fbpx

Certificação SC-900: Microsoft Security, Compliance, and Identity Fundamentals – Dicas para a prova

Shape Image One
Certificação SC-900: Microsoft Security, Compliance, and Identity Fundamentals – Dicas para a prova

Salve galera! Wellington Agápto por aqui. No episódio de hoje do Podcast Formata meu PC? eu recebi o convidado Vinicius Carmo e conversamos a respeito da Certificação SC-900: Microsoft Security, Compliance, and Identity Fundamentals. Um grande abraço e até a próxima.

 

Curso para a Certificação SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Quer obter sua certificação SC-900 através de um método de ensino único capaz de aprová-lo em apenas 4 semanas? Conhece o Nosso curso preparatório para a certificação SC-900: Microsoft Security, Compliance, and Identity Fundamentals clicando AQUI.

 

Sobre a Certificação SC-900

Este exame é direcionado para aqueles que procuram se familiarizar com os fundamentos de segurança, conformidade e identidade (SCI) em todos os serviços da Microsoft baseados em cloud e relacionados.

Este é um público amplo que pode incluir partes interessadas em negócios, profissionais de IT novos ou existentes ou estudantes que tenham interesse em soluções de segurança, conformidade e identidade da Microsoft.

Os candidatos devem estar familiarizados com Microsoft Azure o Microsoft 365 e entender como as soluções de segurança, conformidade e identidade da Microsoft podem se estender por essas áreas de solução para fornecer uma solução holística e completa.

 

Quais os tópicos cobrados na prova SC-900?

Describe the Concepts of Security, Compliance, and Identity (5-10%)

Describe security methodologies

  • Describe the Zero-Trust methodology
  • Describe the shared responsibility model
  • Define defense in depth

Describe security concepts

  • Describe common threats
  • Describe encryption

Describe Microsoft Security and compliance principles

  • Describe Microsoft’s privacy principles
  • Describe the offerings of the service trust portal

 

Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)

Define identity principles/concepts

  • Define identity as the primary security perimeter
  • Define authentication
  • Define authorization
  • Describe what identity providers are
  • Describe what Active Directory is
  • Describe the concept of Federated services
  • Define common Identity Attacks

Describe the basic identity services and identity types of Azure AD

  • Describe what Azure Active Directory is
  • Describe Azure AD identities (users, devices, groups, service principals/applications)
  • Describe what hybrid identity is
  • Describe the different external identity types (Guest Users)

Describe the authentication capabilities of Azure AD

  • Describe the different authentication methods
  • Describe self-service password reset
  • Describe password protection and management capabilities
  • Describe Multi-factor Authentication
  • Describe Windows Hello for Business

Describe access management capabilities of Azure AD

  • Describe what conditional access is
  • Describe uses and benefits of conditional access
  • Describe the benefits of Azure AD roles

Describe the identity protection & governance capabilities of Azure AD

  • Describe what identity governance is
  • Describe what entitlement management and access reviews is
  • Describe the capabilities of PIM
  • Describe Azure AD Identity Protection

 

Describe the capabilities of Microsoft Security Solutions (30-35%)

Describe basic security capabilities in Azure

  • Describe Azure Network Security groups
  • Describe Azure DDoS protection
  • Describe what Azure Firewall is
  • Describe what Azure Bastion is
  • Describe what Web Application Firewall is
  • Describe ways Azure encrypts data

Describe security management capabilities of Azure

  • Describe the Azure Security center
  • Describe Azure Secure score
  • Describe the benefit and use cases of Azure Defender – previously the cloud workload

Protection platform (CWPP)

  • Describe Cloud security posture management (CSPM)
  • Describe security baselines for Azure

Describe security capabilities of Azure Sentinel

  • Define the concepts of SIEM, SOAR, XDR
  • Describe the role and value of Azure Sentinel to provide integrated threat protection

Describe threat protection with Microsoft 365 Defender (formerly Microsoft Threat
Protection)

  • Describe Microsoft 365 Defender services
  • Describe Microsoft Defender for Identity (formerly Azure ATP)
  • Describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
  • Describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
  • Describe Microsoft Cloud App Security

Describe security management capabilities of Microsoft 365

  • Describe the Microsoft 365 Security Center
  • Describe how to use Microsoft Secure Score
  • Describe security reports and dashboards
  • Describe incidents and incident management capabilities

Describe endpoint security with Microsoft Intune

  • Describe what Intune is
  • Describe endpoint security with Intune
  • Describe the endpoint security with the Microsoft Endpoint Manager admin center

 

Describe the Capabilities of Microsoft Compliance Solutions (25-30%)

Describe the compliance management capabilities in Microsoft

  • Describe the compliance center
  • Describe compliance manager
  • Describe use and benefits of compliance score

Describe information protection and governance capabilities of Microsoft 365

  • Describe data classification capabilities
  • Describe the value of content and activity explorer
  • Describe sensitivity labels
  • Describe Retention Polices and Retention Labels
  • Describe Records Management
  • Describe Data Loss Prevention

Describe insider risk capabilities in Microsoft 365

  • Describe Insider risk management solution
  • Describe communication compliance
  • Describe information barriers
  • Describe privileged access management
  • Describe customer lockbox

Describe the eDiscovery capabilities of Microsoft 365

  • Describe the purpose of eDiscovery
  • Describe the capabilities of the content search tool
  • Describe the core eDiscovery workflow
  • Describe the advanced eDisovery workflow

Describe the audit capabilities in Microsoft 365

  • Describe the core audit capabilities of M365
  • Describe purpose and value of Advanced Auditing

Describe resource governance capabilities in Azure

  • Describe the use of Azure Resource locks
  • Describe what Azure Blueprints is
  • Define Azure Policy and Describe its use cases
  • Describe cloud adoption framework

 

Já conhece o nosso Acesso Black?

Tenha acesso a todos os cursos da nossa plataforma por um valor ultra especial.
Saiba mais sobre o ACESSO BLACK clicando AQUI.

 

Já conhece o nosso Podcast?

Gostaram do artigo: Certificação SC-900: Microsoft Security, Compliance, and Identity Fundamentals – Dicas para a prova? Então conheça também o nosso Podcast – Formata meu PC?