Microsoft Security, SC-900T00 Introduction to Microsoft Security, Compliance, and Identity, and Identity Fundamentals Training | SC-900 Exam Prep

Course Overview

Cybersecurity talent gaps continue to grow: over 3.5 million positions remain unfilled worldwide. Organizations urgently need professionals who understand how Microsoft’s security, compliance, and identity (SCI) solutions protect hybrid and cloud environments.

The SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals course provides the foundation you need. In this one-day program, you’ll learn essential SCI concepts and how they apply across Microsoft Azure, Microsoft 365, and related services. Through expert instruction and practical labs, you’ll explore identity and access management, Microsoft Defender, Microsoft Sentinel, and compliance capabilities.

This training aligns directly to the SC-900 certification exam, making it an excellent starting point for a Microsoft security career path. Exam vouchers are available as an add-on.

What Is Included

  • Expert-led training with real-world scenarios
  • Official Microsoft courseware and supplemental materials
  • Certificate of completion
  • Hands-on labs and interactive exercises
  • Access to class recordings for 90 days (where available)
  • Guaranteed-to-run dates (select schedules)
  • Flexible rescheduling options

Course Objectives

By completing this course, you will be able to:

  • Describe basic concepts of security, compliance, and identity (SCI).
  • Explain Microsoft identity and access management solutions.
  • Outline Microsoft security solutions for Azure and Microsoft 365.
  • Define Microsoft compliance management capabilities.
  • Understand the SC-900 certification exam objectives.

Who Should Attend?

The audience for this course is looking to obtain an introduction to security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have:

  • General understanding of networking and cloud computing concepts.
  • General IT knowledge or any general experience working in an IT environment.
  • General understanding of Microsoft Azure and Microsoft 365.

Course Prerequisites

  • General understanding of networking and cloud computing concepts.
  • General IT knowledge or any general experience working in an IT environment.
  • General understanding of Microsoft Azure and Microsoft 365.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
12/8/202512/12/2025
12/29/20251/2/2026
1/19/20261/23/2026
2/9/20262/13/2026
3/2/20263/6/2026
3/23/20263/27/2026
4/13/20264/17/2026
5/4/20265/8/2026
5/25/20265/29/2026
6/15/20266/19/2026
7/6/20267/10/2026
7/27/20267/31/2026
8/17/20268/21/2026
9/7/20269/11/2026
9/28/202610/2/2026
10/19/202610/23/2026
11/9/202611/13/2026
11/30/202612/4/2026
12/21/202612/25/2026
1/11/20271/15/2027

Agenda

Duration
1 Day

1 – Describe security and compliance concepts

  • Describe the shared responsibility model
  • Describe defense in depth
  • Describe the Zero Trust model
  • Describe governance, risk, and compliance (GRC) concepts
  • Module assessment

2 – Describe identity concepts

  • Define authentication and authorization
  • Define identity as the primary security perimeter
  • Describe the role of the identity provider
  • Describe the concept of directory services and Active Directory
  • Describe the concept of federation
  • Module assessment

3 – Describe the function and identity types of Microsoft Entra ID

  • Describe Microsoft Entra ID
  • Describe types of identities
  • Describe hybrid identity
  • Describe external identities
  • Module assessment

4 – Describe the authentication capabilities of Microsoft Entra ID

  • Describe authentication methods
  • Describe multifactor authentication
  • Describe self-service password reset
  • Describe password protection and management capabilities
  • Module assessment

5 – Describe access management capabilities of Microsoft Entra

  • Describe Conditional Access
  • Describe Global Secure Access in Microsoft Entra
  • Describe Microsoft Entra roles and role-based access control (RBAC)
  • Module assessment

6 – Describe the identity protection and governance capabilities of Microsoft Entra

  • Describe Microsoft Entra ID Governance
  • Describe access reviews
  • Describe entitlement management
  • Describe the capabilities of Privileged identity Management
  • Describe Microsoft Entra ID Protection
  • Describe Microsoft Entra Verified ID
  • Describe Microsoft Entra integration with Microsoft Security Copilot
  • Module assessment

7 – Describe Microsoft Security Copilot

  • Get acquainted with Microsoft Security Copilot
  • Describe Microsoft Security Copilot terminology
  • Describe how Microsoft Security Copilot processes prompt requests
  • Describe the elements of an effective prompt
  • Describe how to enable Microsoft Security Copilot
  • Module assessment

8 – Describe core infrastructure security services in Azure

  • Describe Azure DDoS protection
  • Describe Azure Firewall
  • Describe Web Application Firewall
  • Describe network segmentation in Azure
  • Describe Azure Network Security Groups
  • Describe Azure Bastion
  • Describe Azure Key Vault
  • Module assessment

9 – Describe the security management capabilities in Azure

  • Describe Microsoft Defender for Cloud
  • Describe how security policies and initiatives improve cloud security posture
  • Describe Cloud security posture management
  • Describe the enhanced security of Microsoft Defender for Cloud
  • Describe DevOps security management
  • Module assessment

10 – Describe security capabilities of Microsoft Sentinel

  • Describe threat detection and mitigation capabilities in Microsoft Sentinel
  • Describe Microsoft Sentinel integration with Microsoft Security Copilot
  • Module assessment

11 – Describe threat protection with Microsoft Defender XDR

  • Describe Microsoft Defender XDR services
  • Describe Microsoft Defender for Office 365
  • Describe Microsoft Defender for Endpoint
  • Describe Microsoft Defender for Cloud Apps
  • Describe Microsoft Defender for Identity
  • Describe Microsoft Defender Vulnerability Management
  • Describe Microsoft Defender Threat Intelligence
  • Describe the Microsoft Defender portal
  • Describe Copilot integration with Microsoft Defender XDR
  • Module assessment

12 – Describe Microsoft’s Service Trust portal and privacy capabilities

  • Describe the offerings of the Service Trust portal
  • Describe Microsoft’s privacy principles
  • Describe Microsoft Priva
  • Module assessment

13 – Describe the data security solutions of Microsoft Purview

  • Describe the data classification capabilities of Microsoft Purview Information Protection
  • Describe sensitivity labels and policies in Microsoft Purview Information Protection
  • Describe data loss prevention in Microsoft Purview
  • Describe insider risk management in Microsoft Purview
  • Describe adaptive protection in Microsoft Purview
  • Module assessment

14 – Describe the data compliance solutions of Microsoft Purview

  • Describe audit in Microsoft Purview
  • Describe eDiscovery
  • Describe Compliance Manager
  • Describe Communication Compliance
  • Describe Data Lifecycle Management
  • Describe Records Management
  • Module assessment

15 – Describe the data governance solutions of Microsoft Purview

  • Describe the concepts and benefits of data governance
  • Describe Microsoft Purview Data Catalog
  • Module assessment