SC-900 Exam Layout Security methodologies Zero Trust Model Zero Trust Principles Zero Trust Pillars Zero Trust Assessment Tool Follow Along Zero Trust Assessment Tool Shared Responsibility Model Defense In Depth CIA Triad Security Concepts Common Threats Vulnerabilities Encryption Cyphers Cryptographic Keys Hashing and Salting Digital Signatures In Transit vs At Rest MFA SIEM SOAR XDR EDR CASB Security Posture CSPM JIT & JEP Ingress vs Egress Shadow It AIR Threat Modeling STRIDE Follow Along Microsoft Threat Modeling IDS IPS MITRE Attack Framework Follow Along Mitre Attack Framework Privacy Microsoft Privacy Principles Microsoft Privacy Identity Primary Security Perimeter Identity Providers Azure Active Directory Introduction to Azure AD Active Directory Vs Azure AD App Registrations External Identities Service Principle Managed Identity Device Management MDM & MAM Windows Hello Azure AD Connect SSPR Password Protection Identity Management Best Practices Emergency Access Accounts Azure Active Directory Authentication Authentication Methods Microsoft Authenticator Follow Along Microsoft Authentication Biometrics FIDO and Security Keys Open Authentication Passwordless Authentication Azure Active Management Conditional Access Azure AD Roles RBAC Azure Active Directory Protection Governance Identity Governance HCM Identity Lifecycle Access Lifecycle Privilege Access Lifecycle Entitlement Management PIM Identity Protection Detection and Remediation Investigation Azure Network Security Group (NSG) NSG rules Default Security Rules Security Rules Logic NSG Combinations NSG Cheatsheet Azure Firewall Azure Firewall Azure DDOS Protection Azure DDos Protection Azure Bastion Azure Bastion Azure Web Application Firewall Azure Web Application Firewall Encryption Encryption Overview Azure Disk Encryption TDE (Transparent Data Encryption) Key Vault Azure Security Center Azure Security Benchmark Azure Security Center Azure Security Benchmark Detailed Azure Defender Azure Defender Azure Sentinel Azure Sentinel Data Sources Workbooks Sentinel Features Sentinel Pricing M365 Defender M356 M365 Defender Secure Score Defender For Endpoint Security Reports Defender For identity Defender For Office 365 MCAS Microsoft Endpoint Manager Microsoft Endpoint Manager Compliance Regulatory Compliance M365 Compliance Center Azure Trust Center Compliance Manager Follow Along Compliance Manager Compliance Programs Protection and Governance MIP (Microsoft Information Protection) Know Protect Prevent GIP (Global Information Protection) Sensitive Information Types Trainable Classifiers Content Explorer Activity Explorer Sensitivity Labels Label Policies Retention Labels and Policies Records Management DLP (Data Loss Prevention) Risk Capabilities Insider Risk Management Communication Compliance Information Barriers Privilege Access Management Customer Lockbox eDiscovery Core eDiscovery Workflow Content Search and Holds Advanced eDiscovery Workflow M365 Audit (Microsoft 365 Audit) Azure Security Concepts Resource Locks Resource Tags Azure Blueprints Azure Policy Cloud Adoption Framework Well Architected Framework Microsoft Security Best Practices Follow Along Microsoft Security Best Practices SAS (Shared Access Signatures) CORS (Cross-Origin Resource Sharing) SDL (Security Development Lifecycle)