Coconote
AI notes
AI voice & video notes
Export note
Try for free
SC900 Exam Preparation Guide
Aug 25, 2024
SC900 Study Cram V2 Lecture Notes
Overview
SC900
: Security, Compliance, and Identity Fundamentals Exam
Rapid-fire questions
Focus on understanding and matching solutions to organizational requirements
Requires broad understanding, not deep technical knowledge
Exam Preparation
Best Resource
: SC900 Fundamentals webpage
Free online course
Practice assessments and sandbox environment
Exam policy and scheduling details
Study guide with core skill updates
Key Areas of Focus
Shared Responsibility Model
On-premises
: Customer responsibility
Infrastructure as a Service (IaaS)
:
Customer: Operating system up
Provider: Physical infrastructure
Platform as a Service (PaaS)
:
Customer: Data and identity management
Provider: Operating system and hosts
Software as a Service (SaaS)
:
Customer: Identities, minimal shared responsibility
Provider: Application, network, operating system
Security Concepts
Defense in Depth
Layers of security:
Physical security
Identity as a perimeter
Network and compute security
Application security
Data protection
CIA Triad
Confidentiality
: Protecting data privacy
Integrity
: Maintaining data accuracy
Availability
: Ensuring data accessibility
Zero Trust
Core Principles
:
Verify explicitly
Use least privilege
Assume breach
Encryption
Symmetric
: Same key for encryption and decryption
Asymmetric
: Public and private key pair
Governance, Risk, and Compliance
Governance
: Rules and practices for activities
Risk
: Identifying and responding to threats
Compliance
: Adhering to regulations and standards
Identity Management
Types of Identity
Users, applications, devices, and other resources
Key Pillars
Administration
: Basic management
Authentication
: Proving identity
Authorization
: Access levels
Audit
: Actions taken
Authentication Methods
Password-only
vs.
Multifactor Authentication (MFA)
Passwordless
: Using methods like passkeys
Conditional Access and Role-Based Access Control
Set access conditions based on risk, location, device health
Assign roles with minimum necessary permissions
Microsoft Solutions
Azure Security Solutions
Distributed Denial of Service (DDoS) Protection
Azure Firewall
: Layer 4 and 7 protection
Web Application Firewall (WAF)
: Protects against common exploits
Network Security Groups (NSGs)
: Segment and control traffic
Azure Bastion
: Secure RDP/SSH access
Defender for Cloud
Cloud Security Posture Management
: Assessment and scoring
Cloud Workload Protection
: Specific resource protection
DevSecOps
: Integrating security into DevOps
Sentinel
Security Incident and Event Management (SIEM)
Security Orchestration Automated Response (SOAR)
: Automating reactions
Defender XDR
Cross-platform protection and threat intelligence
Purview
Governance and Compliance
: Managing data security
Data Security
: Classifying and protecting data
Priva
Managing private data and subject rights requests
Exam Strategy
Focus on understanding core concepts and solutions
Use the Microsoft Learn platform extensively
Eliminate obviously wrong answers in the exam
Review weaker sections based on exam results for improvement
Conclusion
Understand the broad capabilities and applications of various Microsoft solutions
Aim for a strong foundational understanding to succeed in the exam
Good luck with your exam preparation!
📄
Full transcript