Udemy

SC-900: Microsoft Security, Compliance, & Identity with SIMS

Enroll Now
  • 5,426 Students
  • Updated 11/2025
4.7
(1,059 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
11 Hour(s) 56 Minute(s)
Language
English
Taught by
John Christopher
Rating
4.7
(1,059 Ratings)
1 views

Course Overview

SC-900: Microsoft Security, Compliance, & Identity with SIMS

Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7

We really hope you'll agree, this training is way more then the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • Having a Solid Foundation of Active Directory Domains

  • Having a Solid Foundation of RAS, DMZ, and Virtualization

  • Having a Solid Foundation of the Microsoft Cloud Services

  • Questions for John Christopher

Performing hands on activities

  • IMPORTANT Using Assignments in the course

  • Creating a free Microsoft 365 Azure AD Account

  • Getting your free Azure credit

Describe security and compliance concepts

  • Describe the shared responsibility model

  • Describe defense in depth

  • Describe the Zero-Trust model

  • Describe encryption and hashing

  • Describe compliance concepts

Define identity concepts

  • Define identity as the primary security perimeter

  • Define authentication

  • Define authorization

  • Describe the concept of directory services and Active Directory

  • Describe the concept of federation

Describe function and identity types of Microsoft Entra ID

  • Describe Azure AD

  • Describe Azure AD identities including external identities

  • Describe hybrid identity

Describe the authentication capabilities of Azure AD

  • Describe the authentication methods available in Azure AD

  • Describe Multi-factor Authentication

  • Describe self-service password reset

  • Describe password protection and management capabilities available in Azure AD

Describe access management capabilities of Azure AD

  • Describe conditional access

  • Creating conditional access polies

  • Describe the benefits of Azure AD roles

  • Describe the benefits of Azure AD role-based access control

Describe the identity protection and governance capabilities of Azure AD

  • Describe identity governance in Azure AD

  • Describe entitlement management

  • Describe access reviews

  • Describe the capabilities of Azure AD Privileged Identity Management (PIM)

  • Implementing Azure AD Privileged Identity Management (PIM)

  • Describe Azure AD Identity Protection

Describe basic security capabilities in Azure

  • Visualizing general Azure networking

  • Describe Azure DDoS protection

  • Describe Azure Firewall

  • Describe Network Segmentation with VNet

  • Describe Azure Network Security groups

  • Create a virtual machine in Azure

  • Describe Azure Bastion and JIT Access

  • Describe ways Azure encrypts data

Describe security management capabilities of Azure

  • Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)

  • Describe the enhanced security features of Microsoft Defender for Cloud

  • Describe security baselines for Azure

Describe security capabilities of Microsoft Sentinel

  • Define the concepts of security information and event management (SIEM) and SOAR

  • Describe threat detection and mitigation capabilities in Microsoft Sentinel

Describe threat protection with Microsoft 365 Defender

  • Describe Microsoft 365 Defender services

  • Describe Microsoft Defender for Office 365

  • Describe Microsoft Defender for Endpoint

  • Describe Microsoft Defender for Cloud Apps

  • Using Microsoft Defender for Cloud Apps for policy creation

  • Describe Microsoft Defender for Identity

  • Basics of setting up Microsoft Defender for Identity

  • Describe the Microsoft 365 Defender portal

Describe Microsoft’s Service Trust Portal and privacy principles

  • Describe the offerings of the Service Trust portal

  • Describe Microsoft’s privacy principles

Describe the compliance management capabilities of Microsoft Purview

  • Describe the Microsoft Purview compliance portal

  • Describe compliance manager

  • Describe the use and benefits of compliance score

Describe information protection & data lifecycle management of Microsoft Purview

  • Describe data classification capabilities

  • Describe the benefits of content explorer and activity explorer

  • Describe sensitivity labels

  • Basics of using sensitivity labels

  • Describe Data Loss Prevention (DLP)

  • Basics of using Data Loss Prevention (DLP)

  • Describe Records Management

  • Describe Retention Polices and Retention Labels

Describe insider risk capabilities in Microsoft Purview

  • Describe Insider Risk Management

  • Describe communication compliance

  • Describe information barriers

Describe resource governance capabilities in Azure

  • Describe Azure Policy

  • Describe Azure Blueprints

  • Describe the capabilities of the Microsoft Purview governance portal

Finishing Up

  • Where do I go from here?


Course Content

  • 10 section(s)
  • 85 lecture(s)
  • Section 1 Introduction
  • Section 2 Performing hands on activities
  • Section 3 Describe security and compliance concepts
  • Section 4 Define identity concepts
  • Section 5 Describe function and identity types of Microsoft Entra ID
  • Section 6 Describe authentication capabilities of Microsoft Entra ID
  • Section 7 Describe access management capabilities of Microsoft Entra ID
  • Section 8 Describe the identity protection and governance capabilities of Azure AD
  • Section 9 Describe core infrastructure security services in Azure
  • Section 10 Describe security management capabilities of Azure

What You’ll Learn

  • Learn the concepts and perform hands on activities needed to pass the SC-900 exam
  • Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services
  • Get loads of hands on experience with securing Microsoft 365 / Azure Services
  • Utilize hands on simulations that can be access anytime, anywhere!


Reviews

  • U
    Uma Sudhan
    4.5

    The course was very informative and well-structured. John’s ability to explain complex concepts in a simple and engaging manner made the learning experience highly effective and enjoyable

  • J
    Justin Wade
    5.0

    The content was relevant and delivered well.

  • M
    Michael Terry
    5.0

    Very clearly explained concepts and he teaches you not just how to pass the exam but give you additional meaningful information on how to use the products. I've done a few of these courses now, and I often specifically speak out JC

  • G
    Gabriel Laratta
    4.0

    Great course! Thank you John. What it would help, if there were some quizzes or at the end one exam.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed