Companies Home Search Profile

SC-900 Microsoft Security, Compliance, and Identity Fundamentals

Focused View

7:04:55

57 View
  • 00001 Course Introduction.mp4
    04:28
  • 00002 Security Concepts and Methodologies - Introduction.mp4
    01:09
  • 00003 Zero Trust - Guidelines.mp4
    02:33
  • 00004 Zero Trust Six Foundational Pillars.mp4
    03:48
  • 00005 The Shared Responsibility Models.mp4
    05:32
  • 00006 Defense in Depth Strategy.mp4
    03:00
  • 00007 The CIA Triad.mp4
    05:52
  • 00008 Describe Common Threats.mp4
    05:35
  • 00009 Describe Encryption Hashing and Signing - I.mp4
    04:10
  • 00010 Describe Encryption Hashing and Signing II.mp4
    03:43
  • 00011 Summary.mp4
    01:13
  • 00012 Microsoft Security and Compliance principles - Introduction.mp4
    00:41
  • 00013 Microsoft s Privacy Principles.mp4
    02:00
  • 00014 What is Service Trust Portal.mp4
    01:41
  • 00015 Azure Compliance Documentation.mp4
    01:29
  • 00016 Module 1 - Section Summary.mp4
    00:23
  • 00017 Describe Identity Concepts - Introduction.mp4
    01:02
  • 00018 Common Identity Attacks.mp4
    04:46
  • 00019 Identity as a Security perimeter.mp4
    04:13
  • 00020 Four Pillars of Identity.mp4
    06:13
  • 00021 Modern Authentication and the Role of Identity Provider.mp4
    03:03
  • 00022 SSO and the Concept of Federation.mp4
    03:59
  • 00023 The Concept of Directory Services and Active Directory.mp4
    03:30
  • 00024 Describe the Basic Services and Identity Types Introduction.mp4
    01:09
  • 00025 Describe Azure Active Directory.mp4
    03:21
  • 00026 Azure AD Editions.mp4
    03:59
  • 00027 Describe the Azure AD Identity types.mp4
    08:09
  • 00028 Difference between System Assigned and User Assigned Managed Identity.mp4
    03:09
  • 00029 Describe the Types of External Identities.mp4
    05:14
  • 00030 Describe the Concept of Hybrid Identities.mp4
    03:58
  • 00031 Describe the Authentication Capabilities of Azure Introduction.mp4
    01:18
  • 00032 Describe the Different Authentication Methods.mp4
    02:52
  • 00033 Security Defaults and MFA.mp4
    04:17
  • 00035 Video 3.2 - MFA in Azure AD - Part 2.mp4
    02:57
  • 00036 Windows Hello.mp4
    03:06
  • 00037 Why is Windows Hello Safer than a Password.mp4
    01:58
  • 00038 Self-Service Password Reset in Azure AD.mp4
    05:14
  • 00039 Password Protection and Management Capabilities of Azure AD.mp4
    05:04
  • 00040 Protecting against Password Spray.mp4
    02:04
  • 00041 Hybrid security.mp4
    02:12
  • 00042 Describe the Access Management Capabilities of Azure AD.mp4
    01:06
  • 00043 Conditional Access in Azure AD.mp4
    03:58
  • 00044 Conditional Access in Azure AD II.mp4
    05:54
  • 00045 Conditional Access in Azure AD III.mp4
    02:39
  • 00046 Azure AD Roles and Custom Roles.mp4
    03:28
  • 00047 Summary.mp4
    00:54
  • 00048 Describe the Identity Protection and Governance Capabilities of Azure AD.mp4
    00:59
  • 00049 What is Identity Governance.mp4
    01:23
  • 00050 What is Identity Lifecycle.mp4
    03:49
  • 00051 Access Lifecycle.mp4
    01:38
  • 00052 Privileged Access lifecycle.mp4
    02:18
  • 00053 What is Entitlement Management.mp4
    02:36
  • 00054 Azure AD Access Reviews.mp4
    02:40
  • 00055 Azure AD Terms of Use.mp4
    02:12
  • 00056 Capabilities of Privileged Identity Management.mp4
    02:39
  • 00057 Module Introduction.mp4
    01:56
  • 00058 Network Security Groups.mp4
    03:08
  • 00059 Inbound and Outbound Security Rules.mp4
    04:01
  • 00060 What is DDOS.mp4
    02:36
  • 00061 Azure DDOS Protection Plans and Pricing.mp4
    02:57
  • 00062 Azure Firewall.mp4
    04:03
  • 00063 Azure Bastion Host.mp4
    04:03
  • 00064 Web Application Firewall.mp4
    02:01
  • 00065 Azure Encryption.mp4
    02:40
  • 00066 Azure Key Vault.mp4
    02:09
  • 00067 Lesson Summary.mp4
    01:43
  • 00068 Cloud Security Posture Management.mp4
    04:22
  • 00069 Azure Security Center.mp4
    03:44
  • 00070 Azure Security Center Features.mp4
    04:11
  • 00071 Azure Security Center - Security Score.mp4
    02:32
  • 00072 Azure Defender.mp4
    05:36
  • 00073 Azure Security Benchmark.mp4
    04:34
  • 00074 Azure Security Center - Pricing Tier.mp4
    01:25
  • 00075 Summary.mp4
    01:20
  • 00076 Describe the Security Capabilities of Azure Sentinel.mp4
    01:43
  • 00077 Define the Concepts of SIEM SOAR and XDR.mp4
    05:54
  • 00078 Azure Sentinel.mp4
    02:21
  • 00079 Azure Sentinel Features.mp4
    05:36
  • 00080 Azure Sentinel Pricing.mp4
    01:12
  • 00081 Summary.mp4
    00:58
  • 00082 Describe the Threat Protection Capabilities of Microsoft 365 Introduction.mp4
    01:36
  • 00083 Microsoft 365 Defender Services Introduction.mp4
    03:08
  • 00084 Microsoft Defender for Identity.mp4
    04:50
  • 00085 Microsoft Defender for O365.mp4
    05:11
  • 00086 Microsoft Defender for Endpoint.mp4
    04:28
  • 00087 What is CASB.mp4
    03:26
  • 00088 The Cloud App Security Framework.mp4
    01:51
  • 00089 Microsoft Cloud App Security Architecture.mp4
    02:34
  • 00090 O365 Cloud App Security and Azure AD Cloud App Discovery.mp4
    01:24
  • 00091 Summary.mp4
    01:25
  • 00092 Security Management Capabilities of M365 Introduction.mp4
    01:34
  • 00093 Microsoft 365 Security Center Introduction.mp4
    04:55
  • 00094 How to Use Microsoft Secure Score.mp4
    02:36
  • 00095 Differences Between Azure and Microsoft Secure Score.mp4
    01:27
  • 00096 Managing Incidents.mp4
    01:56
  • 00097 Summary.mp4
    00:40
  • 00098 Describe Endpoint Security with Microsoft Intune Introduction.mp4
    00:25
  • 00099 What is Intune.mp4
    01:58
  • 00100 MDM and MAM.mp4
    02:40
  • 00101 Endpoint Security with Intune.mp4
    06:44
  • 00102 Summary.mp4
    01:25
  • 00103 Module introduction.mp4
    01:29
  • 00104 Common Compliance Needs.mp4
    02:09
  • 00105 Common Compliance Regulations.mp4
    02:42
  • 00106 Compliance Center.mp4
    02:26
  • 00107 What is Compliance Manager.mp4
    01:50
  • 00108 What are Controls.mp4
    01:12
  • 00109 What are Assessments.mp4
    02:19
  • 00110 Understand Compliance score.mp4
    03:10
  • 00111 Summary.mp4
    00:53
  • 00112 The Information Protection and Governance Capabilities of Microsoft 365.mp4
    01:18
  • 00113 Know Your Data Protect Your Data and Govern Your Data.mp4
    02:55
  • 00114 Data Classification Capabilities of Compliance Center.mp4
    05:08
  • 00115 Content Explorer and Activity Explorer.mp4
    04:00
  • 00116 Sensitivity Labels.mp4
    04:45
  • 00117 Label Policies.mp4
    02:41
  • 00118 Data Loss Prevention.mp4
    03:11
  • 00119 Data Loss Prevention on Endpoints and Teams.mp4
    02:19
  • 00120 Retention Polices and Retention Labels.mp4
    04:05
  • 00121 Records Management.mp4
    02:33
  • 00122 Summary.mp4
    01:01
  • 00123 The Insider Risk Capabilities in Microsoft Introduction.mp4
    01:04
  • 00124 Insider Risk Management.mp4
    02:32
  • 00125 Insider Risk Management Workflow.mp4
    02:55
  • 00126 Communications Compliance.mp4
    04:40
  • 00127 Information Barriers in Microsoft Teams.mp4
    02:30
  • 00128 Privileged Access Management.mp4
    04:00
  • 00129 Customer Lockbox.mp4
    03:58
  • 00130 Summary.mp4
    01:14
  • 00131 eDiscovery Capabilities of Microsoft M365 Introduction.mp4
    01:00
  • 00132 The Purpose of eDiscovery.mp4
    01:40
  • 00133 The Capabilities of the Content Search.mp4
    05:13
  • 00134 The Core eDiscovery Workflow.mp4
    06:28
  • 00135 The Advanced eDiscovery Workflow.mp4
    03:36
  • 00136 Summary.mp4
    00:58
  • 00137 The Audit Capabilities of Microsoft 365 - Introduction.mp4
    00:47
  • 00138 The Core Audit Capabilities of M365.mp4
    03:35
  • 00139 What are the Advanced Auditing Capabilities.mp4
    05:12
  • 00140 High Bandwidth for Office 365 API Activities.mp4
    01:54
  • 00141 Summary.mp4
    01:04
  • 00142 Describe the Resource Governance Capabilities - Introduction.mp4
    00:56
  • 00143 Resource Manager Locks.mp4
    02:06
  • 00144 What is Azure Blueprint.mp4
    02:52
  • 00145 What is Azure Policy.mp4
    03:33
  • 00146 Difference between Azure Policy and RBAC.mp4
    01:44
  • 00147 Cloud Adoption Framework.mp4
    02:03
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    O'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
    • language english
    • Training sessions 146
    • duration 7:04:55
    • Release Date 2023/11/06

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness