kingers Posted Saturday at 07:04 PM Report Share Posted Saturday at 07:04 PM Sc-900: Microsoft Security,Compliance&Identity Fundamentals Last updated 12/2022 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 8.29 GB | Duration: 7h 19mPrepare for SC 900: Microsoft Azure, Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365 What you'll learn Describe the concepts of Information security, compliance, and identity as it relates to Azure and related Microsoft Products Describe the capabilities of Microsoft compliance solutions Identify the capabilities of Microsoft security solutions Describe the capabilities of Microsoft identity and access management solutions Requirements Basic Knowledge of security , compliance and Identity Candidates should be familiar with Microsoft Azure and Microsoft 365 Concepts of Azure Active Directory would be helpful Description The course is updated as per 26th July UpdateThis certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.Identity is the new perimeter. Application developers and infrastrutcure teams must focus on identity and the security tools that revolve around it to protect the state of identity. This course covers various aspects of identity and security methodologies used to protect it. This course begins with the concepts of Security, Compliance and Identity. We'll look at security methodologies, security concepts and Microsoft Security and compliance principles. We will check the concepts of zero trust methodology , shared responsibility model and defense in depth . We'll then look at Microsoft Identity and Access Management Solutions. We'll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.The final module is Microsoft Compliance Solutions. We'll look at compliance management capabilities generally, then have a look at the capabilities in Microsoft 365 of information protection and governance, inside risk, eDiscovery and audit. Here is the course coverage :Describe the Concepts of Security, Compliance, and Identity (5-10%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%)For detailed / updated SC 900 curriculum, please take a look at the SC 900 agenda at Microsoft learn site. Overview Section 1: Course Introduction Lecture 1 Traditional war & Cyber Security Lecture 2 Course Introduction Lecture 3 Course Reviews & Thank You Section 2: Module 1 Describe the concepts of security, compliance, and identity Lecture 4 Chapter 1 : Security concepts and methodologies - Introduction Lecture 5 Zero Trust - Guidelines Lecture 6 Zero Trust - Six Foundational Pillars Lecture 7 The Shared Responsibility Model Lecture 8 Defence in Depth Strategy Lecture 9 The CIA Triad Lecture 10 Describe Common Threats Lecture 11 Describe Encryption , hashing and Signing -I Lecture 12 Describe Encryption , hashing and Signing - II Lecture 13 Lesson Conclusion Lecture 14 Microsoft security and compliance principles - Lesson Introduction Lecture 15 Microsoft's Privacy Principles Lecture 16 What is Service Trust Portal Lecture 17 Azure Compliance Documentation Lecture 18 Module 1 : Chapter Summary Section 3: Module 2 Describe the concepts & capabilities of Microsoft identity and access Lecture 19 Describe Identity Concepts - Introduction Lecture 20 Common Identity Attacks Lecture 21 Identity As a Security perimeter Lecture 22 Four Pillars of Identity Lecture 23 Modern Authentication and the role of Identity provider Lecture 24 SSO and the Concept of Federation Lecture 25 The concept of directory services and Active Directory Lecture 26 Describe the basic services and identity types - Introduction Lecture 27 Describe Azure Active Directory Lecture 28 Azure AD Editions Lecture 29 Describe the Azure AD identity types Lecture 30 Difference between System assigned and user assigned managed Identity Lecture 31 Describe the types external identities Lecture 32 Describe the concept of hybrid Identities Lecture 33 Describe the authentication capabilities of Azure - Introduction Lecture 34 Describe the different authentication methods Lecture 35 Security defaults and MFA Lecture 36 MFA in Azure AD - Part 1 Lecture 37 MFA in Azure AD - Part 2 Lecture 38 Windows Hello Lecture 39 Why is Windows Hello safer than a password Lecture 40 Self-service password reset in Azure AD Lecture 41 Password protection and management capabilities of Azure AD Lecture 42 Protecting against password spray Lecture 43 Hybrid security Lecture 44 Describe the access management capabilties of AzureAD Lecture 45 Conditional access in Azure AD Lecture 46 Conditional access in Azure AD - II Lecture 47 Conditional access in Azure AD - III Lecture 48 Azure AD Roles & Custom Roles Lecture 49 Chapter Summary Lecture 50 Describe the identity protection and governance capabilties of Azure AD Lecture 51 What is Identity Governance Lecture 52 What is Identity lifecycle Lecture 53 Access Lifecycle Lecture 54 Privileged access lifecycle Lecture 55 What is Entitlement management Lecture 56 Azure AD access reviews Lecture 57 Azure AD terms of use Lecture 58 Capabilities of Privileged identity Management Section 4: Module 3 : Describe the capabilties of Microsoft security solutions Lecture 59 Module Introduction Lecture 60 Network security groups Lecture 61 Inbound and outbound security rules Lecture 62 What is DDOS Lecture 63 Azure DDOS protection plans and pricing Lecture 64 Azure Firewall Lecture 65 Azure Bastion Host Lecture 66 Web Application Firewall Lecture 67 Azure Encryption Lecture 68 Azure Key Vault Lecture 69 Lesson Summary Lecture 70 Cloud Security Posture management Lecture 71 Azure Security Center Lecture 72 Azure Security Center - Features Lecture 73 Azure Security Center - Security Score Lecture 74 Azure defender Lecture 75 Azure Security Benchmark Lecture 76 Azure Security Center - Pricing Tier Lecture 77 Chapter Summary Lecture 78 Describe the security capabilities of Azure Sentinel Lecture 79 Define the concepts of SIEM, SOAR and XDR Lecture 80 Azure Sentinel Lecture 81 Azure Sentinel Features Lecture 82 Azure Sentinel - Pricing Lecture 83 Chapter Summary Lecture 84 Describe the threat protection capabilities of - Introduction Lecture 85 Microsoft 365 Defender services - Introduction Lecture 86 Microsoft Defender for Identity Lecture 87 Microsoft Defender for O365 Lecture 88 Microsoft Defender for Endpoint Lecture 89 What is CASB Lecture 90 The Cloud App Security framework Lecture 91 Microsoft Cloud App Security architecture Lecture 92 O365 Cloud App security And Azure AD Cloud App Discovery Lecture 93 Chapter Summary Lecture 94 Security Management Capabilties of M365 - Introduction Lecture 95 Microsoft 365 Security Center - Intro Lecture 96 How to use Microsoft Secure Score Lecture 97 Differences between the Azure and Microsoft Secure Score Lecture 98 Managing Incidents Lecture 99 Chapter Summary Lecture 100 Describe endpoint security with Microsoft Intune - Introduction Lecture 101 What is Intune Lecture 102 MDM and MAM Lecture 103 Endpoint Security with Intune Lecture 104 Lesson Summary Section 5: Module 4 : Describe the capabilities of Microsoft compliance solutions Lecture 105 Module 4 introduction Lecture 106 Common Compliance Needs Lecture 107 Common compliance regulations Lecture 108 Compliance Center Lecture 109 What is Compliance Manager Lecture 110 What are Controls Lecture 111 What are Assesments Lecture 112 Understand Compliance score Lecture 113 Chapter Summary Lecture 114 The information protection and governance capabiliities of Microsoft 365 Lecture 115 Know your data, protect your data, and govern your data Lecture 116 Data classification capabilities of compliance Center Lecture 117 Content Explorer and Activity Explorer Lecture 118 Sensitivity labels Lecture 119 Label Policies Lecture 120 Data Loss Prevention Lecture 121 Data Loss Prevention on endpoints and teams Lecture 122 Retention Polices and Retention Labels Lecture 123 Records Management Lecture 124 Chapter Summary Lecture 125 The insider risk capabilities in Microsoft - Introduction Lecture 126 Insider Risk management Lecture 127 Insider Risk management Workflow Lecture 128 Communications Compliance Lecture 129 Information barriers in Microsoft Teams Lecture 130 Privileged Access Management Lecture 131 Customer Lockbox Lecture 132 Lesson Summary Lecture 133 eDiscovery capabilities of Microsoft M365 - Introduction Lecture 134 The Purpose of eDiscovery Lecture 135 The capabilities of the content search Lecture 136 The Core eDiscovery Workflow Lecture 137 The advanced eDiscovery workflow Lecture 138 Lesson Summary Lecture 139 The audit capabilities of Microsoft 365- introduction Lecture 140 The core audit capabilities of M365 Lecture 141 What are the Advance Auditing Capabilities Lecture 142 High Bandwidth for Office 365 API Activities Lecture 143 Lesson Summary Lecture 144 Describe the resource governance capabilities- introduction Lecture 145 Resource Manager - Locks Lecture 146 What is Azure Blueprints Lecture 147 What is Azure Policy Lecture 148 Difference between Azure Policy and RBAC Lecture 149 Cloud Adoption Framework Section 6: SC 900 Certification - Updates Lecture 150 Authentication and Authorization - Introduction Lecture 151 Authentication Authorization and Protocols Lecture 152 Azure AD Authentication Options This course is for broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.,Partcipants looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.,Participants must have the passion to learn and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.DDownloadhttps://ddownload.com/6i9r429cicvi/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part1.rarhttps://ddownload.com/683yzztloom4/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part2.rarhttps://ddownload.com/j2lmxly92b5e/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part3.rarhttps://ddownload.com/tvsm5hyqhk80/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part4.rarhttps://ddownload.com/ki5nalolzo31/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part5.rarhttps://ddownload.com/birf9s6h0fnq/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part6.rarhttps://ddownload.com/kuo9xpoq0foo/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part7.rarhttps://ddownload.com/mxfj7yn5e9g5/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part8.rarRapidGatorhttps://rapidgator.net/file/01f03259d8fca7484dcb4700ed0c06fd/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part1.rarhttps://rapidgator.net/file/33afe93263cbe4c2d25911c0bded1ea7/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part2.rarhttps://rapidgator.net/file/8fb5229ece12106b6bb230394c58396d/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part3.rarhttps://rapidgator.net/file/33da1dd45fcd5d5cab776e4dec3a124d/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part4.rarhttps://rapidgator.net/file/0135e7849cbf4ca76137f7c6476cd18d/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part5.rarhttps://rapidgator.net/file/7095a8479a802082b46766f553c01b9f/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part6.rarhttps://rapidgator.net/file/f7fa2f838cd736350f97be0b7c060993/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part7.rarhttps://rapidgator.net/file/509e36108bd888d7dd886ac6ef7686ac/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part8.rarNitroFlarehttps://nitroflare.com/view/48C773999483AB2/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part1.rarhttps://nitroflare.com/view/CDCD288CB4F573C/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part2.rarhttps://nitroflare.com/view/78A9AD3C2FD0E79/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part3.rarhttps://nitroflare.com/view/3949790AE1C2781/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part4.rarhttps://nitroflare.com/view/CD948F510D3C411/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part5.rarhttps://nitroflare.com/view/0569C3F7406BE44/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part6.rarhttps://nitroflare.com/view/FE2D94313D5824D/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part7.rarhttps://nitroflare.com/view/566FAEFBAD6A138/yxusj..-.SC-900.Microsoft.SecurityComplianceIdentity.Fundamentals.part8.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now