Favorites
b/udemy1edited 1 year agobyELKinG

SC-900: Microsoft Security,Compliance&Identity Fundamentals

Sc-900: Microsoft Security,Compliance&Identity Fundamentals

Last updated 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.29 GB | Duration: 7h 19m

Prepare for SC 900: Microsoft Azure, Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365

What you'll learn
Describe the concepts of Information security, compliance, and identity as it relates to Azure and related Microsoft Products
Describe the capabilities of Microsoft compliance solutions
Identify the capabilities of Microsoft security solutions
Describe the capabilities of Microsoft identity and access management solutions

Requirements
Basic Knowledge of security , compliance and Identity
Candidates should be familiar with Microsoft Azure and Microsoft 365
Concepts of Azure Active Directory would be helpful

Description
The course is updated as per 26th July UpdateThis certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.Identity is the new perimeter. Application developers and infrastrutcure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it. This course begins with the concepts of Security, Compliance and Identity. We'll look at security methodologies, security concepts and Microsoft Security and compliance principles. We will check the concepts of zero trust methodology , shared responsibility model and defense in depth . We'll then look at Microsoft Identity and Access Management Solutions. We'll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.The final module is Microsoft Compliance Solutions. We'll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery and audit. Here is the course coverage :Describe the Concepts of Security, Compliance, and Identity (5-10%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)For detailed / updated SC 900 curriculum, please take a look at the SC 900 agenda at Microsoft learn site.

Overview
Section 1: Course Introduction

Lecture 1 Traditional war & Cyber Security

Lecture 2 Course Introduction

Lecture 3 Course Reviews & Thank You

Section 2: Module 1 Describe the concepts of security, compliance, and identity

Lecture 4 Chapter 1 : Security concepts and methodologies - Introduction

Lecture 5 Zero Trust - Guidelines

Lecture 6 Zero Trust - Six Foundational Pillars

Lecture 7 The Shared Responsibility Model

Lecture 8 Defence in Depth Strategy

Lecture 9 The CIA Triad

Lecture 10 Describe Common Threats

Lecture 11 Describe Encryption , hashing and Signing -I

Lecture 12 Describe Encryption , hashing and Signing - II

Lecture 13 Lesson Conclusion

Lecture 14 Microsoft security and compliance principles - Lesson Introduction

Lecture 15 Microsoft's Privacy Principles

Lecture 16 What is Service Trust Portal

Lecture 17 Azure Compliance Documentation

Lecture 18 Module 1 : Chapter Summary

Section 3: Module 2 Describe the concepts & capabilities of Microsoft identity and access

Lecture 19 Describe Identity Concepts - Introduction

Lecture 20 Common Identity Attacks

Lecture 21 Identity As a Security perimeter

Lecture 22 Four Pillars of Identity

Lecture 23 Modern Authentication and the role of Identity provider

Lecture 24 SSO and the Concept of Federation

Lecture 25 The concept of directory services and Active Directory

Lecture 26 Describe the basic services and identity types - Introduction

Lecture 27 Describe Azure Active Directory

Lecture 28 Azure AD Editions

Lecture 29 Describe the Azure AD identity types

Lecture 30 Difference between System assigned and user assigned managed Identity

Lecture 31 Describe the types external identities

Lecture 32 Describe the concept of hybrid Identities

Lecture 33 Describe the authentication capabilities of Azure - Introduction

Lecture 34 Describe the different authentication methods

Lecture 35 Security defaults and MFA

Lecture 36 MFA in Azure AD - Part 1

Lecture 37 MFA in Azure AD - Part 2

Lecture 38 Windows Hello

Lecture 39 Why is Windows Hello safer than a password

Lecture 40 Self-service password reset in Azure AD

Lecture 41 Password protection and management capabilities of Azure AD

Lecture 42 Protecting against password spray

Lecture 43 Hybrid security

Lecture 44 Describe the access management capabilties of AzureAD

Lecture 45 Conditional access in Azure AD

Lecture 46 Conditional access in Azure AD - II

Lecture 47 Conditional access in Azure AD - III

Lecture 48 Azure AD Roles & Custom Roles

Lecture 49 Chapter Summary

Lecture 50 Describe the identity protection and governance capabilties of Azure AD

Lecture 51 What is Identity Governance

Lecture 52 What is Identity lifecycle

Lecture 53 Access Lifecycle

Lecture 54 Privileged access lifecycle

Lecture 55 What is Entitlement management

Lecture 56 Azure AD access reviews

Lecture 57 Azure AD terms of use

Lecture 58 Capabilities of Privileged identity Management

Section 4: Module 3 : Describe the capabilties of Microsoft security solutions

Lecture 59 Module Introduction

Lecture 60 Network security groups

Lecture 61 Inbound and outbound security rules

Lecture 62 What is DDOS

Lecture 63 Azure DDOS protection plans and pricing

Lecture 64 Azure Firewall

Lecture 65 Azure Bastion Host

Lecture 66 Web Application Firewall

Lecture 67 Azure Encryption

Lecture 68 Azure Key Vault

Lecture 69 Lesson Summary

Lecture 70 Cloud Security Posture management

Lecture 71 Azure Security Center

Lecture 72 Azure Security Center - Features

Lecture 73 Azure Security Center - Security Score

Lecture 74 Azure defender

Lecture 75 Azure Security Benchmark

Lecture 76 Azure Security Center - Pricing Tier

Lecture 77 Chapter Summary

Lecture 78 Describe the security capabilities of Azure Sentinel

Lecture 79 Define the concepts of SIEM, SOAR and XDR

Lecture 80 Azure Sentinel

Lecture 81 Azure Sentinel Features

Lecture 82 Azure Sentinel - Pricing

Lecture 83 Chapter Summary

Lecture 84 Describe the threat protection capabilities of - Introduction

Lecture 85 Microsoft 365 Defender services - Introduction

Lecture 86 Microsoft Defender for Identity

Lecture 87 Microsoft Defender for O365

Lecture 88 Microsoft Defender for Endpoint

Lecture 89 What is CASB

Lecture 90 The Cloud App Security framework

Lecture 91 Microsoft Cloud App Security architecture

Lecture 92 O365 Cloud App security And Azure AD Cloud App Discovery

Lecture 93 Chapter Summary

Lecture 94 Security Management Capabilties of M365 - Introduction

Lecture 95 Microsoft 365 Security Center - Intro

Lecture 96 How to use Microsoft Secure Score

Lecture 97 Differences between the Azure and Microsoft Secure Score

Lecture 98 Managing Incidents

Lecture 99 Chapter Summary

Lecture 100 Describe endpoint security with Microsoft Intune - Introduction

Lecture 101 What is Intune

Lecture 102 MDM and MAM

Lecture 103 Endpoint Security with Intune

Lecture 104 Lesson Summary

Section 5: Module 4 : Describe the capabilities of Microsoft compliance solutions

Lecture 105 Module 4 introduction

Lecture 106 Common Compliance Needs

Lecture 107 Common compliance regulations

Lecture 108 Compliance Center

Lecture 109 What is Compliance Manager

Lecture 110 What are Controls

Lecture 111 What are Assesments

Lecture 112 Understand Compliance score

Lecture 113 Chapter Summary

Lecture 114 The information protection and governance capabiliities of Microsoft 365

Lecture 115 Know your data, protect your data, and govern your data

Lecture 116 Data classification capabilities of compliance Center

Lecture 117 Content Explorer and Activity Explorer

Lecture 118 Sensitivity labels

Lecture 119 Label Policies

Lecture 120 Data Loss Prevention

Lecture 121 Data Loss Prevention on endpoints and teams

Lecture 122 Retention Polices and Retention Labels

Lecture 123 Records Management

Lecture 124 Chapter Summary

Lecture 125 The insider risk capabilities in Microsoft - Introduction

Lecture 126 Insider Risk management

Lecture 127 Insider Risk management Workflow

Lecture 128 Communications Compliance

Lecture 129 Information barriers in Microsoft Teams

Lecture 130 Privileged Access Management

Lecture 131 Customer Lockbox

Lecture 132 Lesson Summary

Lecture 133 eDiscovery capabilities of Microsoft M365 - Introduction

Lecture 134 The Purpose of eDiscovery

Lecture 135 The capabilities of the content search

Lecture 136 The Core eDiscovery Workflow

Lecture 137 The advanced eDiscovery workflow

Lecture 138 Lesson Summary

Lecture 139 The audit capabilities of Microsoft 365- introduction

Lecture 140 The core audit capabilities of M365

Lecture 141 What are the Advance Auditing Capabilities

Lecture 142 High Bandwidth for Office 365 API Activities

Lecture 143 Lesson Summary

Lecture 144 Describe the resource governance capabilities- introduction

Lecture 145 Resource Manager - Locks

Lecture 146 What is Azure Blueprints

Lecture 147 What is Azure Policy

Lecture 148 Difference between Azure Policy and RBAC

Lecture 149 Cloud Adoption Framework

Section 6: SC 900 Certification - Updates

Lecture 150 Authentication and Authorization - Introduction

Lecture 151 Authentication Authorization and Protocols

Lecture 152 Azure AD Authentication Options

This course is for broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.,Partcipants looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.,Participants must have the passion to learn and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

Screenshots

Sc-900: Microsoft Security,Compliance&Identity Fundamentals

Homepage

without You and Your Support We Can’t Continue
Thanks for Buying Premium From My Links for Support
Click >>here & Visit My Blog Daily for More Udemy Tutorial. If You Need Update or Links Dead Don't Wait Just Pm Me or Leave Comment at This Post

All comments

    Load more replies

    Join the conversation!

    Log in or Sign up
    to post a comment.