![]() |
Udemy Pathway to Microsoft Cybersecurity Architect - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy Pathway to Microsoft Cybersecurity Architect (/Thread-Udemy-Pathway-to-Microsoft-Cybersecurity-Architect) |
Udemy Pathway to Microsoft Cybersecurity Architect - AD-TEAM - 12-03-2024 ![]() 3.95 GB | 24min 46s | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 - About course.mp4 (81.13 MB) 2 - Cybersecurity Architecture and Architect.mp4 (15.23 MB) 3 - Start with Microsoft Security Best Practices.mp4 (34.23 MB) 4 - Common security antipatterns.mp4 (165.71 MB) 74 - Section objectives.mp4 (8.78 MB) 75 - Core Microsoft 365 Services and Apps.mp4 (13.77 MB) 76 - Licensing consideration for Microsoft 365 security.mp4 (10.44 MB) 77 - Licensing consideration for Office 365 security.mp4 (21.57 MB) 78 - Design configuration and Operational Practices for M365.mp4 (66.44 MB) 79 - Importance of Microsoft Purview in M365 security.mp4 (60.01 MB) 80 - Data security and compliance controls using copilot.mp4 (12.22 MB) 81 - Evaluate and assess security posture for M365.mp4 (20.57 MB) 82 - Section objectives.mp4 (5.65 MB) 83 - DevOps security.mp4 (54.71 MB) 84 - Design standards to secure application development.mp4 (57.84 MB) 85 - Evaluate security posture of existing application portfolios.mp4 (27.52 MB) 86 - Evaluate application threats with threat modelling.mp4 (17.5 MB) 87 - Design security lifecycle strategy for applications.mp4 (8.92 MB) 88 - Secure access for workload identities.mp4 (8.46 MB) 89 - Design solution for API management and security.mp4 (12.92 MB) 90 - Design solution for secure access to applications.mp4 (36.22 MB) 91 - Section objectives.mp4 (3.44 MB) 92 - Best practices for data security.mp4 (8.27 MB) 93 - Evaluate solutions for data discovery and classification.mp4 (17.55 MB) 94 - Defense in depth in Microsoft Purview.mp4 (24.03 MB) 95 - Evaluate solutions for encryption of Azure data.mp4 (12.91 MB) 96 - Design data security for Azure SQL workloads.mp4 (22.26 MB) 97 - Design security for Azure storage.mp4 (42.28 MB) 98 - Microsoft Defender for Azure Storage and SQL.mp4 (35.45 MB) 100 - Shared responsibility model in the cloud.mp4 (13.65 MB) 101 - Security baselines for IaaS and PaaS services.mp4 (17.1 MB) 102 - Security baselines for IoT workloads.mp4 (24.17 MB) 103 - Security baselines for web workloads.mp4 (17.4 MB) 104 - Security baselines for containers and orchestration.mp4 (32.32 MB) 105 - Security baselines for AI workloads.mp4 (31.44 MB) 99 - Section objectives.mp4 (7.44 MB) 106 - Section objectives.mp4 (3.57 MB) 107 - What is Microsoft Defender for Cloud.mp4 (15.31 MB) 108 - Understand Cloud Security Posture Management CSPM.mp4 (15.39 MB) 109 - Understand Cloud Workload Protection CWP.mp4 (26.96 MB) 110 - Microsoft Defender for Cloud planning and operations.mp4 (15.87 MB) 111 - Evaluate security posture by using defender for cloud.mp4 (19.04 MB) 112 - Integrate hybrid and multicloud environments with Arc.mp4 (17.54 MB) 113 - Design solution for external attack surface management.mp4 (33.81 MB) 114 - Section objectives.mp4 (6.85 MB) 115 - Endpoint security.mp4 (13.87 MB) 116 - Server security requirements.mp4 (166.59 MB) 117 - Mobile devices security requirements.mp4 (21.54 MB) 118 - IoT security requirements.mp4 (25.84 MB) 119 - Secure OTIoT with Defender for IoT.mp4 (14.12 MB) 120 - Windows Security baselines for server and client endpoints.mp4 (10.14 MB) 121 - Design solution for secure remote access.mp4 (12.31 MB) 122 - Evaluate Windows local admin password solutions LAPS.mp4 (10.8 MB) 123 - Section objectives.mp4 (4.47 MB) 124 - Design solutions for network segmentation.mp4 (37.71 MB) 125 - Design solutions for traffic filtering with NSG.mp4 (20.4 MB) 126 - Solution for network posture management.mp4 (14.49 MB) 127 - Solutions for network monitoring.mp4 (13.17 MB) 128 - Solutions that use Microsoft Entra Internet Access.mp4 (15.64 MB) 129 - Solutions that use Microsoft Entra Private Access.mp4 (11.35 MB) 10 - Zero Trust Architecture.mp4 (12.55 MB) 11 - Zero Trust RaMP Initiatives.mp4 (93.98 MB) 12 - Zero Trust Deployment Objectives.mp4 (264.72 MB) 5 - Section objectives.mp4 (8.36 MB) 6 - What is Perimeter Security Model.mp4 (28.66 MB) 7 - What is Zero Trust Security Model.mp4 (17.49 MB) 8 - Zero Trust as a security strategy.mp4 (8.83 MB) 9 - Zero Trust components.mp4 (13.83 MB) 13 - Section objectives.mp4 (3.04 MB) 14 - Explore Microsoft Cloud Adoption Framework CAF.mp4 (66.82 MB) 15 - Cloud Adoption Framework CAF Secure Methodology.mp4 (35.78 MB) 16 - Discuss Azure Landing Zones.mp4 (34.95 MB) 17 - Security elements in Azure Landing Zones.mp4 (107.84 MB) 18 - What is WellArchitected Framework.mp4 (66.6 MB) 19 - Well Architected Framework Security Pillars.mp4 (26.26 MB) 20 - Section objectives.mp4 (4.52 MB) 21 - Overview of Microsoft Cybersecurity Reference ArchitectureMCRA.mp4 (81.93 MB) 22 - Overview of Microsoft Cloud Security Benchmark MCSB.mp4 (106.96 MB) 23 - Capabilities and controls with MCRA.mp4 (12.14 MB) 24 - Capabilities and controls with MCSB.mp4 (44.52 MB) 25 - Attack protection with MCRA.mp4 (14.53 MB) 26 - Attack protection with MCSB.mp4 (12.32 MB) 27 - Section Objectives.mp4 (4.78 MB) 28 - Discuss common cyberthreats and attack patterns.mp4 (38.32 MB) 29 - Understand attack chain modeling.mp4 (39.43 MB) 30 - How to support business resiliency.mp4 (13.09 MB) 31 - Design solutions for mitigating ransomware attacks.mp4 (21.35 MB) 32 - Design solutions for business continuity and Disaster Recovery.mp4 (27.74 MB) 33 - Explore solution for security updates.mp4 (16.06 MB) 34 - Section Objectives.mp4 (5 MB) 35 - Overview of regulatory compliance.mp4 (25.26 MB) 36 - Explore important regulatory compliance standards.mp4 (56.84 MB) 37 - Translate compliance requirements into security controls.mp4 (28.9 MB) 38 - Address compliance requirements using Microsoft Purview.mp4 (39.42 MB) 39 - Address privacy requirements with Microsoft Priva.mp4 (49.37 MB) 40 - Address security and compliance requirements using Azure Policy.mp4 (49.45 MB) 41 - Validate alignment with regulatory standards using Microsoft Defender for cloud.mp4 (62.36 MB) 42 - Section objectives.mp4 (13.53 MB) 43 - What is IAM and its function.mp4 (37.56 MB) 44 - Active Directory based services in Azure.mp4 (12.9 MB) 45 - User Management AD Vs Entra ID.mp4 (15.14 MB) 46 - IAM design recommendations.mp4 (22.82 MB) 47 - External identities and solutions.mp4 (18.59 MB) 48 - Modern authentication and authorization strategies.mp4 (24.66 MB) 49 - Microsoft Entra Identity Protection.mp4 (20.28 MB) 50 - Align conditional access and Zero Trust.mp4 (12.75 MB) 51 - Protecting Human and nonhuman identities.mp4 (19.75 MB) 52 - Harden Active Directory Domain Services.mp4 (21.67 MB) 53 - Design Cloud Key Management Plan.mp4 (57.71 MB) 54 - Section objectives.mp4 (3.97 MB) 55 - Types of access.mp4 (19.93 MB) 56 - Understand enterprise access model.mp4 (31.13 MB) 57 - Azure Privilege Identity Management.mp4 (18.66 MB) 58 - Privileged Access Management.mp4 (17.6 MB) 59 - Tenant management with Azure Lighthouse.mp4 (22.04 MB) 60 - Solution for cloud infrastructure entitlement management.mp4 (15.82 MB) 61 - Solution for privileged access workstations and bastion services.mp4 (71.52 MB) 62 - Section objectives.mp4 (9.19 MB) 63 - Define Security Operations SecOps strategy.mp4 (47.03 MB) 64 - Discuss security operations team structure.mp4 (9.56 MB) 65 - Security Operation Center Modernization.mp4 (35.19 MB) 66 - Security Operation Team composition.mp4 (19.92 MB) 67 - Design unified security operation strategy.mp4 (29.66 MB) 68 - what is EDR XDR SIEM and SOAR.mp4 (21.75 MB) 69 - Design centralized logging solution for security operation.mp4 (65.28 MB) 70 - Microsoft Defender XDR architecture.mp4 (19.34 MB) 71 - Microsoft Sentinel and defender architecture as a SIEM and SOAR.mp4 (33.94 MB) 72 - Explore key security workflows.mp4 (26.7 MB) 73 - what is MITRE ATTCK and discuss sentinel integration.mp4 (96.15 MB)] Screenshot ![]() |