SC-900: Microsoft Security,Compliance&Identity Fundamentals
Last updated 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.29 GB | Duration: 7h 19m
Prepare for SC 900: Microsoft Azure, Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365
What you'll learn
Describe the concepts of Information security, compliance, and identity as it relates to Azure and related Microsoft Products
Describe the capabilities of Microsoft compliance solutions
Identify the capabilities of Microsoft security solutions
Describe the capabilities of Microsoft identity and access management solutions
Requirements
Basic Knowledge of security , compliance and Identity
Candidates should be familiar with Microsoft Azure and Microsoft 365
Concepts of Azure Active Directory would be helpful
Description
The course is updated as per 26th July UpdateThis certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.Identity is the new perimeter. Application developers and infrastrutcure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it. This course begins with the concepts of Security, Compliance and Identity. We'll look at security methodologies, security concepts and Microsoft Security and compliance principles. We will check the concepts of zero trust methodology , shared responsibility model and defense in depth . We'll then look at Microsoft Identity and Access Management Solutions. We'll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.The final module is Microsoft Compliance Solutions. We'll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery and audit. Here is the course coverage :Describe the Concepts of Security, Compliance, and Identity (5-10%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)For detailed / updated SC 900 curriculum, please take a look at the SC 900 agenda at Microsoft learn site.
Overview
Section 1: Course Introduction
Lecture 1 Traditional war & Cyber Security
Lecture 2 Course Introduction
Lecture 3 Course Reviews & Thank You
Section 2: Module 1 Describe the concepts of security, compliance, and identity
Lecture 4 Chapter 1 : Security concepts and methodologies - Introduction
Lecture 5 Zero Trust - Guidelines
Lecture 6 Zero Trust - Six Foundational Pillars
Lecture 7 The Shared Responsibility Model
Lecture 8 Defence in Depth Strategy
Lecture 9 The CIA Triad
Lecture 10 Describe Common Threats
Lecture 11 Describe Encryption , hashing and Signing -I
Lecture 12 Describe Encryption , hashing and Signing - II
Lecture 13 Lesson Conclusion
Lecture 14 Microsoft security and compliance principles - Lesson Introduction
Lecture 15 Microsoft's Privacy Principles
Lecture 16 What is Service Trust Portal
Lecture 17 Azure Compliance Documentation
Lecture 18 Module 1 : Chapter Summary
Section 3: Module 2 Describe the concepts & capabilities of Microsoft identity and access
Lecture 19 Describe Identity Concepts - Introduction
Lecture 20 Common Identity Attacks
Lecture 21 Identity As a Security perimeter
Lecture 22 Four Pillars of Identity
Lecture 23 Modern Authentication and the role of Identity provider
Lecture 24 SSO and the Concept of Federation
Lecture 25 The concept of directory services and Active Directory
Lecture 26 Describe the basic services and identity types - Introduction
Lecture 27 Describe Azure Active Directory
Lecture 28 Azure AD Editions
Lecture 29 Describe the Azure AD identity types
Lecture 30 Difference between System assigned and user assigned managed Identity
Lecture 31 Describe the types external identities
Lecture 32 Describe the concept of hybrid Identities
Lecture 33 Describe the authentication capabilities of Azure - Introduction
Lecture 34 Describe the different authentication methods
Lecture 35 Security defaults and MFA
Lecture 36 MFA in Azure AD - Part 1
Lecture 37 MFA in Azure AD - Part 2
Lecture 38 Windows Hello
Lecture 39 Why is Windows Hello safer than a password
Lecture 40 Self-service password reset in Azure AD
Lecture 41 Password protection and management capabilities of Azure AD
Lecture 42 Protecting against password spray
Lecture 43 Hybrid security
Lecture 44 Describe the access management capabilties of AzureAD
Lecture 45 Conditional access in Azure AD
Lecture 46 Conditional access in Azure AD - II
Lecture 47 Conditional access in Azure AD - III
Lecture 48 Azure AD Roles & Custom Roles
Lecture 49 Chapter Summary
Lecture 50 Describe the identity protection and governance capabilties of Azure AD
Lecture 51 What is Identity Governance
Lecture 52 What is Identity lifecycle
Lecture 53 Access Lifecycle
Lecture 54 Privileged access lifecycle
Lecture 55 What is Entitlement management
Lecture 56 Azure AD access reviews
Lecture 57 Azure AD terms of use
Lecture 58 Capabilities of Privileged identity Management
Section 4: Module 3 : Describe the capabilties of Microsoft security solutions
Lecture 59 Module Introduction
Lecture 60 Network security groups
Lecture 61 Inbound and outbound security rules
Lecture 62 What is DDOS
Lecture 63 Azure DDOS protection plans and pricing
Lecture 64 Azure Firewall
Lecture 65 Azure Bastion Host
Lecture 66 Web Application Firewall
Lecture 67 Azure Encryption
Lecture 68 Azure Key Vault
Lecture 69 Lesson Summary
Lecture 70 Cloud Security Posture management
Lecture 71 Azure Security Center
Lecture 72 Azure Security Center - Features
Lecture 73 Azure Security Center - Security Score
Lecture 74 Azure defender
Lecture 75 Azure Security Benchmark
Lecture 76 Azure Security Center - Pricing Tier
Lecture 77 Chapter Summary
Lecture 78 Describe the security capabilities of Azure Sentinel
Lecture 79 Define the concepts of SIEM, SOAR and XDR
Lecture 80 Azure Sentinel
Lecture 81 Azure Sentinel Features
Lecture 82 Azure Sentinel - Pricing
Lecture 83 Chapter Summary
Lecture 84 Describe the threat protection capabilities of - Introduction
Lecture 85 Microsoft 365 Defender services - Introduction
Lecture 86 Microsoft Defender for Identity
Lecture 87 Microsoft Defender for O365
Lecture 88 Microsoft Defender for Endpoint
Lecture 89 What is CASB
Lecture 90 The Cloud App Security framework
Lecture 91 Microsoft Cloud App Security architecture
Lecture 92 O365 Cloud App security And Azure AD Cloud App Discovery
Lecture 93 Chapter Summary
Lecture 94 Security Management Capabilties of M365 - Introduction
Lecture 95 Microsoft 365 Security Center - Intro
Lecture 96 How to use Microsoft Secure Score
Lecture 97 Differences between the Azure and Microsoft Secure Score
Lecture 98 Managing Incidents
Lecture 99 Chapter Summary
Lecture 100 Describe endpoint security with Microsoft Intune - Introduction
Lecture 101 What is Intune
Lecture 102 MDM and MAM
Lecture 103 Endpoint Security with Intune
Lecture 104 Lesson Summary
Section 5: Module 4 : Describe the capabilities of Microsoft compliance solutions
Lecture 105 Module 4 introduction
Lecture 106 Common Compliance Needs
Lecture 107 Common compliance regulations
Lecture 108 Compliance Center
Lecture 109 What is Compliance Manager
Lecture 110 What are Controls
Lecture 111 What are Assesments
Lecture 112 Understand Compliance score
Lecture 113 Chapter Summary
Lecture 114 The information protection and governance capabiliities of Microsoft 365
Lecture 115 Know your data, protect your data, and govern your data
Lecture 116 Data classification capabilities of compliance Center
Lecture 117 Content Explorer and Activity Explorer
Lecture 118 Sensitivity labels
Lecture 119 Label Policies
Lecture 120 Data Loss Prevention
Lecture 121 Data Loss Prevention on endpoints and teams
Lecture 122 Retention Polices and Retention Labels
Lecture 123 Records Management
Lecture 124 Chapter Summary
Lecture 125 The insider risk capabilities in Microsoft - Introduction
Lecture 126 Insider Risk management
Lecture 127 Insider Risk management Workflow
Lecture 128 Communications Compliance
Lecture 129 Information barriers in Microsoft Teams
Lecture 130 Privileged Access Management
Lecture 131 Customer Lockbox
Lecture 132 Lesson Summary
Lecture 133 eDiscovery capabilities of Microsoft M365 - Introduction
Lecture 134 The Purpose of eDiscovery
Lecture 135 The capabilities of the content search
Lecture 136 The Core eDiscovery Workflow
Lecture 137 The advanced eDiscovery workflow
Lecture 138 Lesson Summary
Lecture 139 The audit capabilities of Microsoft 365- introduction
Lecture 140 The core audit capabilities of M365
Lecture 141 What are the Advance Auditing Capabilities
Lecture 142 High Bandwidth for Office 365 API Activities
Lecture 143 Lesson Summary
Lecture 144 Describe the resource governance capabilities- introduction
Lecture 145 Resource Manager - Locks
Lecture 146 What is Azure Blueprints
Lecture 147 What is Azure Policy
Lecture 148 Difference between Azure Policy and RBAC
Lecture 149 Cloud Adoption Framework
Section 6: SC 900 Certification - Updates
Lecture 150 Authentication and Authorization - Introduction
Lecture 151 Authentication Authorization and Protocols
Lecture 152 Azure AD Authentication Options
This course is for broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.,Partcipants looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.,Participants must have the passion to learn and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Screenshots
Homepage
without You and Your Support We Can’t Continue
Thanks for Buying Premium From My Links for Support
Click >>here & Visit My Blog Daily for More Udemy Tutorial. If You Need Update or Links Dead Don't Wait Just Pm Me or Leave Comment at This Post
Download from free file storage
Resolve the captcha to access the links!
Registered members don't get captcha ... just sayin