CyberProtex
  • SERVICES
    • mssp
    • Managed Services >
      • Security Operations Center >
        • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Security and Compliance >
      • NIST 800-171 Assessments
      • CMMC Assessments
      • Incident Response
      • Penetration Testing
      • Vulnerability Assessments
      • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CEH
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • CEH
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • EC|COUNCIL
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Workshop
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact

SC-900 Microsoft Security, Compliance, and Identity Fundamentals ​

Picture
We proudly offer our expert Microsoft training for a wide range of public and private companies, government entities, Armed Forces, educational institutions, and individuals. We provide high-quality training delivered in an exciting, dynamic format both in person and via online tools. 
​
Contact us today for group training and rates. 

SC-900 Microsoft Security, Compliance, and Identity Fundamentals ​

Course Duration: 1-2 days (8–12 hours)
Delivery Format: Instructor-Led | Live Virtual | On-Demand
Certification Exam: Microsoft SC-900
Level: Fundamental / Entry-Level
Prerequisites: None (basic familiarity with IT concepts recommended)
Course Description:
The SC-900 Microsoft Security, Compliance, and Identity Fundamentals course introduces students to the core principles of cybersecurity and identity management within Microsoft cloud services. This foundational course is designed for business stakeholders, new or aspiring IT professionals, and compliance officers who are seeking a broad understanding of Microsoft’s approach to securing digital assets and managing risk through identity, governance, and compliance solutions.
Participants will gain insights into Microsoft’s security, compliance, and identity (SCI) capabilities across Microsoft 365 and Microsoft Azure. This course is tailored to empower learners with knowledge of key concepts such as Zero Trust, Conditional Access, role-based access control (RBAC), encryption, insider risk management, and regulatory compliance within a cloud and hybrid environment.
Whether preparing for the SC-900 certification exam or building baseline knowledge before advancing to more technical certifications like AZ-500 or MS-500, this course serves as the ideal starting point.

Learning Objectives:
By the end of this course, students will be able to:
  • Describe basic concepts of security, compliance, and identity.
  • Explain the concepts of Zero Trust architecture and Microsoft’s security posture.
  • Understand the role of Microsoft Entra ID (formerly Azure AD) in identity and access management.
  • Identify Microsoft’s solutions for threat protection, including Microsoft Defender, Sentinel, and Intune.
  • Understand capabilities of Microsoft Purview for data governance, retention, DLP, and insider risk.
  • Describe compliance solutions such as Compliance Manager, Information Protection, and audit capabilities in Microsoft 365.
  • Differentiate between Microsoft 365 and Azure security solutions and how they work together.

​Target Audience:
This course is intended for:
  • Business and technical decision-makers evaluating Microsoft’s SCI capabilities
  • IT professionals beginning their journey in cybersecurity and identity
  • Security and compliance professionals exploring Microsoft’s governance solutions
  • Students or interns preparing for cybersecurity roles within cloud environments
  • End users in regulated industries (DoD, finance, healthcare) needing to understand compliance fundamentals

NICE Mapping to SC-900 Microsoft Security, Compliance, and Identity Fundamentals ​​

​National Initiative for Cybersecurity Careers and Studies (NICCS) framework. The purpose of this mapping is to align each course with the appropriate Framework Categories, Work Roles, Competency Areas, and associated knowledge, skills, and abilities (KSAs) as outlined in the NICE Cybersecurity Workforce Framework.
Course Description: This course provides foundational knowledge of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. It emphasizes principles and capabilities of Microsoft SCI solutions. 
Framework Categories: Oversight and Governance 
Work Roles: Cybersecurity Policy and Planning 
Competency Areas: 
  • Access Controls 
    Understanding secure identity and access management. 
  • Supply Chain Security 
    Understanding how third-party services impact organizational security. 
CyberProtex, LLC - 2012-2025

[email protected]

256-401-7072
Picture
Picture
  • SERVICES
    • mssp
    • Managed Services >
      • Security Operations Center >
        • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Security and Compliance >
      • NIST 800-171 Assessments
      • CMMC Assessments
      • Incident Response
      • Penetration Testing
      • Vulnerability Assessments
      • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CEH
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • CEH
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • EC|COUNCIL
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Workshop
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact