Académique Documents
Professionnel Documents
Culture Documents
fondamentaux de la
sécurité, de la
conformité et de
l’identité Microsoft
SC-900
Concepts
https://aka.ms/sc900academy
Agenda
Save the date
Introduction
Security and compliance concepts &
methodologies
Identity concepts
Ressources
https://aka.ms/sc900academy
Save the date
Date Thème
https://aka.ms/sc900academy
Overview of Microsoft Certified: Get started at
Security, Compliance, and Identity Fundamentals aka.ms/SecurityCerts_Fundamentals
familiariser avec les • Concepts of Security, Compliance, and Identity • Microsoft 365 Defender
• Capabilities of Microsoft Identity and Access
principes fondamentaux Management Solutions
• Microsoft Security Score
Microsoft Certified: • Microsoft Compliance
de la sécurité, de la • Capabilities of Microsoft Security Solutions Security, Compliance, and Identity Fund Manager
conformité et de • Capabilities of Microsoft Compliance Solutions
amentals
• Microsoft Intune
l’identité (SCI) dans les Knowledge and experience:
• And more…
Start here
Decide if this is the right Upskill with recommended Pass required exam to
certification for you training and experience earn your certification
Additional resources
• Microsoft Docs
This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. This is a
broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.
Sujets :
Describe the concepts of security, compliance, and identity (10-15%)
Describe the capabilities of Microsoft Azure Active Directory (Azure AD), part of Microsoft
Entra (25–30%)
Describe the capabilities of Microsoft security solutions (25-30%)
Describe the capabilities of Microsoft compliance solutions (25-30%)
https://docs.microsoft.com/en-us/learn/certifications/exams/sc-900
Describe the Concepts of Security, Compliance, and Identity (10-15%)
Corporate
network
Today’s Model
Identity perimeter complements network perimeter
Home office
Cloud services
IoT devices
Employees Partners
Corporate
network
SaaS apps
Customers
94
% of organizations
using cloud2
7B
internet-
connected devices
5.2
in use worldwide1
60 %
of organizations
currently have a formal
BYOD program in place3
Old World vs. New World
Infrastructure
Risk
Endpoints
Containers
Serverless
assessment
Int. Sites
Runtime
PaaS
IaaS
Threat
Corporate control
Protection
Personal JIT and Version Control
Continuous Assessment
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment
Encryption, hashing, signing
Symmetric encryption
same key to encrypt and decrypt
good performance, can encrypt big volumes
Asymmetric encryption
key pair: private key, public key
encrypt with one key, decrypt with the other
not efficient for big volumes, used for encrypting a symmetric key or a hash (signature)
Data sovereignty
lois qui s’appliquent en fonction du peys de collecte / stockage / traitement des données
Data privacy
collecte, traitement, utilisation et partage de données personnelles.
Knowledge check
Common identity attacks
Password-based attacks
Password spray
Brute force
Phishing
Spear phishing
Identity as the primary security perimeter
Four pillars of identity
Administration: creation and management
of identities for users, devices, and
services
Authentication (AuthN)
Authorization (AuthZ)
Auditing: tracking who does what, when,
where, and how
Modern authentication and the identity provider
idp K
name, pw
token
client server
token
claims:
sub, nbf, exp, aud...
Federated services
Directory services and Active Directory
AD (AD DS): directory service, developped for Windows 2000
Directory (LDAP) – users, devices, groups
Authentication (Kerberos)
Management (OU, GPO)
On premises
No support for mobile devices, SaaS applications, modern authentication
Acronyms: https://aka.ms/MSAcronyms