Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)
Learn about the Zero-Trust model, Azure AD, M365 Defender, Azure Defender and fundamental Security knowledge.
Get Access NowUSD $29.00
USD $60.00
(50% off)
This Course Includes:
1 Year Access
3
Hours of Video
138
Lectures
6
Follow Alongs
19
Cheat Sheets
133
Flashcards
3
Practice Exams
Individual Video Quizlets
Certificate of Completion
Course Outline
Introduction
11m 31s
Meet Your Instructor
1m 47s
Lecture
Watch
What is the SC-900?
4m 58s
Lecture
Watch
Exam Guide
4m 46s
Lecture
Watch
Security Methodologies
15m 46s
Zero Trust Model
1m 36s
Lecture
Watch
Zero Trust Principles
48s
Lecture
Watch
Zero Trust Pillars
3m 50s
Lecture
Watch
Zero Trust Assessment Tool
40s
Lecture
Watch
Follow Along Zero Trust Assement Tool
2m 18s
Follow Along
Watch
Shared Responsbility Model
3m
Lecture
Watch
Defense In Depth
1m 42s
Lecture
Watch
CIA Triad
1m 52s
Lecture
Watch
Security Concepts
32m 18s
Common Threats
1m 28s
Lecture
Watch
Vulnerabilities
1m 11s
Lecture
Watch
Encryption
45s
Lecture
Watch
Cyphers
1m 9s
Lecture
Watch
Cryptographic Keys
54s
Lecture
Watch
Hashing and Salting
2m 1s
Lecture
Watch
Digital Signatures
2m 28s
Lecture
Watch
In-Transit vs At-Rest
1m 13s
Lecture
Watch
MFA
44s
Lecture
Watch
SIEM
1m 38s
Lecture
Watch
SOAR
1m 8s
Lecture
Watch
XDR
42s
Lecture
Watch
EDR
1m 32s
Lecture
Watch
CASB
1m 21s
Lecture
Watch
Security Posture
2m 30s
Lecture
Watch
CSPM
1m 17s
Lecture
Watch
JIT and JEP
1m 5s
Lecture
Watch
Ingress vs Egress
34s
Lecture
Watch
Shadow IT
43s
Lecture
Watch
AIR
1m 11s
Lecture
Watch
Threat Modeling
44s
Lecture
Watch
STRIDE
1m 5s
Lecture
Watch
Follow Along Microsoft Threat Modeling
1m 25s
Follow Along
Watch
IDS IPS
1m 51s
Lecture
Watch
MITRE Attack Framework
51s
Lecture
Watch
Follow Along Mitre Attack Framework
48s
Follow Along
Watch
Privacy
3m 31s
Microsoft Privacy Principles
1m 3s
Lecture
Watch
Microsoft Privacy
2m 28s
Lecture
Watch
Identity
3m 9s
Primary Security Perimeter
1m 32s
Lecture
Watch
Identity Providers
1m 37s
Lecture
Watch
Azure AD
18m 57s
Introduction to Azure AD
2m 20s
Lecture
Watch
Active Directory vs Azure AD
1m 1s
Lecture
Watch
App Registrations
37s
Lecture
Watch
External Identities
3m 15s
Lecture
Watch
Service Principal
1m 7s
Lecture
Watch
Managed Identity
1m 19s
Lecture
Watch
Device Management
2m 16s
Lecture
Watch
MDM and MAM
56s
Lecture
Watch
Windows Hello
1m 13s
Lecture
Watch
Azure AD Connect
59s
Lecture
Watch
SSPR
39s
Lecture
Watch
Password Protection
1m 20s
Lecture
Watch
Identity Management Best Practices
46s
Lecture
Watch
Emergency Access Accounts
1m 9s
Lecture
Watch
Azure AD Authenication
6m 14s
Authentication Methods
31s
Lecture
Watch
Microsoft Authenticator
22s
Lecture
Watch
Follow Along Microsoft Authenicator
48s
Follow Along
Watch
Biometrics
46s
Lecture
Watch
FIDO and Security Keys
1m 22s
Lecture
Watch
Open Authenication
1m 3s
Lecture
Watch
Passwordless Authenication
1m 22s
Lecture
Watch
Azure AD Management
4m 51s
Conditional Access
2m 55s
Lecture
Watch
Azure AD Roles
41s
Lecture
Watch
RBAC
1m 15s
Lecture
Watch
Azure AD Protection Goverance
10m 1s
Identity Goverance
48s
Lecture
Watch
HCM
55s
Lecture
Watch
Identity Lifecycle
1m 27s
Lecture
Watch
Access Lifecycle
47s
Lecture
Watch
Priviledge Access Lifecycle
33s
Lecture
Watch
Entitlement Management
1m 26s
Lecture
Watch
PIM
54s
Lecture
Watch
Identity Protection
43s
Lecture
Watch
Detection and Remediation
1m 21s
Lecture
Watch
Investigation
1m 7s
Lecture
Watch
Azure NSG
6m 43s
NSG Rules
57s
Lecture
Watch
Default Security Rules
36s
Lecture
Watch
Security Rules Logic
2m 2s
Lecture
Watch
NSG Combinations
1m 49s
Lecture
Watch
NSG CheatSheet
1m 19s
Cheatsheet
Watch
Azure Firewall
1m 16s
Azure Firewall
1m 16s
Lecture
Watch
AzureDDoS Protection
2m 13s
Azure Ddos Protection
2m 13s
Lecture
Watch
Azure Bastion
1m 38s
Azure Bastion
1m 38s
Lecture
Watch
Azure WAF
1m 25s
Azure WAF
1m 25s
Lecture
Watch
Encryption
3m 43s
Encryption Overview
40s
Lecture
Watch
Azure Disk Encryption
50s
Lecture
Watch
TDE
48s
Lecture
Watch
Key Vault
1m 25s
Lecture
Watch
Azure Security Center
4m 55s
Azure Security Benchmark
46s
Lecture
Watch
Azure Security Center
1m 30s
Lecture
Watch
Azure Security Benchmark Detailed
2m 39s
Lecture
Watch
Azure Defender
2m 51s
Azure Defender
2m 51s
Lecture
Watch
Azure Sentinel
4m 38s
Azure Sentinel
1m 5s
Lecture
Watch
Data Sources
33s
Lecture
Watch
Azure Workbooks
48s
Lecture
Watch
Azure Sentinel Features
1m 51s
Lecture
Watch
Azure Sentinel Pricing
21s
Lecture
Watch
M365 Defender
12m 5s
M365
40s
Lecture
Watch
M365 Defender
46s
Lecture
Watch
Secure Score
29s
Lecture
Watch
Defender for Endpoint
2m 5s
Lecture
Watch
Security Reports
1m 13s
Lecture
Watch
Defender for Indentity
1m 28s
Lecture
Watch
Defender for Office 365
2m 46s
Lecture
Watch
MCAS
2m 38s
Lecture
Watch
Microsoft Endpoint Manager
1m 24s
Microsoft Endpoint Manager
1m 24s
Lecture
Watch
Compliance
8m 1s
Regulatory Compliance
1m 16s
Lecture
Watch
M365 Compliance Center
43s
Lecture
Watch
Azure Trust Center
35s
Lecture
Watch
Compliance Manager
1m 40s
Lecture
Watch
Follow Along Compliance Manager
1m 7s
Follow Along
Watch
Compliance Programs
2m 40s
Lecture
Watch
Protection and Governance
13m 11s
MIP
39s
Lecture
Watch
Know Protect Prevent
2m 13s
Lecture
Watch
GIP
42s
Lecture
Watch
Sensitive Information Types
1m 6s
Lecture
Watch
Trainable Classifiers
1m 3s
Lecture
Watch
Content Explorer
45s
Lecture
Watch
Activitiy Explorer
39s
Lecture
Watch
Sensitivity Labels
2m 12s
Lecture
Watch
Label Policies
1m 31s
Lecture
Watch
Retention Labels and Policies
35s
Lecture
Watch
Records Management
1m 15s
Lecture
Watch
DLP
31s
Lecture
Watch
Risk Capabilities
12m 7s
Insider Risk Management
2m 49s
Lecture
Watch
Communication Compliance
2m 29s
Lecture
Watch
Information Barriers
1m 2s
Lecture
Watch
Priviledge Access Management
52s
Lecture
Watch
Customer Lockbox
54s
Lecture
Watch
eDiscovery
49s
Lecture
Watch
Core eDiscovery Workflow
44s
Lecture
Watch
Content Search and Holds
1m 1s
Lecture
Watch
Advanced eDiscovery Workflow
30s
Lecture
Watch
M365 Audit
57s
Lecture
Watch
Azure Security Concepts
15m 13s
Resource Locks
42s
Lecture
Watch
Resource Tags
52s
Lecture
Watch
Azure Blueprints
1m 20s
Lecture
Watch
Azure Policy
1m 37s
Lecture
Watch
Cloud Adoption Framework
2m 27s
Lecture
Watch
Well Architected Framework
1m 45s
Lecture
Watch
Microsoft Security Best Practices
1m
Lecture
Watch
Follow Along Microsoft Security Best Practices
1m 11s
Follow Along
Watch
SAS
1m 51s
Lecture
Watch
CORS
1m 44s
Lecture
Watch
SDL
44s
Lecture
Watch