Uploaded by sefoned878

SC-900 Full Exam Format

advertisement
SC-900 Exam Layout
Security methodologies
Zero Trust Model
Zero Trust Principles
Zero Trust Pillars
Zero Trust Assessment Tool
Follow Along Zero Trust Assessment Tool
Shared Responsibility Model
Defense In Depth
CIA Triad
Security Concepts
Common Threats
Vulnerabilities
Encryption
Cyphers
Cryptographic Keys
Hashing and Salting
Digital Signatures
In Transit vs At Rest
MFA
SIEM
SOAR
XDR
EDR
CASB
Security Posture
CSPM
JIT & JEP
Ingress vs Egress
Shadow It
AIR
Threat Modeling
STRIDE
Follow Along Microsoft Threat Modeling
IDS IPS
MITRE Attack Framework
Follow Along Mitre Attack Framework
Privacy
Microsoft Privacy Principles
Microsoft Privacy
Identity
Primary Security Perimeter
Identity Providers
Azure Active Directory
Introduction to Azure AD
Active Directory Vs Azure AD
App Registrations
External Identities
Service Principle
Managed Identity
Device Management
MDM & MAM
Windows Hello
Azure AD Connect
SSPR
Password Protection
Identity Management Best Practices
Emergency Access Accounts
Azure Active Directory Authentication
Authentication Methods
Microsoft Authenticator
Follow Along Microsoft Authentication
Biometrics
FIDO and Security Keys
Open Authentication
Passwordless Authentication
Azure Active Management
Conditional Access
Azure AD Roles
RBAC
Azure Active Directory Protection Governance
Identity Governance
HCM
Identity Lifecycle
Access Lifecycle
Privilege Access Lifecycle
Entitlement Management
PIM
Identity Protection
Detection and Remediation
Investigation
Azure Network Security Group (NSG)
NSG rules
Default Security Rules
Security Rules Logic
NSG Combinations
NSG Cheatsheet
Azure Firewall
Azure Firewall
Azure DDOS Protection
Azure DDos Protection
Azure Bastion
Azure Bastion
Azure Web Application Firewall
Azure Web Application Firewall
Encryption
Encryption Overview
Azure Disk Encryption
TDE (Transparent Data Encryption)
Key Vault
Azure Security Center
Azure Security Benchmark
Azure Security Center
Azure Security Benchmark Detailed
Azure Defender
Azure Defender
Azure Sentinel
Azure Sentinel
Data Sources
Workbooks
Sentinel Features
Sentinel Pricing
M365 Defender
M356
M365 Defender
Secure Score
Defender For Endpoint
Security Reports
Defender For identity
Defender For Office 365
MCAS
Microsoft Endpoint Manager
Microsoft Endpoint Manager
Compliance
Regulatory Compliance
M365 Compliance Center
Azure Trust Center
Compliance Manager
Follow Along Compliance Manager
Compliance Programs
Protection and Governance
MIP (Microsoft Information Protection)
Know Protect Prevent
GIP (Global Information Protection)
Sensitive Information Types
Trainable Classifiers
Content Explorer
Activity Explorer
Sensitivity Labels
Label Policies
Retention Labels and Policies
Records Management
DLP (Data Loss Prevention)
Risk Capabilities
Insider Risk Management
Communication Compliance
Information Barriers
Privilege Access Management
Customer Lockbox
eDiscovery
Core eDiscovery Workflow
Content Search and Holds
Advanced eDiscovery Workflow
M365 Audit (Microsoft 365 Audit)
Azure Security Concepts
Resource Locks
Resource Tags
Azure Blueprints
Azure Policy
Cloud Adoption Framework
Well Architected Framework
Microsoft Security Best Practices
Follow Along Microsoft Security Best Practices
SAS (Shared Access Signatures) CORS (Cross-Origin Resource Sharing)
SDL (Security Development Lifecycle)
Download