Skip to content

SC-900 Microsoft Security, Compliance and Identity Fundamentals

SC-900 Microsoft Security, Compliance and Identity Fundamentals

|
April 24, 2026 ·
Enroll in the SC-900 Microsoft Security, Compliance, and Identity Training. Choose this training to become familiar with the fundamentals of security, compliance, and identity (SCI) in cloud-based and related Microsoft services. Upon completion of this training, you will be able to:
    • Describe the basic concepts of security, compliance, and identity;
    • Describe the concepts and capabilities of Microsoft identity and access management solutions;
    • Describe the capabilities of Microsoft security solutions.
Certification trainings are exclusively available to Ingram Micro partners. Not working with Ingram Micro yet? Reach out and learn how partnering with us can help accelerate your business: cloud@ingrammicro.be Training content Module 1: Describe basic concepts of security, compliance, and identity. Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.
  • Describe security concepts and methodologies.
  • Describe Microsoft security and compliance principles.
  • Module summary
After completing module 1, students will be able to:
  • Describe security concepts and methodologies.
  • Explore the Service Trust Portal.
  • Know where to go to find and review Azure compliance documentation.
Module 2: Describe the concepts and capabilities of Microsoft identity and access management solutions Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.
  • Describe identity concepts
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD
  • Describe the access management capabilities of Azure AD
  • Describe the identity protection and governance capabilities of Azure AD
  • Module summary
After completing module 2, students will be able to:
  • Describe basic identity concepts.
  • Describe the basic services and identity types of Azure AD
  • Describe the authentication capabilities of Azure AD.
  • Describe the access management capabilities of Azure AD.
  • Describe the identity protection and governance capabilities of Azure AD.
Module 3: Describe the capabilities of Microsoft security solutions Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you'll explore endpoint protection with Intune.
  • Describe the basic security capabilities in Azure
  • Describe the security management capabilities of Azure
  • Describe the security capabilities of Azure Sentinel
  • Describe the threat protection capabilities of Microsoft 365
  • Describe the security management capabilities of Microsoft 365
  • Describe endpoint security with Microsoft Intune
  • Module summary
After completing module 3, students will be able to:
  • Describe the basic security capabilities in Azure.
  • Describe the security management capabilities of Azure.
  • Describe the security capabilities of Azure Sentinel.
  • Describe the threat protection capabilities of Microsoft 365.
  • Describe the security management capabilities of Microsoft 365.
  • Describe endpoint security with Microsoft Intune.
Module 4: Describe the capabilities of Microsoft compliance solutions Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.
  • Describe the compliance management capabilities in Microsoft
  • Describe the information protection and governance capabilities of Microsoft 365
  • Describe the insider risk capabilities in Microsoft 365
  • Describe the eDiscovery capabilities of Microsoft 365
  • Describe the audit capabilities of Microsoft 365
  • Describe the resource governance capabilities in Azure
  • Module summary
After completing module 4, students will be able to:
  • Describe the compliance management capabilities in Microsoft.
  • Describe the information protection and governance capabilities of Microsoft 365.
  • Describe the insider risk capabilities in Microsoft 365.
  • Describe the eDiscovery capabilities of Microsoft 365.
  • Describe the audit capabilities of Microsoft 365
  • Describe the resource governance capabilities in Azure
SecurityMicrosoft AzureMicrosoft 365SecuritySalesTechnical