Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Sc-900: Microsoft Security,Compliance&Identity Fundamentals (updated 12/2022)

    Posted By: ELK1nG
    Sc-900: Microsoft Security,Compliance&Identity Fundamentals (updated 12/2022)

    Sc-900: Microsoft Security,Compliance&Identity Fundamentals
    Last updated 12/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 8.29 GB | Duration: 7h 19m

    Prepare for SC 900: Microsoft Azure, Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365

    What you'll learn

    Describe the concepts of Information security, compliance, and identity as it relates to Azure and related Microsoft Products

    Describe the capabilities of Microsoft compliance solutions

    Identify the capabilities of Microsoft security solutions

    Describe the capabilities of Microsoft identity and access management solutions

    Requirements

    Basic Knowledge of security , compliance and Identity

    Candidates should be familiar with Microsoft Azure and Microsoft 365

    Concepts of Azure Active Directory would be helpful

    Description

    The course is updated as per 26th July UpdateThis certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.Identity is the new perimeter. Application developers and infrastrutcure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it. This course begins with the concepts of Security, Compliance and Identity. We'll look at security methodologies, security concepts and Microsoft Security and compliance principles. We will check the concepts of zero trust methodology , shared responsibility model and defense in depth . We'll then look at Microsoft Identity and Access Management Solutions. We'll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.The final module is Microsoft Compliance Solutions. We'll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery and audit. Here is the course coverage :Describe the Concepts of Security, Compliance, and Identity (5-10%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)For detailed / updated SC 900 curriculum, please take a look at the SC 900 agenda at Microsoft learn site.

    Overview

    Section 1: Course Introduction

    Lecture 1 Traditional war & Cyber Security

    Lecture 2 Course Introduction

    Lecture 3 Course Reviews & Thank You

    Section 2: Module 1 Describe the concepts of security, compliance, and identity

    Lecture 4 Chapter 1 : Security concepts and methodologies - Introduction

    Lecture 5 Zero Trust - Guidelines

    Lecture 6 Zero Trust - Six Foundational Pillars

    Lecture 7 The Shared Responsibility Model

    Lecture 8 Defence in Depth Strategy

    Lecture 9 The CIA Triad

    Lecture 10 Describe Common Threats

    Lecture 11 Describe Encryption , hashing and Signing -I

    Lecture 12 Describe Encryption , hashing and Signing - II

    Lecture 13 Lesson Conclusion

    Lecture 14 Microsoft security and compliance principles - Lesson Introduction

    Lecture 15 Microsoft's Privacy Principles

    Lecture 16 What is Service Trust Portal

    Lecture 17 Azure Compliance Documentation

    Lecture 18 Module 1 : Chapter Summary

    Section 3: Module 2 Describe the concepts & capabilities of Microsoft identity and access

    Lecture 19 Describe Identity Concepts - Introduction

    Lecture 20 Common Identity Attacks

    Lecture 21 Identity As a Security perimeter

    Lecture 22 Four Pillars of Identity

    Lecture 23 Modern Authentication and the role of Identity provider

    Lecture 24 SSO and the Concept of Federation

    Lecture 25 The concept of directory services and Active Directory

    Lecture 26 Describe the basic services and identity types - Introduction

    Lecture 27 Describe Azure Active Directory

    Lecture 28 Azure AD Editions

    Lecture 29 Describe the Azure AD identity types

    Lecture 30 Difference between System assigned and user assigned managed Identity

    Lecture 31 Describe the types external identities

    Lecture 32 Describe the concept of hybrid Identities

    Lecture 33 Describe the authentication capabilities of Azure - Introduction

    Lecture 34 Describe the different authentication methods

    Lecture 35 Security defaults and MFA

    Lecture 36 MFA in Azure AD - Part 1

    Lecture 37 MFA in Azure AD - Part 2

    Lecture 38 Windows Hello

    Lecture 39 Why is Windows Hello safer than a password

    Lecture 40 Self-service password reset in Azure AD

    Lecture 41 Password protection and management capabilities of Azure AD

    Lecture 42 Protecting against password spray

    Lecture 43 Hybrid security

    Lecture 44 Describe the access management capabilties of AzureAD

    Lecture 45 Conditional access in Azure AD

    Lecture 46 Conditional access in Azure AD - II

    Lecture 47 Conditional access in Azure AD - III

    Lecture 48 Azure AD Roles & Custom Roles

    Lecture 49 Chapter Summary

    Lecture 50 Describe the identity protection and governance capabilties of Azure AD

    Lecture 51 What is Identity Governance

    Lecture 52 What is Identity lifecycle

    Lecture 53 Access Lifecycle

    Lecture 54 Privileged access lifecycle

    Lecture 55 What is Entitlement management

    Lecture 56 Azure AD access reviews

    Lecture 57 Azure AD terms of use

    Lecture 58 Capabilities of Privileged identity Management

    Section 4: Module 3 : Describe the capabilties of Microsoft security solutions

    Lecture 59 Module Introduction

    Lecture 60 Network security groups

    Lecture 61 Inbound and outbound security rules

    Lecture 62 What is DDOS

    Lecture 63 Azure DDOS protection plans and pricing

    Lecture 64 Azure Firewall

    Lecture 65 Azure Bastion Host

    Lecture 66 Web Application Firewall

    Lecture 67 Azure Encryption

    Lecture 68 Azure Key Vault

    Lecture 69 Lesson Summary

    Lecture 70 Cloud Security Posture management

    Lecture 71 Azure Security Center

    Lecture 72 Azure Security Center - Features

    Lecture 73 Azure Security Center - Security Score

    Lecture 74 Azure defender

    Lecture 75 Azure Security Benchmark

    Lecture 76 Azure Security Center - Pricing Tier

    Lecture 77 Chapter Summary

    Lecture 78 Describe the security capabilities of Azure Sentinel

    Lecture 79 Define the concepts of SIEM, SOAR and XDR

    Lecture 80 Azure Sentinel

    Lecture 81 Azure Sentinel Features

    Lecture 82 Azure Sentinel - Pricing

    Lecture 83 Chapter Summary

    Lecture 84 Describe the threat protection capabilities of - Introduction

    Lecture 85 Microsoft 365 Defender services - Introduction

    Lecture 86 Microsoft Defender for Identity

    Lecture 87 Microsoft Defender for O365

    Lecture 88 Microsoft Defender for Endpoint

    Lecture 89 What is CASB

    Lecture 90 The Cloud App Security framework

    Lecture 91 Microsoft Cloud App Security architecture

    Lecture 92 O365 Cloud App security And Azure AD Cloud App Discovery

    Lecture 93 Chapter Summary

    Lecture 94 Security Management Capabilties of M365 - Introduction

    Lecture 95 Microsoft 365 Security Center - Intro

    Lecture 96 How to use Microsoft Secure Score

    Lecture 97 Differences between the Azure and Microsoft Secure Score

    Lecture 98 Managing Incidents

    Lecture 99 Chapter Summary

    Lecture 100 Describe endpoint security with Microsoft Intune - Introduction

    Lecture 101 What is Intune

    Lecture 102 MDM and MAM

    Lecture 103 Endpoint Security with Intune

    Lecture 104 Lesson Summary

    Section 5: Module 4 : Describe the capabilities of Microsoft compliance solutions

    Lecture 105 Module 4 introduction

    Lecture 106 Common Compliance Needs

    Lecture 107 Common compliance regulations

    Lecture 108 Compliance Center

    Lecture 109 What is Compliance Manager

    Lecture 110 What are Controls

    Lecture 111 What are Assesments

    Lecture 112 Understand Compliance score

    Lecture 113 Chapter Summary

    Lecture 114 The information protection and governance capabiliities of Microsoft 365

    Lecture 115 Know your data, protect your data, and govern your data

    Lecture 116 Data classification capabilities of compliance Center

    Lecture 117 Content Explorer and Activity Explorer

    Lecture 118 Sensitivity labels

    Lecture 119 Label Policies

    Lecture 120 Data Loss Prevention

    Lecture 121 Data Loss Prevention on endpoints and teams

    Lecture 122 Retention Polices and Retention Labels

    Lecture 123 Records Management

    Lecture 124 Chapter Summary

    Lecture 125 The insider risk capabilities in Microsoft - Introduction

    Lecture 126 Insider Risk management

    Lecture 127 Insider Risk management Workflow

    Lecture 128 Communications Compliance

    Lecture 129 Information barriers in Microsoft Teams

    Lecture 130 Privileged Access Management

    Lecture 131 Customer Lockbox

    Lecture 132 Lesson Summary

    Lecture 133 eDiscovery capabilities of Microsoft M365 - Introduction

    Lecture 134 The Purpose of eDiscovery

    Lecture 135 The capabilities of the content search

    Lecture 136 The Core eDiscovery Workflow

    Lecture 137 The advanced eDiscovery workflow

    Lecture 138 Lesson Summary

    Lecture 139 The audit capabilities of Microsoft 365- introduction

    Lecture 140 The core audit capabilities of M365

    Lecture 141 What are the Advance Auditing Capabilities

    Lecture 142 High Bandwidth for Office 365 API Activities

    Lecture 143 Lesson Summary

    Lecture 144 Describe the resource governance capabilities- introduction

    Lecture 145 Resource Manager - Locks

    Lecture 146 What is Azure Blueprints

    Lecture 147 What is Azure Policy

    Lecture 148 Difference between Azure Policy and RBAC

    Lecture 149 Cloud Adoption Framework

    Section 6: SC 900 Certification - Updates

    Lecture 150 Authentication and Authorization - Introduction

    Lecture 151 Authentication Authorization and Protocols

    Lecture 152 Azure AD Authentication Options

    This course is for broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.,Partcipants looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.,Participants must have the passion to learn and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.