
{"id":8141,"date":"2022-09-03T12:25:41","date_gmt":"2022-09-03T12:25:41","guid":{"rendered":"https:\/\/www.cloudthat.com\/dev-training\/?post_type=stm-courses&#038;p=8141"},"modified":"2025-10-28T08:31:43","modified_gmt":"2025-10-28T08:31:43","slug":"exam-sc-900-microsoft-security-compliance-and-identity-fundamentals-jump-to-other-course-page","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/microsoft-security\/exam-sc-900-microsoft-security-compliance-and-identity-fundamentals","title":{"rendered":"SC-900: Microsoft Security, Compliance, and Identity Fundamentals"},"content":{"rendered":"<p>This Microsoft Security, Compliance, and Identity Fundamentals certification course from CloudThat teach candidates the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. By taking this course, candidates will acquire foundational knowledge on security, compliance, identity concepts, and related cloud-based Microsoft solutions.<\/p>\n<p>For candidates interested in expanding their technical skills with role-based certifications focused on security operations, identity and access management, and information protection, this Microsoft SC-900 certification is the ideal course to explore career opportunities in the field of cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Microsoft Security, Compliance, and Identity Fundamentals certification course from CloudThat teach candidates the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. By taking this course, candidates will acquire foundational knowledge on security, compliance, identity concepts, and related cloud-based Microsoft solutions. For candidates interested in expanding their technical skills with [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":12638,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[64],"metadata":{"permalink_customizer_regenerate_status":["1"],"stm_lms_product_id":["13479"],"_edit_last":["5091"],"_thumbnail_id":["12638"],"_wp_page_template":["default"],"apss_content_flag":["0"],"lsq_tracking":["a:2:{s:8:\"tracking\";s:0:\"\";s:5:\"score\";s:0:\"\";}"],"_wpb_vc_js_status":["true"],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"scorm_package":[""],"curriculum":[""],"shareware":[""],"featured":[""],"views":["5998"],"level":["beginner"],"current_students":["4"],"duration_info":["1 Day"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["14900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":["[{\"question\":\"What is the total duration of training? \",\"answer\":\"The total duration of training will be 8 hours if it is a full day training and 4 hours each if it is half day training and it can also be customized as per the requirement. \\n\\n \"},{\"question\":\"Will the training be delivered offline or online? \",\"answer\":\"We have batches for both offline and online. \"},{\"question\":\"Would the trainer be thorough with the content? \",\"answer\":\"Training will be delivered by trainers officially certified with Microsoft Certified Trainer(MCT). \"},{\"question\":\"Will this be training theory or practical? \",\"answer\":\"Trainer will be explaining theory alongwith demonstration as well as hands on lab environment will also be provided to the individuals for practice. \\n\\n \"},{\"question\":\"What is the validity of SC-900 certification? \",\"answer\":\"Being a fundamental certification, SC-900 is valid for lifetime. \\n\\n \"},{\"question\":\"Would the training be recorded? \",\"answer\":\"Kindly reach out to us at sales@cloudthat.com. \"}]"],"course_files_pack":[""],"course_certificate":[""],"type":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_video_poster":[""],"lesson_video_url":[""],"lesson_video":[""],"lesson_files_pack":[""],"stream_start_date":[""],"stream_start_time":[""],"stream_end_date":[""],"stream_end_time":[""],"timezone":[""],"stm_password":[""],"join_before_host":[""],"option_host_video":[""],"option_participants_video":[""],"option_mute_participants":[""],"option_enforce_login":[""],"questions":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"try_num":[""],"start_time":[""],"editor_comment":[""],"assignment_id":[""],"student_id":[""],"course_id":[""],"_elementor_template_type":["wp-post"],"_elementor_version":["3.0.16"],"_price":["14999"],"_product_id":["1450"],"product_id":["1450"],"_duration":["field_5fa0f3f0c86eb"],"day_1":["19700101"],"_day_1":["field_5fce082f42f1e"],"time":[""],"_time":["field_5fce084742f1f"],"day_2":[""],"_day_2":["field_5fce085142f20"],"time_2":[""],"_time_2":["field_5fce089942f21"],"day_3":[""],"_day_3":["field_5fce08df42f22"],"time_3":[""],"_time_3":["field_5fce08f842f23"],"_elementor_data":["[{\"id\":\"47bcddf0\",\"elType\":\"section\",\"settings\":[],\"elements\":[{\"id\":\"7e73ef55\",\"elType\":\"column\",\"settings\":{\"_column_size\":100},\"elements\":[{\"id\":\"756db82b\",\"elType\":\"widget\",\"settings\":{\"editor\":\"<p>This three-day course is intended primarily for IT Professionals who already have significant experience with managing an on-premises Windows Server environment. Its purpose is to cover advanced topics related to Windows Server software-defined datacenter, Azure Stack HCI, and other Azure Stack products.<\\\/p><p>The course also describes the use of existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. This course is advanced and is designed for people that want to run their virtual workloads on Windows Server 2019 at medium-to-large scale using software-defined datacenter and hyper-converged principles.<\\\/p><div id=\\\"heading0\\\" class=\\\"panel-heading\\\" role=\\\"tab\\\"><h4 class=\\\"panel-title\\\">Who Should Attend this Course?<\\\/h4><\\\/div><div id=\\\"collapse0\\\" class=\\\"panel-collapse collapse in\\\" role=\\\"tabpanel\\\" aria-labelledby=\\\"heading0\\\" aria-expanded=\\\"true\\\"><div class=\\\"panel-body\\\">Candidates with both technical and non-technical backgrounds<\\\/div><\\\/div>\"},\"elements\":[],\"widgetType\":\"text-editor\"}],\"isInner\":false}],\"isInner\":false}]"],"quiz_style":[""],"stm_waiting_room":[""],"assignment_tries":[""],"assignment_files":[""],"_elementor_controls_usage":["a:3:{s:11:\"text-editor\";a:3:{s:5:\"count\";i:1;s:15:\"control_percent\";i:0;s:8:\"controls\";a:1:{s:7:\"content\";a:1:{s:14:\"section_editor\";a:1:{s:6:\"editor\";i:1;}}}}s:6:\"column\";a:3:{s:5:\"count\";i:1;s:15:\"control_percent\";i:0;s:8:\"controls\";a:0:{}}s:7:\"section\";a:3:{s:5:\"count\";i:1;s:15:\"control_percent\";i:0;s:8:\"controls\";a:0:{}}}"],"course_mark_average":["5"],"course_marks":["a:1:{i:36;s:1:\"5\";}"],"after_completing_course":["4"],"_after_completing_course":["field_6103aae828228"],"key_features":["6"],"_key_features":["field_6103aaff28229"],"who_should_attend":["1"],"_who_should_attend":["field_6103ab0d2822a"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":["15282"],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"banner_description":["This Microsoft SC-900 certification training equips the aspirants to rigorously prepare for SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam and earn certification."],"_banner_description":["field_612c733ed3564"],"after_completing_course_0_desciption":["Describe basic concepts of security, compliance, and identity."],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Describe the concepts and capabilities of Microsoft identity and access management solutions."],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Describe the capabilities of Microsoft security solutions."],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Describe the compliance management capabilities in Microsoft."],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"key_features_0_lists":["Our Microsoft SC-900 training modules have 50% -60% hands-on lab sessions to encourage Thinking-Based Learning (TBL)."],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["Interactive-rich virtual and face-to-face classroom teaching to inculcate Problem-Based Learning (PBL)."],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["Microsoft certified instructor-led training and mentoring sessions to develop Competency-Based Learning (CBL) along with the <a class=\"a_color\" href=\" https:\/\/www.cloudthat.com\/resources\/blog\/study-guide-for-sc-900-microsoft-security-compliance-and-fundamentals-certification-exam\">Study-Guides<\/a>."],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["Well-structured use-cases to simulate challenges encountered in a Real-World environment."],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["Integrated teaching assistance and support through experts designed Learning Management System (LMS) and ExamReady platform."],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["Being a Microsoft Learning Partner provides us with the edge over competition."],"_key_features_5_lists":["field_6103ad559f5b3"],"who_should_attend_0_attend_lists":["This Microsoft Security and Compliance certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The audience of this course may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions."],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"prerequisites_text":["<p>The Prerequisites of SC-900 Exam include<\/p>\r\n<ul>\r\n<li>General understanding of networking and cloud computing concepts.<\/li>\r\n<li>General IT knowledge or any general experience working in an IT environment.<\/li>\r\n<li>General understanding of Microsoft Azure and Microsoft 365.<\/li>\r\n<\/ul>"],"_prerequisites_text":["field_612c7498c4b84"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["<ul>\r\n<li>By earning SC-900 certification, you can be competent Microsoft Certified Security Analyst.<\/li>\r\n<li>Demonstrate skills to secure information technology systems for the organization.<\/li>\r\n<li>On successful completion of SC-900 Azure training, aspirants receive a Course Completion Certificate from us.<\/li>\r\n<li>By successfully clearing the SC-900 exam, aspirants earn Microsoft Certification.<\/li>\r\n<\/ul>\r\n"],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":[""],"_certification_0_image":["field_6103ab5b2822e"],"course_section_0_module_title":["Describe the concepts of security, compliance, and identity (10\u201315%)"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":["Describe security and compliance concepts"],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Describe the shared responsibility model"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Describe defense-in-depth"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Describe the Zero Trust model"],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["5"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["2"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["Describe the capabilities of Microsoft Entra (25\u201330%)"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":["Describe function and identity types of Microsoft Entra ID"],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Describe Microsoft Entra ID"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Describe types of identities"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Describe hybrid identity"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["3"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["4"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Describe the capabilities of Microsoft security solutions (35\u201340%)"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":["Describe core infrastructure security services in Azure"],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Describe Azure distributed denial-of-service (DDoS) Protection"],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Describe Azure Firewall"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Describe Web Application Firewall (WAF)"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Describe network segmentation with Azure virtual networks"],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_4_lession_title":["Describe network security groups (NSGs)"],"_course_section_2_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_5_lession_title":["Describe Azure Bastion"],"_course_section_2_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_6_lession_title":["Describe Azure Key Vault"],"_course_section_2_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["7"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["4"],"_course_section_2_section":["field_612f51e6b0277"],"course_section":["4"],"_course_section":["field_612f4f27b0276"],"custom_permalink":["microsoft-security\/exam-sc-900-microsoft-security-compliance-and-identity-fundamentals-jump-to-other-course-page\/"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"popular_sort":["8"],"_popular_sort":["field_6172496402af3"],"related_courses":["a:4:{i:0;s:4:\"8829\";i:1;s:4:\"8141\";i:2;s:4:\"8831\";i:3;s:4:\"8142\";}"],"_related_courses":["field_61c453ca6b2dd"],"banner_image":[""],"_banner_image":["field_621873548f922"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["2314"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":[""],"_average_review_count":["field_62b00367d2de6"],"_yoast_wpseo_title":["Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals \u2013 CloudThat Training"],"_yoast_wpseo_metadesc":["Become an expert in Microsoft's cloud services with the SC-900 certification. Enhance your credibility in the IT industry & stay up-to-date with the latest technology trends."],"_edit_lock":["1761640185:5091"],"_yoast_wpseo_wordproof_timestamp":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"question_view_type":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"_wp_old_date":["2021-09-03"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Advantages of SC-900 "],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list":["4"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["2"],"_course_features":["field_644a0fa10e67d"],"overview_section_heading":["SC-900 certification training-Course Overview"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing SC-900 certification training, students will be able to:"],"_after_completing_course_heading":["field_645c78ade3f50"],"key_features_heading":["Key Features of SC-900 certification training"],"_key_features_heading":["field_645388ceffdd1"],"who_should_attend_heading":["Who can participate in the SC-900 Certification Training?"],"_who_should_attend_heading":["field_645388faffdd2"],"prerequisites_heading":[""],"_prerequisites_heading":["field_64538a51ffdd3"],"certification_heading":[""],"_certification_heading":["field_64538bffffdd5"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_outline_heading":[""],"_course_outline_heading":["field_64538a8effdd4"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"wpdocs-meta-bdt":["14900"],"wpdocs-meta-gbp":["349"],"wpdocs-meta-usd":["399"],"course_features_0_features_list_0_list":["You will be getting foundational knowledge on security services present in Azure and M365 "],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"course_features_0_features_list_1_list":["It will be acting as a starting point for any individual looking for career change in cloud security.  "],"_course_features_0_features_list_1_list":["field_644a0fc80e680"],"course_features_0_features_list_2_list":["Most of the Microsoft security services explained in brief. "],"_course_features_0_features_list_2_list":["field_644a0fc80e680"],"course_features_0_features_list_3_list":["Simple and clear understanding of all the concepts right from scratch"],"_course_features_0_features_list_3_list":["field_644a0fc80e680"],"course_features_1_heading":["Learning Objectives of SC-900 "],"_course_features_1_heading":["field_644a0fae0e67e"],"course_features_1_features_list_0_list":["Configure the environment to learn on the basics of security, compliance and identity. "],"_course_features_1_features_list_0_list":["field_644a0fc80e680"],"course_features_1_features_list_1_list":["Explore ways for authentication and authorization with central Identity and Access Management Solution (IAM) i.e. Azure Active Directory "],"_course_features_1_features_list_1_list":["field_644a0fc80e680"],"course_features_1_features_list_2_list":["Reduce the burden on IT team for handling requests on Password Reset of multiple users. "],"_course_features_1_features_list_2_list":["field_644a0fc80e680"],"course_features_1_features_list_3_list":["Evaluate access of users by defining multiple conditions with Conditional Access policy and utilize the MFA feature for second form of authentication. "],"_course_features_1_features_list_3_list":["field_644a0fc80e680"],"course_features_1_features_list_4_list":["Enable users to access permissions required to do their specific tasks and provide Just in Time (JIT) access with the help of Privileged Identity Management. "],"_course_features_1_features_list_4_list":["field_644a0fc80e680"],"course_features_1_features_list_5_list":["Learn about Microsoft Defender for Cloud, Microsoft Sentinel, Defender for Cloud Apps, M365 Defender Portal "],"_course_features_1_features_list_5_list":["field_644a0fc80e680"],"course_features_1_features_list_6_list":["Explore on Service Trust Portal, Microsoft Purview Compliance Portal, Compliance Manager "],"_course_features_1_features_list_6_list":["field_644a0fc80e680"],"course_features_1_features_list_7_list":["Restrict sharing of critical data by applying sensitive labels with Microsoft Purview Compliance Portal "],"_course_features_1_features_list_7_list":["field_644a0fc80e680"],"course_features_1_features_list_8_list":["Investigate and detect risks associated with internal environment using eDiscovery "],"_course_features_1_features_list_8_list":["field_644a0fc80e680"],"course_features_1_features_list_9_list":["Achieve Compliance with Azure Policy "],"_course_features_1_features_list_9_list":["field_644a0fc80e680"],"course_features_1_features_list":["10"],"_course_features_1_features_list":["field_644a0fb70e67f"],"course_features_1_background_color":[""],"_course_features_1_background_color":["field_644a0fde0e681"],"permalink_customizer":["microsoft-security\/exam-sc-900-microsoft-security-compliance-and-identity-fundamentals"],"_yoast_wpseo_canonical":["https:\/\/stage.cloudthat.com\/training\/microsoft-security\/exam-sc-900-microsoft-security-compliance-and-identity-fundamentals"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"course_section_0_section_0_lesson_list_3_lession_title":["Describe encryption and hashing"],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_4_lession_title":["Describe Governance, Risk, and Compliance (GRC) concepts"],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_title":["Define identity concepts"],"_course_section_0_section_1_title":["field_612f5233b0278"],"course_section_0_section_1_lesson_list_0_lession_title":["Define identity as the primary security perimeter"],"_course_section_0_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_1_lession_title":["Define authentication"],"_course_section_0_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_2_lession_title":["Define authorization"],"_course_section_0_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_3_lession_title":["Describe identity providers"],"_course_section_0_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_4_lession_title":["Describe the concept of directory services and Active Directory"],"_course_section_0_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list":["6"],"_course_section_0_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section_1_title":["Describe authentication capabilities of Microsoft Entra ID"],"_course_section_1_section_1_title":["field_612f5233b0278"],"course_section_1_section_1_lesson_list_0_lession_title":["Describe the authentication methods"],"_course_section_1_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_1_lession_title":["Describe multi-factor authentication (MFA)"],"_course_section_1_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_2_lession_title":["Describe password protection and management capabilities"],"_course_section_1_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list":["3"],"_course_section_1_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section_2_title":["Describe access management capabilities of Microsoft Entra ID"],"_course_section_1_section_2_title":["field_612f5233b0278"],"course_section_1_section_2_lesson_list_0_lession_title":["Describe Conditional Access"],"_course_section_1_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list_1_lession_title":["Describe Microsoft Entra roles and role-based access control (RBAC)"],"_course_section_1_section_2_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list":["2"],"_course_section_1_section_2_lesson_list":["field_612f530a0ac40"],"course_section_1_section_3_title":["Describe identity protection and governance capabilities of Microsoft Entra"],"_course_section_1_section_3_title":["field_612f5233b0278"],"course_section_1_section_3_lesson_list_0_lession_title":["Describe Microsoft Entra ID Governance"],"_course_section_1_section_3_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_1_lession_title":["Describe access reviews"],"_course_section_1_section_3_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_2_lession_title":["Describe the capabilities of Microsoft Entra Privileged Identity Management"],"_course_section_1_section_3_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_3_lession_title":["Describe Entra ID ProtectionDescribe Microsoft Entra ID Protection"],"_course_section_1_section_3_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list_4_lession_title":["Describe Microsoft Entra Permissions Management"],"_course_section_1_section_3_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_3_lesson_list":["5"],"_course_section_1_section_3_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Describe security management capabilities of Azure"],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Describe Microsoft Defender for Cloud"],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_1_lession_title":["Describe Cloud Security Posture Management (CSPM)"],"_course_section_2_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_2_lession_title":["Describe how security policies and initiatives improve the cloud security posture"],"_course_section_2_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_3_lession_title":["Describe enhanced security features provided by cloud workload protection"],"_course_section_2_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["4"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section_2_title":["Describe capabilities of Microsoft Sentinel"],"_course_section_2_section_2_title":["field_612f5233b0278"],"course_section_2_section_2_lesson_list_0_lession_title":["Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)"],"_course_section_2_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list_1_lession_title":["Describe threat detection and mitigation capabilities in Microsoft Sentinel"],"_course_section_2_section_2_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list":["2"],"_course_section_2_section_2_lesson_list":["field_612f530a0ac40"],"course_section_2_section_3_title":["Describe threat protection with Microsoft Defender XDR"],"_course_section_2_section_3_title":["field_612f5233b0278"],"course_section_2_section_3_lesson_list_0_lession_title":["Describe Microsoft Defender XDR services"],"_course_section_2_section_3_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_1_lession_title":["Describe Microsoft Defender for Office 365"],"_course_section_2_section_3_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_2_lession_title":["Describe Microsoft Defender for Endpoint"],"_course_section_2_section_3_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_3_lession_title":["Describe Microsoft Defender for Cloud Apps"],"_course_section_2_section_3_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_4_lession_title":["Describe Microsoft Defender for Identity"],"_course_section_2_section_3_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_5_lession_title":["Describe Microsoft Defender Vulnerability Management"],"_course_section_2_section_3_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_6_lession_title":["Describe Microsoft Defender Threat Intelligence (Defender TI)"],"_course_section_2_section_3_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list_7_lession_title":["Describe the Microsoft Defender portal"],"_course_section_2_section_3_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_2_section_3_lesson_list":["8"],"_course_section_2_section_3_lesson_list":["field_612f530a0ac40"],"course_section_3_module_title":["Describe the capabilities of Microsoft compliance solutions (20\u201325%)"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":["Describe Microsoft Service Trust Portal and privacy principles"],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Describe the Service Trust Portal offerings"],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Describe the privacy principles of Microsoft"],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Describe Microsoft Priva"],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["3"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section_1_title":["Describe the compliance management capabilities in Microsoft Purview "],"_course_section_3_section_1_title":["field_612f5233b0278"],"course_section_3_section_1_lesson_list_0_lession_title":["Describe the Microsoft Purview compliance portal"],"_course_section_3_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_1_lession_title":[" Describe Compliance Manager"],"_course_section_3_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_2_lession_title":["Describe the use and benefits of compliance score"],"_course_section_3_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list":["3"],"_course_section_3_section_1_lesson_list":["field_612f530a0ac40"],"course_section_3_section_2_title":["Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview"],"_course_section_3_section_2_title":["field_612f5233b0278"],"course_section_3_section_2_lesson_list_0_lession_title":["Describe the data classification capabilities"],"_course_section_3_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_1_lession_title":["Describe the benefits of Content explorer and Activity explorer"],"_course_section_3_section_2_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_2_lession_title":["Describe sensitivity labels and sensitivity label policies"],"_course_section_3_section_2_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_3_lession_title":["Describe data loss prevention (DLP)"],"_course_section_3_section_2_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_4_lession_title":["Describe records management"],"_course_section_3_section_2_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_5_lession_title":["Describe retention policies, retention labels, and retention label policies"],"_course_section_3_section_2_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list_6_lession_title":["Describe unified data governance solutions in Microsoft Purview"],"_course_section_3_section_2_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_3_section_2_lesson_list":["7"],"_course_section_3_section_2_lesson_list":["field_612f530a0ac40"],"course_section_3_section_3_title":["Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview"],"_course_section_3_section_3_title":["field_612f5233b0278"],"course_section_3_section_3_lesson_list_0_lession_title":["Describe insider risk management"],"_course_section_3_section_3_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list_1_lession_title":["Describe eDiscovery solutions in Microsoft Purview"],"_course_section_3_section_3_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list":["3"],"_course_section_3_section_3_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["4"],"_course_section_3_section":["field_612f51e6b0277"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"course_section_0_section_1_lesson_list_5_lession_title":["Describe the concept of federation"],"_course_section_0_section_1_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_3_lesson_list_2_lession_title":["Describe audit solutions in Microsoft Purview"],"_course_section_3_section_3_lesson_list_2_lession_title":["field_612f533b0ac41"],"_regular_price_wmcp":["{\"USD\":\"399\",\"GBP\":\"349\",\"BDT\":\"14900\"}"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":[""],"wpdocs-meta-rand":["2750"],"wpdocs-meta-aed":["1699"],"offline_price":["19370"],"offline-bdt":["19369"],"offline-gbp":["899"],"offline-rand":[""],"offline-aed":["2500"],"offline-usd":["650"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8141"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":1,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8141\/revisions"}],"predecessor-version":[{"id":26014,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/8141\/revisions\/26014"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/12638"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=8141"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=8141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}