![]() |
|
Sc-900 Microsoft Security, Compliance, & Identity With Sims - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Sc-900 Microsoft Security, Compliance, & Identity With Sims (/Thread-Sc-900-Microsoft-Security-Compliance-Identity-With-Sims) |
Sc-900 Microsoft Security, Compliance, & Identity With Sims - OneDDL - 08-09-2024 ![]() Free Download Sc-900 Microsoft Security, Compliance, & Identity With Sims Last updated 7/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 5.69 GB | Duration: 10h 52m Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7 What you'll learn Learn the concepts and perform hands on activities needed to pass the SC-900 exam Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services Get loads of hands on experience with securing Microsoft 365 / Azure Services Utilize hands on simulations that can be access anytime, anywhere! Requirements Willingness to put in the time and practice the steps shown in the course Description We really hope you'll agree, this training is way more then the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the courseUnderstanding the Microsoft EnvironmentHaving a Solid Foundation of Active Directory DomainsHaving a Solid Foundation of RAS, DMZ, and VirtualizationHaving a Solid Foundation of the Microsoft Cloud ServicesQuestions for John ChristopherPerforming hands on activitiesIMPORTANT Using Assignments in the courseCreating a free Microsoft 365 Azure AD AccountGetting your free Azure creditDescribe security and compliance conceptsDescribe the shared responsibility modelDescribe defense in depthDescribe the Zero-Trust modelDescribe encryption and hashingDescribe compliance conceptsDefine identity conceptsDefine identity as the primary security perimeterDefine authenticationDefine authorizationDescribe identity providers and the concept of FederationDescribe Active DirectoryDescribe the basic identity services and identity types of Azure ADDescribe Azure ADDescribe Azure AD identities including external identitiesDescribe hybrid identityDescribe the authentication capabilities of Azure ADDescribe the authentication methods available in Azure ADDescribe Multi-factor AuthenticationDescribe self-service password resetDescribe password protection and management capabilities available in Azure ADDescribe access management capabilities of Azure ADDescribe conditional accessCreating conditional access poliesDescribe the benefits of Azure AD rolesDescribe the benefits of Azure AD role-based access controlDescribe the identity protection and governance capabilities of Azure ADDescribe identity governance in Azure ADDescribe entitlement managementDescribe access reviewsDescribe the capabilities of Azure AD Privileged Identity Management (PIM)Implementing Azure AD Privileged Identity Management (PIM)Describe Azure AD Identity ProtectionDescribe basic security capabilities in AzureVisualizing general Azure networkingDescribe Azure DDoS protectionDescribe Azure FirewallDescribe Network Segmentation with VNetDescribe Azure Network Security groupsCreate a virtual machine in AzureDescribe Azure Bastion and JIT AccessDescribe ways Azure encrypts dataDescribe security management capabilities of AzureDescribe Microsoft Defender for Cloud & Cloud security posture management (CSPM)Describe the enhanced security features of Microsoft Defender for CloudDescribe security baselines for AzureDescribe security capabilities of Microsoft SentinelDefine the concepts of security information and event management (SIEM) and SOARDescribe threat detection and mitigation capabilities in Microsoft SentinelDescribe threat protection with Microsoft 365 DefenderDescribe Microsoft 365 Defender servicesDescribe Microsoft Defender for Office 365Describe Microsoft Defender for EndpointDescribe Microsoft Defender for Cloud AppsUsing Microsoft Defender for Cloud Apps for policy creationDescribe Microsoft Defender for IdentityBasics of setting up Microsoft Defender for IdentityDescribe the Microsoft 365 Defender portalDescribe Microsoft's Service Trust Portal and privacy principlesDescribe the offerings of the Service Trust portalDescribe Microsoft's privacy principlesDescribe the compliance management capabilities of Microsoft PurviewDescribe the Microsoft Purview compliance portalDescribe compliance managerDescribe the use and benefits of compliance scoreDescribe information protection & data lifecycle management of Microsoft PurviewDescribe data classification capabilitiesDescribe the benefits of content explorer and activity explorerDescribe sensitivity labelsBasics of using sensitivity labelsDescribe Data Loss Prevention (DLP)Basics of using Data Loss Prevention (DLP)Describe Records ManagementDescribe Retention Polices and Retention LabelsDescribe insider risk capabilities in Microsoft PurviewDescribe Insider Risk ManagementDescribe communication complianceDescribe information barriersDescribe resource governance capabilities in AzureDescribe Azure PolicyDescribe Azure BlueprintsDescribe the capabilities of the Microsoft Purview governance portalFinishing UpWhere do I go from here? Overview Section 1: Introduction Lecture 1 Welcome to the course! Lecture 2 Understanding the Microsoft Environment Lecture 3 Having a Solid Foundation of Active Directory Domains Lecture 4 Having a Solid Foundation of RAS, DMZ, and Virtualization Lecture 5 Having a Solid Foundation of the Microsoft Cloud Services Lecture 6 Udemy for B Students Lecture 7 DO NOT SKIP: Azure AD is being renamed Lecture 8 Questions for John Christopher Section 2: Performing hands on activities Lecture 9 IMPORTANT Using Assignments in the course Lecture 10 DONT SKIP: Before beginning your account setup Lecture 11 Creating a trial Microsoft 365/Azure Account Lecture 12 Getting your free Azure credit Section 3: Describe security and compliance concepts Lecture 13 Describe the shared responsibility model Lecture 14 Describe defense in depth Lecture 15 Describe the Zero-Trust model Lecture 16 Describe encryption and hashing Lecture 17 Describe compliance concepts Section 4: Define identity concepts Lecture 18 Define identity as the primary security perimeter Lecture 19 Define authentication Lecture 20 Define authorization Lecture 21 Describe identity providers and the concept of Federation Lecture 22 Describe Active Directory Section 5: Describe the basic identity services and identity types of Azure AD Lecture 23 Describe Azure AD Lecture 24 Describe Azure AD identities including external identities Lecture 25 Describe hybrid identity Section 6: Describe the authentication capabilities of Azure AD Lecture 26 Describe the authentication methods available in Azure AD Lecture 27 Describe Multi-factor Authentication Lecture 28 Implementing Describe Multi-factor Authentication Lecture 29 Describe self-service password reset Lecture 30 Describe password protection and management capabilities available in Azure AD Section 7: Describe access management capabilities of Azure AD Lecture 31 Describe conditional access Lecture 32 Creating conditional access polies Lecture 33 Describe the benefits of Azure AD roles Lecture 34 Describe the benefits of Azure AD role-based access control Section 8: Describe the identity protection and governance capabilities of Azure AD Lecture 35 Describe identity governance in Azure AD Lecture 36 Describe entitlement management Lecture 37 Describe access reviews Lecture 38 Describe the capabilities of Entra ID Privileged Identity Management (PIM) Lecture 39 Implementing Entra ID Privileged Identity Management (PIM) Lecture 40 Describe Entra Identity Protection (formerly Azure AD Identity Protection) Section 9: Describe basic security capabilities in Azure Lecture 41 Visualizing general Azure networking Lecture 42 Describe Azure DDoS protection Lecture 43 Describe Azure Firewall Lecture 44 Describe Web Application Firewall Lecture 45 Describe Network Segmentation with vNet Lecture 46 Describe Azure Network Security groups Lecture 47 Create a virtual machine in Azure Lecture 48 Describe Azure Bastion and JIT Access Lecture 49 Describe ways Azure encrypts data Section 10: Describe security management capabilities of Azure Lecture 50 Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM) Lecture 51 Describe the enhanced security features of Microsoft Defender for Cloud Lecture 52 Describe security baselines for Azure Section 11: Describe capabilities of Microsoft Sentinel Lecture 53 Define the concepts of security information and event management (SIEM) and SOAR Lecture 54 Describe threat detection and mitigation capabilities in Microsoft Sentinel Section 12: Describe threat protection with Microsoft 365 Defender Lecture 55 Describe Microsoft 365 Defender services Lecture 56 Describe Microsoft Defender for Office 365 Lecture 57 Describe Microsoft Defender for Endpoint Lecture 58 Describe Microsoft Defender for Cloud Apps Lecture 59 Using Microsoft Defender for Cloud Apps for policy creation Lecture 60 Describe Microsoft Defender for Identity Lecture 61 Basics of setting up Microsoft Defender for Identity Lecture 62 Describe the Microsoft 365 Defender portal Section 13: Describe Microsoft's Service Trust Portal and privacy principles Lecture 63 Describe the offerings of the Service Trust portal Lecture 64 Describe Microsoft's privacy principles Section 14: Describe the compliance management capabilities of Microsoft Purview Lecture 65 Describe the Microsoft Purview compliance portal Lecture 66 Describe compliance manager Lecture 67 Describe the use and benefits of compliance score Section 15: Describe information protection & data lifecycle management of Microsoft Purview Lecture 68 Describe data classification capabilities Lecture 69 Describe the benefits of content explorer and activity explorer Lecture 70 Describe sensitivity labels Lecture 71 Basics of using sensitivity labels Lecture 72 Describe Data Loss Prevention (DLP) Lecture 73 Basics of using Data Loss Prevention (DLP) Lecture 74 Describe Records Management Lecture 75 Describe Retention Polices and Retention Labels Section 16: Describe insider risk capabilities in Microsoft Purview Lecture 76 Describe Insider Risk Management Lecture 77 Describe communication compliance Lecture 78 Describe information barriers Section 17: Describe resource governance capabilities in Azure Lecture 79 Describe Azure Policy Lecture 80 Describe Azure Blueprints Lecture 81 Describe the capabilities of the Microsoft Purview governance portal Section 18: FINAL - Where do I go from here? Lecture 82 Getting your Udemy certificate for this course Lecture 83 BONUS Lecture IT people interested in learning and passing the Microsoft SC-900 exam!,IT people interested in learning a tremendous amount about security in Microsoft 365 / Azure Services Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |