Microsoft
Microsoft Security, Compliance, and Identity Fundamentals
Foundational-level preparation for Microsoft security, compliance, and identity (SCI) concepts and the Microsoft Entra, Microsoft security, and Microsoft Purview compliance solution families.
Exam Blueprint
Describe the concepts of security, compliance, and identity
Shared responsibility, defense-in-depth, Zero Trust, encryption and hashing, GRC concepts, identity ...
Describe the capabilities of Microsoft Entra
Microsoft Entra ID, identity types, hybrid identity, authentication methods, MFA, password protectio...
Describe the capabilities of Microsoft security solutions
Azure DDoS Protection, Azure Firewall, WAF, network segmentation, NSGs, Azure Bastion, Azure Key Vau...
Describe the capabilities of Microsoft compliance solutions
Service Trust Portal, Microsoft privacy principles, Microsoft Priva, Microsoft Purview portal, Compl...
Question Bank
51
Recall
128
Application
121
Analysis
What You'll Study
Describe the concepts of security, compliance, and identity
- 1.1Describe the shared responsibility model
- 1.10Describe directory services and Active Directory
- 1.11Describe federation
- 1.12Describe data residency, sovereignty, and jurisdiction
- 1.2Describe defense-in-depth
- 1.3Describe the Zero Trust model
- 1.4Describe encryption and hashing
- 1.5Describe GRC concepts
- 1.6Define identity as the primary security perimeter
- 1.7Define authentication
- 1.8Define authorization
- 1.9Describe identity providers
Describe the capabilities of Microsoft Entra
- 2.1Describe Microsoft Entra ID
- 2.10Describe access reviews
- 2.11Describe Privileged Identity Management
- 2.12Describe Entra ID Protection
- 2.2Describe types of identities
- 2.3Describe hybrid identity
- 2.4Describe authentication methods
- 2.5Describe MFA
- 2.6Describe password protection and management
- 2.7Describe Conditional Access
- 2.8Describe Entra roles and RBAC
- 2.9Describe Entra ID Governance
Describe the capabilities of Microsoft security solutions
- 3.1Azure DDoS Protection
- 3.10Security policies, standards, and recommendations
- 3.11Cloud workload protection
- 3.12SIEM and SOAR concepts
- 3.13Microsoft Sentinel threat detection and response
- 3.14Microsoft Defender XDR services
- 3.15Defender for Office 365
- 3.16Defender for Endpoint
- 3.17Defender for Cloud Apps
- 3.18Defender for Identity
- 3.19Defender Vulnerability Management
- 3.2Azure Firewall
- 3.20Defender Threat Intelligence
- 3.21Microsoft Defender portal
- 3.3Web Application Firewall (WAF)
- 3.4Network segmentation with Azure virtual networks
- 3.5Network security groups (NSGs)
- 3.6Azure Bastion
- 3.7Azure Key Vault
- 3.8Microsoft Defender for Cloud
- 3.9Cloud Security Posture Management (CSPM)
Describe the capabilities of Microsoft compliance solutions
- 4.1Service Trust Portal offerings
- 4.10Data loss prevention (DLP)
- 4.11Records management
- 4.12Retention policies and labels
- 4.13Insider risk management
- 4.14eDiscovery solutions in Microsoft Purview
- 4.15Audit solutions in Microsoft Purview
- 4.2Microsoft privacy principles
- 4.3Microsoft Priva
- 4.4Microsoft Purview portal
- 4.5Compliance Manager
- 4.6Compliance score
- 4.7Data classification capabilities
- 4.8Content explorer and Activity explorer
- 4.9Sensitivity labels and policies
Get study tips and new cert announcements
Ready to start?
Take a free 6-question diagnostic to see where you stand.