SC-900 Microsoft Security, Compliance, and Identity Fundamentals
Focused View
7:04:55
57 View
00001 Course Introduction.mp4
04:28
00002 Security Concepts and Methodologies - Introduction.mp4
01:09
00003 Zero Trust - Guidelines.mp4
02:33
00004 Zero Trust Six Foundational Pillars.mp4
03:48
00005 The Shared Responsibility Models.mp4
05:32
00006 Defense in Depth Strategy.mp4
03:00
00007 The CIA Triad.mp4
05:52
00008 Describe Common Threats.mp4
05:35
00009 Describe Encryption Hashing and Signing - I.mp4
04:10
00010 Describe Encryption Hashing and Signing II.mp4
03:43
00011 Summary.mp4
01:13
00012 Microsoft Security and Compliance principles - Introduction.mp4
00:41
00013 Microsoft s Privacy Principles.mp4
02:00
00014 What is Service Trust Portal.mp4
01:41
00015 Azure Compliance Documentation.mp4
01:29
00016 Module 1 - Section Summary.mp4
00:23
00017 Describe Identity Concepts - Introduction.mp4
01:02
00018 Common Identity Attacks.mp4
04:46
00019 Identity as a Security perimeter.mp4
04:13
00020 Four Pillars of Identity.mp4
06:13
00021 Modern Authentication and the Role of Identity Provider.mp4
03:03
00022 SSO and the Concept of Federation.mp4
03:59
00023 The Concept of Directory Services and Active Directory.mp4
03:30
00024 Describe the Basic Services and Identity Types Introduction.mp4
01:09
00025 Describe Azure Active Directory.mp4
03:21
00026 Azure AD Editions.mp4
03:59
00027 Describe the Azure AD Identity types.mp4
08:09
00028 Difference between System Assigned and User Assigned Managed Identity.mp4
03:09
00029 Describe the Types of External Identities.mp4
05:14
00030 Describe the Concept of Hybrid Identities.mp4
03:58
00031 Describe the Authentication Capabilities of Azure Introduction.mp4
01:18
00032 Describe the Different Authentication Methods.mp4
02:52
00033 Security Defaults and MFA.mp4
04:17
00035 Video 3.2 - MFA in Azure AD - Part 2.mp4
02:57
00036 Windows Hello.mp4
03:06
00037 Why is Windows Hello Safer than a Password.mp4
01:58
00038 Self-Service Password Reset in Azure AD.mp4
05:14
00039 Password Protection and Management Capabilities of Azure AD.mp4
05:04
00040 Protecting against Password Spray.mp4
02:04
00041 Hybrid security.mp4
02:12
00042 Describe the Access Management Capabilities of Azure AD.mp4
01:06
00043 Conditional Access in Azure AD.mp4
03:58
00044 Conditional Access in Azure AD II.mp4
05:54
00045 Conditional Access in Azure AD III.mp4
02:39
00046 Azure AD Roles and Custom Roles.mp4
03:28
00047 Summary.mp4
00:54
00048 Describe the Identity Protection and Governance Capabilities of Azure AD.mp4
00:59
00049 What is Identity Governance.mp4
01:23
00050 What is Identity Lifecycle.mp4
03:49
00051 Access Lifecycle.mp4
01:38
00052 Privileged Access lifecycle.mp4
02:18
00053 What is Entitlement Management.mp4
02:36
00054 Azure AD Access Reviews.mp4
02:40
00055 Azure AD Terms of Use.mp4
02:12
00056 Capabilities of Privileged Identity Management.mp4
02:39
00057 Module Introduction.mp4
01:56
00058 Network Security Groups.mp4
03:08
00059 Inbound and Outbound Security Rules.mp4
04:01
00060 What is DDOS.mp4
02:36
00061 Azure DDOS Protection Plans and Pricing.mp4
02:57
00062 Azure Firewall.mp4
04:03
00063 Azure Bastion Host.mp4
04:03
00064 Web Application Firewall.mp4
02:01
00065 Azure Encryption.mp4
02:40
00066 Azure Key Vault.mp4
02:09
00067 Lesson Summary.mp4
01:43
00068 Cloud Security Posture Management.mp4
04:22
00069 Azure Security Center.mp4
03:44
00070 Azure Security Center Features.mp4
04:11
00071 Azure Security Center - Security Score.mp4
02:32
00072 Azure Defender.mp4
05:36
00073 Azure Security Benchmark.mp4
04:34
00074 Azure Security Center - Pricing Tier.mp4
01:25
00075 Summary.mp4
01:20
00076 Describe the Security Capabilities of Azure Sentinel.mp4
01:43
00077 Define the Concepts of SIEM SOAR and XDR.mp4
05:54
00078 Azure Sentinel.mp4
02:21
00079 Azure Sentinel Features.mp4
05:36
00080 Azure Sentinel Pricing.mp4
01:12
00081 Summary.mp4
00:58
00082 Describe the Threat Protection Capabilities of Microsoft 365 Introduction.mp4
01:36
00083 Microsoft 365 Defender Services Introduction.mp4
03:08
00084 Microsoft Defender for Identity.mp4
04:50
00085 Microsoft Defender for O365.mp4
05:11
00086 Microsoft Defender for Endpoint.mp4
04:28
00087 What is CASB.mp4
03:26
00088 The Cloud App Security Framework.mp4
01:51
00089 Microsoft Cloud App Security Architecture.mp4
02:34
00090 O365 Cloud App Security and Azure AD Cloud App Discovery.mp4
01:24
00091 Summary.mp4
01:25
00092 Security Management Capabilities of M365 Introduction.mp4
01:34
00093 Microsoft 365 Security Center Introduction.mp4
04:55
00094 How to Use Microsoft Secure Score.mp4
02:36
00095 Differences Between Azure and Microsoft Secure Score.mp4
01:27
00096 Managing Incidents.mp4
01:56
00097 Summary.mp4
00:40
00098 Describe Endpoint Security with Microsoft Intune Introduction.mp4
00:25
00099 What is Intune.mp4
01:58
00100 MDM and MAM.mp4
02:40
00101 Endpoint Security with Intune.mp4
06:44
00102 Summary.mp4
01:25
00103 Module introduction.mp4
01:29
00104 Common Compliance Needs.mp4
02:09
00105 Common Compliance Regulations.mp4
02:42
00106 Compliance Center.mp4
02:26
00107 What is Compliance Manager.mp4
01:50
00108 What are Controls.mp4
01:12
00109 What are Assessments.mp4
02:19
00110 Understand Compliance score.mp4
03:10
00111 Summary.mp4
00:53
00112 The Information Protection and Governance Capabilities of Microsoft 365.mp4
01:18
00113 Know Your Data Protect Your Data and Govern Your Data.mp4
02:55
00114 Data Classification Capabilities of Compliance Center.mp4
05:08
00115 Content Explorer and Activity Explorer.mp4
04:00
00116 Sensitivity Labels.mp4
04:45
00117 Label Policies.mp4
02:41
00118 Data Loss Prevention.mp4
03:11
00119 Data Loss Prevention on Endpoints and Teams.mp4
02:19
00120 Retention Polices and Retention Labels.mp4
04:05
00121 Records Management.mp4
02:33
00122 Summary.mp4
01:01
00123 The Insider Risk Capabilities in Microsoft Introduction.mp4
01:04
00124 Insider Risk Management.mp4
02:32
00125 Insider Risk Management Workflow.mp4
02:55
00126 Communications Compliance.mp4
04:40
00127 Information Barriers in Microsoft Teams.mp4
02:30
00128 Privileged Access Management.mp4
04:00
00129 Customer Lockbox.mp4
03:58
00130 Summary.mp4
01:14
00131 eDiscovery Capabilities of Microsoft M365 Introduction.mp4
01:00
00132 The Purpose of eDiscovery.mp4
01:40
00133 The Capabilities of the Content Search.mp4
05:13
00134 The Core eDiscovery Workflow.mp4
06:28
00135 The Advanced eDiscovery Workflow.mp4
03:36
00136 Summary.mp4
00:58
00137 The Audit Capabilities of Microsoft 365 - Introduction.mp4
00:47
00138 The Core Audit Capabilities of M365.mp4
03:35
00139 What are the Advanced Auditing Capabilities.mp4
05:12
00140 High Bandwidth for Office 365 API Activities.mp4
01:54
00141 Summary.mp4
01:04
00142 Describe the Resource Governance Capabilities - Introduction.mp4
00:56
00143 Resource Manager Locks.mp4
02:06
00144 What is Azure Blueprint.mp4
02:52
00145 What is Azure Policy.mp4
03:33
00146 Difference between Azure Policy and RBAC.mp4
01:44
00147 Cloud Adoption Framework.mp4
02:03
More details
User Reviews
Rating
average 0
Focused display

O'Reilly
View courses O'ReillyO'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
- language english
- Training sessions 146
- duration 7:04:55
- Release Date 2023/11/06