Companies Home Search Profile

SC-900: Microsoft Security, Compliance and Identity

Focused View

Christopher Nett

5:05:50

0 View
  • 1 -Welcome.mp4
    00:52
  • 1 -christopher nett.zip
  • 1 -linkedin.zip
  • 2 - FAQs.html
  • 2 - IMPORTANT - Basics.html
  • 2 - IMPORTANT - Course Content.html
  • 2 - IMPORTANT - Demos.html
  • 1 -Cloud Computing Properties.mp4
    03:00
  • 2 -Cloud Computing Types.mp4
    02:12
  • 3 -Azure Global Backbone.mp4
    01:54
  • 4 -Shared Responsibility Model.mp4
    04:30
  • 5 -Azure Resource Hierarchy.mp4
    03:13
  • 6 -Azure Subscription Types.mp4
    02:03
  • 7 -Entra ID Tenants and Azure Subscriptions.mp4
    01:39
  • 1 -Demo Create your Azure Subscription.mp4
    00:59
  • 1 -create azure subscription.zip
  • 2 -Demo Activate and Assign Microsoft 365 E5.mp4
    01:49
  • 2 -get e5.zip
  • 1 -Complexity and Cyber Security Challenges.mp4
    09:24
  • 2 -What is a SOC.mp4
    03:53
  • 3 -SOC Tier Model.mp4
    03:11
  • 4 -Cyber Security Incident Response Process.mp4
    02:59
  • 5 -EDR, XDR, SIEM & SOAR.mp4
    04:50
  • 6 -Blue, Red & Purple Teaming.mp4
    04:32
  • 7 -What is a Vulnerability.mp4
    02:02
  • 8 -Common Vulnerabilities and Exposures (CVE).mp4
    02:37
  • 9 -Common Vulnerability Scoring System (CVSS).mp4
    05:05
  • 10 -Zero Trust.mp4
    03:40
  • 10 -microsoft zero trust.zip
  • 11 -The Microsoft Security Cosmos.mp4
    04:35
  • 12 -Defending Across Attack Chains.mp4
    03:09
  • 1 -Define identity as the primary security perimeter.mp4
    01:26
  • 2 -Define authentication (authN).mp4
    01:38
  • 3 -Define authorization (authZ).mp4
    01:34
  • 4 -Describe identity providers.mp4
    02:32
  • 5 -Describe the concept of directory services and Active Directory.mp4
    01:50
  • 6 -Describe the concept of federation.mp4
    01:48
  • 1 -Describe Microsoft Entra.mp4
    17:00
  • 2 -Describe Microsoft Entra ID.mp4
    09:27
  • 3 -Describe types of identities - Users.mp4
    02:44
  • 4 -Demo User Identities.mp4
    05:55
  • 4 -azure portal.zip
  • 5 -Describe types of identities - Managed Identities.mp4
    07:05
  • 6 -Demo Managed Identities.mp4
    09:20
  • 6 -azure portal.zip
  • 7 -Describe types of identities - External Identities.mp4
    06:49
  • 8 -Describe hybrid identity.mp4
    02:41
  • 2 -Attacks on Passwords.mp4
    05:13
  • 3 -Describe multi-factor authentication (MFA).mp4
    09:42
  • 4 -Describe Passwordless Authentication.mp4
    03:54
  • 5 -Describe password protection and management capabilities.mp4
    03:34
  • 6 -Self-Service Password Reset (SSPR).mp4
    04:29
  • 1 -Describe Microsoft Entra roles.mp4
    03:56
  • 2 -Describe Azure Role-Based-Acces-Control (RBAC).mp4
    12:31
  • 3 -Describe Conditional Access.mp4
    06:29
  • 1 -Describe Microsoft Entra ID Governance.mp4
    03:39
  • 2 -Describe access reviews.mp4
    05:12
  • 3 -Describe the capabilities of Microsoft Entra Privileged Identity Management.mp4
    06:34
  • 4 -Describe Microsoft Entra ID Protection.mp4
    13:53
  • 5 -Describe Microsoft Entra Permissions Management.mp4
    09:41
  • 1 -Describe Azure distributed denial-of-service (DDoS) Protection.mp4
    12:16
  • 2 -Describe Azure Firewall.mp4
    08:19
  • 3 -Demo Azure Firewall.mp4
    23:21
  • 3 -azure portal.zip
  • 4 -Describe Web Application Firewall (WAF).mp4
    09:30
  • 5 -Describe network security groups (NSGs).mp4
    08:42
  • 6 -Demo Configure NSGs.mp4
    10:58
  • 6 -azure portal.zip
  • Description


    Pass SC-900 | Elevate your Career

    What You'll Learn?


    • Describe security and compliance concepts
    • Define identity concepts
    • Describe function and identity types of Microsoft Entra ID
    • Describe authentication capabilities of Microsoft Entra ID
    • Describe access management capabilities of Microsoft Entra ID
    • Describe identity protection and governance capabilities of Microsoft Entra
    • Describe core infrastructure security services in Azure
    • Describe security management capabilities of Azure
    • Describe capabilities of Microsoft Sentinel
    • Describe threat protection with Microsoft Defender XDR
    • Describe Microsoft Service Trust Portal and privacy principles
    • Describe compliance management capabilities of Microsoft Purview
    • Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
    • Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview

    Who is this for?


  • SOC Analyst
  • Security Engineer
  • Security Consultant
  • Security Architect
  • Security Manager
  • Cloud Engineer
  • Cloud Architect
  • IT Manager
  • CISO
  • What You Need to Know?


  • Basic IT Knowledge
  • Willingness to learn cool stuff!
  • More details


    Description

    This SC-900 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the SC-900: Microsoft Security, Compliance and Identity exam. This course systematically guides you from the basics to advanced concepts of Microsoft Security, Compliance and Identity.

    By mastering Microsoft Security, Compliance and Identity, you're developing expertise in essential topics in today's cybersecurity landscape.

    The course is always aligned with Microsoft's latest study guide and exam objectives:

    Skills at a glance

    • Describe the concepts of security, compliance, and identity (10–15%)

    • Describe the capabilities of Microsoft Entra (25–30%)

    • Describe the capabilities of Microsoft security solutions (35–40%)

    • Describe the capabilities of Microsoft compliance solutions (20–25%)

    Describe the concepts of security, compliance, and identity (10–15%)

    Describe security and compliance concepts

    • Describe the shared responsibility model

    • Describe defense-in-depth

    • Describe the Zero Trust model

    • Describe encryption and hashing

    • Describe Governance, Risk, and Compliance (GRC) concepts

    Define identity concepts

    • Define identity as the primary security perimeter

    • Define authentication

    • Define authorization

    • Describe identity providers

    • Describe the concept of directory services and Active Directory

    • Describe the concept of federation

    Describe the capabilities of Microsoft Entra (25–30%)

    Describe function and identity types of Microsoft Entra ID

    • Describe Microsoft Entra ID

    • Describe types of identities

    • Describe hybrid identity

    Describe authentication capabilities of Microsoft Entra ID

    • Describe the authentication methods

    • Describe multi-factor authentication (MFA)

    • Describe password protection and management capabilities

    Describe access management capabilities of Microsoft Entra ID

    • Describe Conditional Access

    • Describe Microsoft Entra roles and role-based access control (RBAC)

    Describe identity protection and governance capabilities of Microsoft Entra

    • Describe Microsoft Entra ID Governance

    • Describe access reviews

    • Describe the capabilities of Microsoft Entra Privileged Identity Management

    • Describe Microsoft Entra ID Protection

    • Describe Microsoft Entra Permissions Management

    Describe the capabilities of Microsoft security solutions (35–40%)

    Describe core infrastructure security services in Azure

    • Describe Azure distributed denial-of-service (DDoS) Protection

    • Describe Azure Firewall

    • Describe Web Application Firewall (WAF)

    • Describe network segmentation with Azure virtual networks

    • Describe network security groups (NSGs)

    • Describe Azure Bastion

    • Describe Azure Key Vault

    Describe security management capabilities of Azure

    • Describe Microsoft Defender for Cloud

    • Describe Cloud Security Posture Management (CSPM)

    • Describe how security policies and initiatives improve the cloud security posture

    • Describe enhanced security features provided by cloud workload protection

    Describe capabilities of Microsoft Sentinel

    • Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)

    • Describe threat detection and mitigation capabilities in Microsoft Sentinel

    Describe threat protection with Microsoft Defender XDR

    • Describe Microsoft Defender XDR services

    • Describe Microsoft Defender for Office 365

    • Describe Microsoft Defender for Endpoint

    • Describe Microsoft Defender for Cloud Apps

    • Describe Microsoft Defender for Identity

    • Describe Microsoft Defender Vulnerability Management

    • Describe Microsoft Defender Threat Intelligence (Defender TI)

    • Describe the Microsoft Defender portal

    Describe the capabilities of Microsoft compliance solutions (20–25%)

    Describe Microsoft Service Trust Portal and privacy principles

    • Describe the Service Trust Portal offerings

    • Describe the privacy principles of Microsoft

    • Describe Microsoft Priva

    Describe compliance management capabilities of Microsoft Purview

    • Describe the Microsoft Purview compliance portal

    • Describe Compliance Manager

    • Describe the uses and benefits of compliance score

    Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview

    • Describe the data classification capabilities

    • Describe the benefits of Content explorer and Activity explorer

    • Describe sensitivity labels and sensitivity label policies

    • Describe data loss prevention (DLP)

    • Describe records management

    • Describe retention policies, retention labels, and retention label policies

    • Describe unified data governance solutions in Microsoft Purview

    Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview

    • Describe insider risk management

    • Describe eDiscovery solutions in Microsoft Purview

    • Describe audit solutions in Microsoft Purview


    Who this course is for:

    • SOC Analyst
    • Security Engineer
    • Security Consultant
    • Security Architect
    • Security Manager
    • Cloud Engineer
    • Cloud Architect
    • IT Manager
    • CISO

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Christopher Nett
    Christopher Nett
    Instructor's Courses
    Christopher is security cloud solutions architect at Microsoft.Christopher has over 9 years of experience in cyber security, where he has advised some of the largest enterprises in the world on multi-million dollar projects.Education:★ MSc. Applied IT Security★ MBA★ BSc. Computer Science for BusinessCertifications:★ CISSP : Certified Information Systems Security Professional★ CCSP: Certified Cloud Security Professional★ CEH : Certified Ethical Hacker★ AZ-104: Azure Administrator Associate★ AZ-500: Azure Security Engineer Associate★ AZ-700: Azure Network Engineer Associate★ SC-100: Cybersecurity Architect Expert★ SC-200: Security Operations Analyst Associate★ SC-300: Identity and Access Administrator Associate★ KCNA: Kubernetes and Cloud Native Associate★ CKAD: Certified Kubernetes Application Developer★ CKA: Certified Kubernetes Administrator★ ATT&CK® Security Operations Center Assessment Certification★ ATT&CK Purple Teaming Methodology Certification★ ATT&CK® Adversary Emulation Methodology Certification★ ATT&CK® Cyber Threat Intelligence Certification★ HashiCorp Certified: Terraform Associate (002)★ Professional Scrum Master I★ Professional Scrum Product Owner I★ AWS Certified Security – Specialty★ AWS Certified Solutions Architect – Associate★ CCSK - Certificate of Cloud Security Knowledge
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 55
    • duration 5:05:50
    • Release Date 2025/02/27

    Courses related to Cyber Security