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender

https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score

https://docs.microsoft.com/en-us/microsoft-365/admin/activity-reports/activity-reports

https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview

https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune

https://docs.microsoft.com/en-us/mem/intune/protect/endpoint-security

https://docs.microsoft.com/en-us/mem/endpoint-manager-overview

Describe the capabilities of Microsoft compliance solutions:

https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center

https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager

https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation

https://privacy.microsoft.com/en-US/

https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal

https://docs.microsoft.com/en-us/azure/compliance/

https://docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-overview

https://docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-content-explorer

https://docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-activity-explorer

https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels

https://docs.microsoft.com/en-us/microsoft-365/compliance/retention

https://docs.microsoft.com/en-us/microsoft-365/compliance/records-management

https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp

https://docs.microsoft.com/en-us/microsoft-365/compliance/insider-risk-solution-overview

https://docs.microsoft.com/en-us/microsoft-365/compliance/communication-compliance-solution-overview

https://docs.microsoft.com/en-us/microsoft-365/compliance/information-barriers-solution-overview

https://docs.microsoft.com/en-us/microsoft-365/compliance/privileged-access-management

https://docs.microsoft.com/en-us/microsoft-365/compliance/customer-lockbox-requests

https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery

https://docs.microsoft.com/en-us/microsoft-365/compliance/search-for-content

https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-core-ediscovery

https://docs.microsoft.com/en-us/microsoft-365/compliance/overview-ediscovery-20

https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance

https://docs.microsoft.com/en-us/microsoft-365/compliance/advanced-audit

https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources

https://docs.microsoft.com/en-us/azure/governance/blueprints/overview

https://docs.microsoft.com/en-us/azure/governance/policy/overview