When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Microsoft
There are 6 modules in this course
This course helps you practice your exam techniques and refresh your knowledge in all the key areas assessed in the Microsoft-certified Exam SC-900: Microsoft Security Compliance and Identity Fundamentals.
You’ll test your knowledge in a series of practice exams mapped to all the main topics covered in the SC-900 exam, ensuring you’re well prepared for certification success. You’ll prepare by taking practice tests with similar formats and content.
You’ll also get tips and tricks, testing strategies, and useful resources on how to sign up for the Microsoft SC-900 proctored exam.
This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification. Earning a Microsoft Certification is globally recognized evidence of real-world skills.
After completing this course, you’ll be able to:
• Describe the concepts of security, compliance, and identity
• Describe the capabilities of Microsoft Azure Active Directory, part of Microsoft Entra
• Describe the capabilities of Microsoft Security solutions
• Describe the capabilities of Microsoft compliance solutions
This module builds a foundational understanding of core security, compliance, and identity concepts within Microsoft environments. You will explore principles such as Zero Trust, encryption, and business continuity, while developing clarity on identity, authentication, authorization, and access management, aligned with real-world security scenarios.
What's included
15 videos22 readings3 assignments
Show info about module content
15 videos•Total 80 minutes
Course introduction: Microsoft SC-900 exam preparation and practice•6 minutes
Introduction to preparing for the exam•4 minutes
Overview of security compliance•5 minutes
Business continuity management•5 minutes
Zero Trust model in depth•6 minutes
Public/Private Key and hashing•6 minutes
Hashing techniques•5 minutes
Encryption techniques•4 minutes
Identity as the primary security perimeter•6 minutes
Centralized access management•6 minutes
ID and Active Directory•6 minutes
Identity management and single sign-on (SSO)•5 minutes
Group Policies and Identity Management•5 minutes
Identity scope•5 minutes
Module summary: Concepts of security, compliance and identity•6 minutes
22 readings•Total 200 minutes
Course syllabus•10 minutes
How to locate your downloaded files•10 minutes
Additional resources: Concepts of security, compliance, and identity•5 minutes
How to prepare for the proctored examination•10 minutes
Topics covered in the Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals•10 minutes
How the exam is administered•10 minutes
Testing strategy•10 minutes
Additional resources: Microsoft certification•5 minutes
Compliance concepts•10 minutes
Shared responsibility model•10 minutes
Zero Trust model•10 minutes
Symmetric and asymmetric encryption•10 minutes
Encryption and hashing•10 minutes
Additional resources: Security and compliance concepts•5 minutes
Authentication•10 minutes
Authorization•10 minutes
The benefits of centralized authentication and authorization•10 minutes
Identity providers•10 minutes
Federation•10 minutes
Activity: Azure Identity•10 minutes
Hybrid identity•10 minutes
Additional resources: Identity concepts•5 minutes
3 assignments•Total 43 minutes
Knowledge check: Security and compliance concepts•15 minutes
Knowledge Check: Identity concepts•18 minutes
Study checkpoint: Concepts of security, compliance and identity•10 minutes
The capabilities of Microsoft Azure Active Directory
Module 2•3 hours to complete
Module details
This module focuses on Azure Active Directory (Azure AD) and its role in identity and access management. You will explore authentication methods, multi-factor authentication, access control mechanisms, and identity governance features, enabling you to understand how secure identity systems are implemented in Microsoft environments.
What's included
9 videos11 readings4 assignments
Show info about module content
9 videos•Total 49 minutes
Authentication methods in Azure AD•6 minutes
Azure security•5 minutes
MFA recovery•5 minutes
Conditional Access•6 minutes
Azure AD roles•5 minutes
Azure access policy and management•5 minutes
Identity governance in Azure AD•6 minutes
Azure AD Identity Protection•6 minutes
Module summary: The capabilities of Microsoft Azure Active Directory•6 minutes
11 readings•Total 95 minutes
Multi-factor authentication•10 minutes
Self-service password reset•10 minutes
Password protection and management capabilities in Azure AD•10 minutes
Additional resources: Authentication capabilities of Azure AD•5 minutes
Azure AD role-based access control•10 minutes
Activity: Create a Conditional Policy•10 minutes
Additional resources: Access management capabilities of Azure AD•5 minutes
Entitlement management and access reviews•10 minutes
Azure AD Privileged Identity Management (PIM)•10 minutes
Best practices for identity governance•10 minutes
Additional resources: Identity protection and governance capabilities of Azure AD•5 minutes
4 assignments•Total 55 minutes
Knowledge check: Authentication capabilities of Azure AD•15 minutes
Knowledge check: Access management capabilities of Azure AD•15 minutes
Knowledge Check: Identity protection and governance capabilities of Azure AD•15 minutes
Study checkpoint: The capabilities of Microsoft Azure Active Directory•10 minutes
Microsoft Security solutions
Module 3•5 hours to complete
Module details
This module develops your understanding of Microsoft security tools across Azure and Microsoft 365. You will examine network security, threat protection, cloud security posture management, and SIEM/SOAR capabilities, enabling you to evaluate and apply security controls in cloud environments.
Knowledge check: Security capabilities of Microsoft Sentinel•15 minutes
Knowledge check: Threat protection with Microsoft 365 Defender•15 minutes
Study checkpoint: Microsoft Security solutions•10 minutes
The capabilities of Microsoft compliance solutions
Module 4•3 hours to complete
Module details
This module explores Microsoft compliance solutions, focusing on privacy principles, compliance management, and data protection. You will learn how Microsoft Purview supports compliance through data classification, lifecycle management, and governance aligned with regulatory requirements.
What's included
10 videos10 readings4 assignments
Show info about module content
10 videos•Total 59 minutes
Capabilities of Service Trust portal•7 minutes
Trust and privacy•6 minutes
Microsoft Purview Compliance Portal•6 minutes
Compliance Manager•5 minutes
Purview and compliance•7 minutes
Data classification capabilities•5 minutes
Benefits of content explorer and activity explorer•5 minutes
Purview policies, data and labels•5 minutes
Purview Data Lifecycle•5 minutes
Module summary: Capabilities of Microsoft compliance solutions•7 minutes
10 readings•Total 85 minutes
Microsoft’s privacy principles•10 minutes
Customer privacy•10 minutes
Additional resources: Microsoft’s Service Trust Portal and privacy principles•5 minutes
Microsoft Purview•10 minutes
Benefits of compliance score•10 minutes
Additional resources: Compliance management capabilities of Microsoft Purview•5 minutes
Sensitivity labels•10 minutes
Records management•10 minutes
Retention polices and retention labels•10 minutes
Additional resources: Information protection and data lifecycle management capabilities of Microsoft Purview•5 minutes
4 assignments•Total 55 minutes
Knowledge check: Microsoft’s Service Trust Portal and privacy principles•15 minutes
Knowledge check: Compliance management capabilities of Microsoft Purview•15 minutes
Knowledge check: Information protection and data lifecycle management capabilities of Microsoft Purview•15 minutes
Study checkpoint: Capabilities of Microsoft compliance solutions•10 minutes
Risk and resource governance
Module 5•2 hours to complete
Module details
This module focuses on managing organizational risk and governance using Microsoft tools. You will explore insider risk management, communication compliance, and Azure governance features such as policies and blueprints to enforce secure and compliant environments.
What's included
7 videos6 readings3 assignments
Show info about module content
7 videos•Total 41 minutes
Insider risk management•7 minutes
Information barriers•6 minutes
Information management•6 minutes
Azure Policy•5 minutes
Azure Blueprints•5 minutes
Resources and compliance•5 minutes
Module summary: Risk and resource governance•6 minutes
6 readings•Total 50 minutes
Communication compliance•10 minutes
Information management and compliance•10 minutes
Activity: Threat response•10 minutes
Additional resources: Insider risk capabilities in Microsoft Purview•5 minutes
Microsoft Purview unified data governance solution•10 minutes
Additional resources: Resource governance capabilities in Azure•5 minutes
3 assignments•Total 40 minutes
Knowledge check: Insider risk capabilities in Microsoft Purview•15 minutes
Knowledge check: Resource governance capabilities in Azure•15 minutes
Study checkpoint: Risk and resource governance•10 minutes
Practice Exam
Module 6•7 hours to complete
Module details
This module prepares you for the SC-900 certification through practice exams and exam strategies. You will also explore role-based applications of generative AI in cybersecurity tasks such as log analysis and threat detection, while evaluating its effectiveness, followed by course reflection and next steps.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
If you want to switch or start a career in the field of cybersecurity.
If you are interested in the field of cybersecurity, just beginning to work with cybersecurity solutions and services, or new to Microsoft Azure.
What background knowledge is necessary?
You don’t need any background knowledge to take this Professional Certificate. Whether you’re just starting out or a professional in a relevant field, this program can be the right fit for you.
What is the main benefit of a Professional Certificate?
Whether you’re looking to start a new career or change your current one, Professional Certificates help you become job ready. Apply your new skills on hands-on projects that showcase your expertise to potential employers and earn a career credential to kickstart your new career.
How long does it take to complete the Professional Certificate?
It typically takes 6 months to complete the 9 courses. But some learners may go through the content faster.
What will I be able to do upon completing the Professional Certificate?
When you complete, you’ll have an understanding of the fundamental concepts of cybersecurity and how they apply to an enterprise environment including:
The ability to evaluate cybersecurity risks and implement threat mitigation strategies.
The skills to design a secure network model and a suitable incident response plan for an enterprise.
Insight into how to use Microsoft cybersecurity software products, and the measures that can be implemented to protect an enterprise from cyber threats.
What does a cybersecurity analyst do?
Cybersecurity analysts defend an organization’s hardware, software, and networks from cyberattacks, theft, loss, and unauthorized access. As part of a team, you monitor systems, evaluate threats, and develop and implement strategies to mitigate the risk of cyberattacks.
What jobs can I get with cybersecurity skills?
Build job-ready skills for an in-demand career in the field of cybersecurity. The cybersecurity skills you learn in this program prepare you for an entry-level role as a cybersecurity analyst. This program also prepares you for entry-level roles in information security, security compliance, and identity and access management sectors.
Will I be able to complete this course online?
This course is completely online. You can access your lessons, readings, and assignments anytime and anywhere via the web or your mobile device.
Do I need to take the courses in specific order?
We highly recommend taking the courses of each certificate program in the order they are presented. The content in the courses builds on information from earlier courses. The final course contains a practice exam that assesses your knowledge of the content covered in the previous courses. As such, it makes the most sense to take the courses in the order they are presented.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.