Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Microsoft SC-900 certification exam designed for individuals having an understanding of the concepts of security, compliance, and identity (SCI) across cloud-based and other related Microsoft services.
Target Audience
For Microsoft SC-900 Exam, the audience that may include are:
- Firstly, business stakeholders
- Secondly, new or existing IT professionals
- Lastly, students having an interest in Microsoft security, compliance, and identity solutions.
Microsoft SC-900 Exam: Knowledge Requirement
- For the Microsoft SC-900 Exam, individuals must have familiarity with Microsoft Azure and Microsoft 365.
- Secondly, they must have the ability to understand how Microsoft security, compliance, and identity solutions can range across these solution areas for providing end-to-end solutions.
Microsoft SC-900 Exam Learning Path
Microsoft provides access to its learning path for the SC-900 Exam. This learning path for the SC-900 exam consists of topics covering modules for understanding the concepts in a step-by-step format. However, the major module include:
- Firstly, SC-900 part 1: Explaining the concepts of security, compliance, and identity
- Secondly, SC-900 part 2: Explaining the capabilities of Microsoft Identity and access management solutions
- Thirdly, SC-900 part 3: Describing the capabilities of Microsoft security solutions
- Lastly, SC-900 part 4: Describing the capabilities of Microsoft compliance solutions
SC-900 Interview Questions
Start preparing for your interview with SC-900 Interview Questions
Microsoft SC-900 Exam Details
Microsoft SC-900 Exam consists of 40-60 questions that can be in the format like scenario-based single answer questions, multiple-choice questions, arrange in the correct sequence type questions, drag & drop questions, mark review, drag, and drop, etc. However, talking about the SC-900 passing score, a candidate has to score a minimum of 700 or more. Further, the Microsoft SC-900 Exam cost is $99 USD and can be given in only the English language.
Microsoft Exam Scheduling
Microsoft SC-900 Exam validates the candidate’s ability and understanding of concepts of security, compliance, and identity. Next, it measures the capabilities of Microsoft identity and access management solutions and Microsoft security solutions. However, for scheduling the exam, candidates can log in to the Microsoft exam portal provided on the exam page. And, those who are new, can register to sign in to their accounts.
Microsoft SC-900 Exam Course Outline
Microsoft provides a course outline for the SC-900 exam covering the major sections to help in better preparation. This include:
Describe the Concepts of Security, Compliance, and Identity (10—15%)
Describe security and compliance concepts
- describe the shared responsibility model (Microsoft Documentation: shared responsibility model, Shared responsibility in the cloud)
- define defense in depth (Microsoft Documentation: What is defense in depth?)
- describing the Zero-Trust model (Microsoft Documentation: zero-trust methodology)
- Describe encryption and hashing (Microsoft Documentation: Describe security and compliance concepts)
- Describe Governance, Risk, and Compliance (GRC) concepts
Define identity concepts
- define identity as the primary security perimeter (Microsoft Documentation: Identity as the primary security perimeter)
- defining authentication (Microsoft Documentation: Authentication vs. authorization)
- define authorization (Microsoft Documentation: Authentication vs. authorization)
- describing identity providers (Microsoft Documentation: Identity Providers for External Identities)
- Describe the concept of directory services and Active Directory
- describe the concept of Federation (Microsoft Documentation: federation with Azure AD)
Describe the capabilities of Microsoft Entra (25—30%)
Describe the basic identity services and identity types of Microsoft Entra ID
- describing Microsoft Entra ID
- describe types of identities
- describing hybrid identity (Microsoft Documentation: concept of hybrid identities)
Describe the authentication capabilities of Microsoft Entra ID
- describing the authentication methods (Microsoft Documentation: authentication and verification methods)
- describing Multi-factor Authentication (MFA) (Microsoft Documentation: Azure AD Multi-Factor Authentication, Configure Azure AD Multi-Factor Authentication settings)
- describe password protection and management capabilities (Microsoft Documentation: password protection and management capabilities of Azure AD, Eliminate bad passwords using Azure Active Directory Password Protection, Enforce on-premises Azure AD Password Protection for Active Directory Domain Services)
Describe access management capabilities of Microsoft Entra ID
- describing conditional access (Microsoft Documentation: Define Conditional Access)
- Describe Microsoft Entra roles and role-based access control (RBAC)
Describe the identity protection and governance capabilities of Microsoft Entra
- describe Microsoft Entra ID Governance
- Describe access reviews (Microsoft Documentation: Azure AD entitlement management, Azure AD access reviews)
- Describe the capabilities of Microsoft Entra Privileged Identity Management (PIM) (Microsoft Documentation: capabilities of Privileged identity Management)
- Describe Entra ID Protection
- Describe Microsoft Entra Permissions Management
Describe the capabilities of Microsoft Security Solutions (35—40%)
Describe core infrastructure security services in Azure
- Describe Azure distributed denial-of-service (DDoS) Protection (Microsoft Documentation: Azure DDoS Protection Standard)
- describing Azure Firewall (Microsoft Documentation: Azure Firewall)
- describing Web Application Firewall (WAF) (Microsoft Documentation: Azure Web Application Firewall)
- Describe Network Segmentation with Azure Virtual Networks
- Describe Network Security groups (NSGs) Network security groups)
- describe Azure Bastion (Microsoft Documentation: Azure Bastion)
- Describe Azure Key Vault
Describe security management capabilities of Azure
- Describe Microsoft Defender for Cloud (Microsoft Documentation: Microsoft Defender for Cloud)
- Describe Cloud security posture management (CSPM) (Microsoft Documentation: Manage cloud platform security)
- Describe how security policies and initiatives improve the cloud security posture
- Describe the enhanced security features provided by cloud workload protection
Describe security capabilities of Microsoft Sentinel
- Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR) (Microsoft Documentation: concepts of SIEM, SOAR)
- Describe threat detection and mitigation capabilities in Microsoft Sentinel
Describe threat protection with Microsoft Defender XDR
- describe Microsoft Defender XDR services
- describe Microsoft Defender for Office 365 (Microsoft Documentation: Office 365 Security, Microsoft Defender for Office 365)
- describing Microsoft Defender for Endpoint (Microsoft Documentation: Microsoft Defender for Endpoint)
- Describe Microsoft Defender for Cloud Apps (Microsoft Documentation: Microsoft Defender for Cloud Apps overview)
- describing Microsoft Defender for Identity (Microsoft Documentation: Microsoft Defender for Identity)
- Describe Microsoft Defender Vulnerability Management
- Describe Microsoft Defender Threat Intelligence (Defender TI)
- Describe the Microsoft Defender portal (Microsoft Documentation: Visit the Microsoft 365 Defender portal)
Describe the Capabilities of Microsoft Compliance Solutions (20—25%)
Describe Microsoft’s Service Trust Portal and privacy principles
- Describe the Service Trust Portal offerings (Microsoft Documentation: Get started with Microsoft Service Trust Portal)
- Describe the privacy principles of Microsoft (Microsoft Documentation: Privacy overview)
- Describe Microsoft Priva
Describe the compliance management capabilities of Microsoft Purview
- Describe the Microsoft Purview compliance portal (Microsoft Documentation: Microsoft Purview compliance portal)
- describing compliance manager (Microsoft Documentation: Microsoft Compliance Manager)
- describe use and benefits of compliance score (Microsoft Documentation: Understanding your compliance score)
Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
- describing data classification capabilities (Microsoft Documentation: Know your data – data classification, data classification capabilities in the Microsoft 365 Compliance Center)
- describe the benefits of content explorer and activity explorer (Microsoft Documentation: activity explorer, content explorer)
- describing sensitivity labels and sensitivity label policies (Microsoft Documentation: sensitivity labels)
- describing Data Loss Prevention (DLP) (Microsoft Documentation: Overview of data loss prevention, Data loss prevention)
- describe Records Management (Microsoft Documentation: records management in Microsoft 365)
- Describe retention policies, retention labels, and retention label policies (Microsoft Documentation: retention policies and retention labels)
- Describe unified data governance solutions in Microsoft Purview
Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview
- describe Insider risk management (Microsoft Documentation: insider risk management in Microsoft 365)
- Describe eDiscovery solutions in Microsoft Purview
- Describe audit solutions in Microsoft Purview
For More: Check Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals FAQs
Exam Policies
Microsoft Certification exam policies provide all the exam-related details and information with exam giving procedures. These exam policies have certain rules that need to be followed during the exam time or at testing centers. Some of them include:
Exam retake policy
- The exam retaking policy of Microsoft states that candidates who will not be able to pass the exam for the first time must wait 24 hours before retaking the exam. During this time, they can check the certification dashboard on the Microsoft portal and reschedule the exam. However, if this happens for the second time then, they may have to wait for at least 14 days before retaking the exam. For more check Microsoft Exam Policies.
Exam reschedule and the cancellation policy
- Microsoft temporarily waives the reschedule and cancellation fee if candidates cancel their exams within 24 hours before the scheduled appointment. However, for rescheduling or canceling an appointment there will be no charge will be at least 6 business days prior to your appointment. But, if a candidate cancels or reschedules an exam within 5 business days of your registered exam time then, a fee will be applied.
Microsoft SC-900 Exam Study Guide
Understanding Exam objectives
For Microsoft SC-900 Exam preparation, candidates must have familiarity with the exam objectives. The Microsoft SC-900 Exam objectives cover four important topics that will provide understanding in the major sections. They are:
- Firstly, describing the concepts of security, compliance, and identity
- Secondly, describing the capabilities of Microsoft identity and access management solutions
- Thirdly, explaining the capabilities of Microsoft security solutions
- Lastly, describing the capabilities of Microsoft compliance solutions
Microsoft Learning Platform
Microsoft gives access to learning platforms for the SC-900 exam that covers various resources to get a better exam preparation. Further, for the Microsoft SC-900 Exam preparation, go through the Microsoft official website to get all the necessary information as well as to get an understanding of the concepts through the provided study guide in order to pass the exam.
Microsoft Docs
Microsoft documentation is the power source of knowledge developed for providing detailed information related to all certification exams. Moreover, using Microsoft Documentation for Microsoft SC-900 Exam, you will get to know the different scales of this exam. Further, this contains modules that will help you gain a lot of knowledge about the concepts used in the Microsoft SC-900 Exam.
Online Study Groups
Microsoft SC-900 exam online study groups can help candidates a lot during exam preparation. That is to say, joining the study groups will help them to stay connected with the experts and professionals who are already on this pathway. Moreover, you can start discussing your query or the issue related to the exam in this group and take the Microsoft SC-900 Exam study notes.
Practice Tests
Practice tests are important for having better preparation. By assessing yourself with Microsoft SC-900 practice exam tests, you will know about your weak and strong areas. Moreover, you will be able to improve your answering skills which as a result will save a lot of time during the exam. The smart way to take the Microsoft SC-900 practice tests is after completing a full topic and then try the mock tests. This will also make your revision strong. So, find the best practice exam tests and get yourself prepared for the Microsoft SC-900 Exam.
Start preparing for Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals Now!
Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Online Tutorial
Testprep Training provides Online Tutorials to assist you during the preparation for Microsoft Security, Compliance, and Identity Fundamentals (SC-900). These online tutorials are built to help you acquire the required knowledge of the domain areas and structure the learning path to support your preparation. The online tutorial covers the learning objectives including –
- Firstly, describing the concepts of security, compliance, and identity
- Secondly, describing the capabilities of Microsoft identity and access management solutions
- Thirdly, explaining the capabilities of Microsoft security solutions
- Lastly, describing the capabilities of Microsoft compliance solutions
However, for Microsoft SC-900 certification exam, individuals must have an understanding of the concepts of security, compliance, and identity (SCI) across cloud-based and other related Microsoft services. So, let’s get into the details for achieving the required skills and knowledge.
Describe the Concepts of Security, Compliance, and Identity
Describe security methodologies
Describe security concepts
Describe Microsoft Security and compliance principles
Describe the capabilities of Microsoft Identity and Access Management Solutions
Define identity principles/concepts
- Defining Identity as the primary security perimeter
- Explain the difference: Authentication vs. Authorization
- Explain the difference: Authentication vs. Authorization
- Identity Providers for External Identities
- describe what Active Directory is
- Explain the concept of Federated Services
- define common Identity Attacks
Describe the basic identity services and identity types of Azure AD
- What is Azure Active Directory?
- Explain Azure AD identity types
- Explain the concept of hybrid identities
- Types of external identities
Describe the authentication capabilities of Azure AD
- Different authentication methods of Azure AD
- Self-service password reset (SSPR) in Azure AD
- Password protection and management capabilities of Azure AD
- Azure AD Multi-Factor Authentication
- Overview of Windows Hello for Business
Describe access management capabilities of Azure AD
- What is Conditional Access?
- Conditional access and its benefits
- Azure role-based access control: Overview
Describe the identity protection & governance capabilities of Azure AD
- Overview of Azure AD Identity Governance
- Azure AD entitlement management and access reviews
- Azure AD Privileged Identity Management Capabilities
- What is Identity Protection?
Describe the capabilities of Microsoft Security Solutions
Describe basic security capabilities in Azure
- What is Azure Network Security Groups?
- Overview of Azure DDoS Protection Standard
- What is Azure Firewall?
- Understanding Azure Bastion
- Overview of Azure Web Application Firewall
- Understanding Azure encryption
Describe security management capabilities of Azure
- Explaining Azure Security Center
- Overview of Secure score in Azure Security Center
- Understanding Azure Defender
- describing Cloud security posture management (CSPM)
- Security baselines for Azure
Describe security capabilities of Azure Sentinel
Describe threat protection with Microsoft 365 Defender (formerly Microsoft Threat Protection)
- Overview of Microsoft 365 Defender
- Understanding Microsoft Defender for Identity
- Overview of Microsoft Defender for Office 365
- Overview of Microsoft Defender for Endpoint
- Microsoft Cloud App Security overview
Describe security management capabilities of Microsoft 365
- Exploring the Microsoft 365 security center
- Using Microsoft Secure Score
- Exploring security reports and dashboards
- Incident management and incidents capabilities
Describe endpoint security with Microsoft Intune
- Overview of Microsoft Intune
- Managing endpoint security in Microsoft Intune
- Microsoft Endpoint Manager overview
Describe the Capabilities of Microsoft Compliance Solutions
Describe the compliance management capabilities in Microsoft
- Overview of Microsoft 365 compliance center
- Microsoft Compliance Manager Overview
- Understanding your compliance score
Describe information protection and governance capabilities of Microsoft 365
- Data classification capabilities in Microsoft Compliance Center
- Getting started with activity explorer and content explorer
- Understanding sensitivity labels
- Overview of retention policies and retention labels
- Overview of records management in Microsoft 365
- Understanding Data loss prevention
Describe insider risk capabilities in Microsoft 365
- Insider risk management in Microsoft 365
- Communication compliance in Microsoft 365
- Information barriers in Microsoft 365
- Privileged access management in Microsoft 365
- Defining Customer Lockbox
Describe the eDiscovery capabilities of Microsoft 365
- Understanding eDiscovery solutions in Microsoft 365
- Creating a content search
- Exploring the Core eDiscovery workflow
- Overview of Microsoft 365 Advanced eDiscovery
Describe the audit capabilities in Microsoft 365
Describe resource governance capabilities in Azure
- Use of Azure Resource Manager locks
- Overview of Azure Blueprints
- Azure Policy Overview
- Describing the cloud adoption framework