Companies Home Search Profile

SC-900: Microsoft Security, Compliance, & Identity with SIMS

Focused View

John Christopher

9:50:39

83 View
  • 1 - Welcome to the course.mp4
    04:06
  • 2 - Understanding the Microsoft Environment.mp4
    01:50
  • 3 - Having a Solid Foundation of Active Directory Domains.mp4
    10:34
  • 4 - Having a Solid Foundation of RAS DMZ and Virtualization.mp4
    13:12
  • 5 - Having a Solid Foundation of the Microsoft Cloud Services.mp4
    12:27
  • 6 - Questions for John Christopher.mp4
    05:42
  • 7 - IMPORTANT Using Assignments in the course.mp4
    05:18
  • 8 - Creating a free Microsoft 365 Azure AD Account.mp4
    05:38
  • 9 - Getting your free Azure credit.mp4
    03:32
  • 10 - Describe the shared responsibility model.mp4
    07:18
  • 10 - shared-responsibility-model.zip
  • 11 - Describe defense in depth.mp4
    04:44
  • 11 - defense-in-depth.zip
  • 12 - Describe the ZeroTrust model.mp4
    07:12
  • 12 - zero-trust-model.zip
  • 13 - Describe encryption and hashing.mp4
    06:30
  • 14 - Describe compliance concepts.mp4
    02:07
  • 15 - Define identity as the primary security perimeter.mp4
    05:56
  • 16 - Define authentication.mp4
    05:48
  • 17 - Define authorization.mp4
    06:10
  • 18 - Describe identity providers and the concept of Federation.mp4
    03:24
  • 19 - Describe Active Directory.mp4
    06:47
  • 19 - domain-and-cloud-drawing.zip
  • 20 - Describe Azure AD.mp4
    05:03
  • 21 - Describe Azure AD identities including external identities.mp4
    15:16
  • 22 - Describe hybrid identity.mp4
    08:40
  • 22 - Planning-for-Microsoft-365-On-Premises-Infrastructure.pdf
  • 23 - Describe the authentication methods available in Azure AD.mp4
    08:01
  • 23 - Passwordless-Based-Authentication.pdf
  • 24 - Describe Multifactor Authentication.mp4
    09:11
  • 25 - Describe selfservice password reset.mp4
    05:05
  • 26 - Describe password protection and management capabilities available in Azure AD.mp4
    05:31
  • 27 - Describe conditional access.mp4
    07:33
  • 28 - Assigning-Roles.pdf
  • 28 - Describe the benefits of Azure AD roles.mp4
    11:39
  • 29 - Describe the benefits of Azure AD rolebased access control.mp4
    21:05
  • 30 - Describe identity governance in Azure AD.mp4
    06:12
  • 31 - Describe entitlement management.mp4
    04:18
  • 32 - Describe access reviews.mp4
    07:49
  • 33 - Describe the capabilities of Azure AD Privileged Identity Management PIM.mp4
    13:33
  • 33 - Privledged-Identity-Management.pdf
  • 34 - Implementing Azure AD Privileged Identity Management PIM.mp4
    08:38
  • 35 - Describe Azure AD Identity Protection.mp4
    05:30
  • 36 - Visualizing general Azure networking.mp4
    24:47
  • 36 - vnets-and-subnets.zip
  • 37 - Describe Azure DDoS protection.mp4
    03:39
  • 38 - Describe Azure Firewall.mp4
    21:28
  • 39 - Describe Network Segmentation with vNet.mp4
    08:48
  • 40 - Describe Azure Network Security groups.mp4
    19:21
  • 41 - Create a virtual machine in Azure.mp4
    21:04
  • 42 - Describe Azure Bastion and JIT Access.mp4
    10:26
  • 43 - Describe ways Azure encrypts data.mp4
    03:05
  • 44 - Describe Microsoft Defender for Cloud Cloud security posture management CSPM.mp4
    06:12
  • 45 - Describe the enhanced security features of Microsoft Defender for Cloud.mp4
    03:14
  • 46 - Describe security baselines for Azure.mp4
    03:53
  • 47 - Azure-Sentinel.pdf
  • 47 - Define the concepts of SIEM and SOAR.mp4
    09:28
  • 48 - Setting up a log analytics workspace for using Sentinel.mp4
    00:40
  • 49 - Describe how Microsoft Sentinel provides integrated threat management.mp4
    14:49
  • 50 - Describe Microsoft 365 Defender services.mp4
    05:20
  • 51 - Describe Microsoft Defender for Office 365.mp4
    09:47
  • 52 - Describe Microsoft Defender for Endpoint.mp4
    09:24
  • 52 - Microsoft-Defender-for-Endpoint.pdf
  • 53 - Defender-for-Cloud-Apps.pdf
  • 53 - Describe Microsoft Defender for Cloud Apps.mp4
    11:34
  • 54 - Using Microsoft Defender for Cloud Apps for policy creation.mp4
    14:54
  • 55 - Describe Microsoft Defender for Identity.mp4
    10:21
  • 56 - Basics of setting up Microsoft Defender for Identity.mp4
    03:47
  • 57 - Describe the Microsoft 365 Defender portal.mp4
    05:21
  • 58 - Describe the offerings of the Service Trust portal.mp4
    03:08
  • 59 - Describe Microsofts privacy principles.mp4
    04:54
  • 60 - Describe the Microsoft Purview compliance portal.mp4
    04:13
  • 61 - Describe compliance manager.mp4
    05:57
  • 62 - Describe the use and benefits of compliance score.mp4
    03:55
  • 63 - Describe data classification capabilities.mp4
    04:34
  • 64 - Describe the benefits of content explorer and activity explorer.mp4
    02:52
  • 65 - Describe sensitivity labels.mp4
    09:12
  • 65 - Sensitivity-Labels.pdf
  • 66 - Basics of using sensitivity labels.mp4
    08:02
  • 67 - Describe Data Loss Prevention DLP.mp4
    06:28
  • 67 - Understanding-DLP.pdf
  • 68 - Basics of using Data Loss Prevention DLP.mp4
    05:38
  • 69 - Describe Records Management.mp4
    04:31
  • 70 - Describe Retention Polices and Retention Labels.mp4
    06:04
  • 71 - Describe Insider Risk Management.mp4
    02:42
  • 72 - Describe communication compliance.mp4
    02:17
  • 73 - Describe information barriers.mp4
    05:15
  • 74 - Describe Azure Policy.mp4
    19:25
  • 75 - Describe Azure Blueprints.mp4
    05:40
  • 76 - Describe the capabilities of the Microsoft Purview governance portal.mp4
    03:11
  • Description


    Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7

    What You'll Learn?


    • Learn the concepts and perform hands on activities needed to pass the SC-900 exam
    • Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services
    • Get loads of hands on experience with securing Microsoft 365 / Azure Services
    • Utilize hands on simulations that can be access anytime, anywhere!

    Who is this for?


  • IT people interested in learning and passing the Microsoft SC-900 exam!
  • IT people interested in learning a tremendous amount about security in Microsoft 365 / Azure Services
  • More details


    Description

    We really hope you'll agree, this training is way more then the average course on Udemy!

    Have access to the following:

    • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

    • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

    • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

    TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

    Introduction

    • Welcome to the course

    • Understanding the Microsoft Environment

    • Having a Solid Foundation of Active Directory Domains

    • Having a Solid Foundation of RAS, DMZ, and Virtualization

    • Having a Solid Foundation of the Microsoft Cloud Services

    • Questions for John Christopher

    Performing hands on activities

    • IMPORTANT Using Assignments in the course

    • Creating a free Microsoft 365 Azure AD Account

    • Getting your free Azure credit

    Describe security and compliance concepts

    • Describe the shared responsibility model

    • Describe defense in depth

    • Describe the Zero-Trust model

    • Describe encryption and hashing

    • Describe compliance concepts

    Define identity concepts

    • Define identity as the primary security perimeter

    • Define authentication

    • Define authorization

    • Describe identity providers and the concept of Federation

    • Describe Active Directory

    Describe the basic identity services and identity types of Azure AD

    • Describe Azure AD

    • Describe Azure AD identities including external identities

    • Describe hybrid identity

    Describe the authentication capabilities of Azure AD

    • Describe the authentication methods available in Azure AD

    • Describe Multi-factor Authentication

    • Describe self-service password reset

    • Describe password protection and management capabilities available in Azure AD

    Describe access management capabilities of Azure AD

    • Describe conditional access

    • Describe the benefits of Azure AD roles

    • Describe the benefits of Azure AD role-based access control

    Describe the identity protection and governance capabilities of Azure AD

    • Describe identity governance in Azure AD

    • Describe entitlement management

    • Describe access reviews

    • Describe the capabilities of Azure AD Privileged Identity Management (PIM)

    • Implementing Azure AD Privileged Identity Management (PIM)

    • Describe Azure AD Identity Protection

    Describe basic security capabilities in Azure

    • Visualizing general Azure networking

    • Describe Azure DDoS protection

    • Describe Azure Firewall

    • Describe Network Segmentation with VNet

    • Describe Azure Network Security groups

    • Create a virtual machine in Azure

    • Describe Azure Bastion and JIT Access

    • Describe ways Azure encrypts data

    Describe security management capabilities of Azure

    • Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)

    • Describe the enhanced security features of Microsoft Defender for Cloud

    • Describe security baselines for Azure

    Describe security capabilities of Microsoft Sentinel

    • Define the concepts of SIEM and SOAR

    • Setting up a log analytics workspace for using Sentinel

    • Describe how Microsoft Sentinel provides integrated threat management

    Describe threat protection with Microsoft 365 Defender

    • Describe Microsoft 365 Defender services

    • Describe Microsoft Defender for Office 365

    • Describe Microsoft Defender for Endpoint

    • Describe Microsoft Defender for Cloud Apps

    • Using Microsoft Defender for Cloud Apps for policy creation

    • Describe Microsoft Defender for Identity

    • Basics of setting up Microsoft Defender for Identity

    • Describe the Microsoft 365 Defender portal

    Describe Microsoft’s Service Trust Portal and privacy principles

    • Describe the offerings of the Service Trust portal

    • Describe Microsoft’s privacy principles

    Describe the compliance management capabilities of Microsoft Purview

    • Describe the Microsoft Purview compliance portal

    • Describe compliance manager

    • Describe the use and benefits of compliance score

    Describe information protection & data lifecycle management of Microsoft Purview

    • Describe data classification capabilities

    • Describe the benefits of content explorer and activity explorer

    • Describe sensitivity labels

    • Basics of using sensitivity labels

    • Describe Data Loss Prevention (DLP)

    • Basics of using Data Loss Prevention (DLP)

    • Describe Records Management

    • Describe Retention Polices and Retention Labels

    Describe insider risk capabilities in Microsoft Purview

    • Describe Insider Risk Management

    • Describe communication compliance

    • Describe information barriers

    Describe resource governance capabilities in Azure

    • Describe Azure Policy

    • Describe Azure Blueprints

    • Describe the capabilities of the Microsoft Purview governance portal

    Finishing Up

    • Where do I go from here?


    Who this course is for:

    • IT people interested in learning and passing the Microsoft SC-900 exam!
    • IT people interested in learning a tremendous amount about security in Microsoft 365 / Azure Services

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    John Christopher
    John Christopher
    Instructor's Courses
    John Christopher is a Technical Instructor that has been in the business for over 20 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance in Atlanta GA. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company, located in Atlanta GA. in 2001.For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 76
    • duration 9:50:39
    • Release Date 2023/01/31