Companies Home Search Profile

SC-900 Training: Microsoft Certified: Security, Compliance, and Identity Fundamentals

Focused View

James Conrad

13:17:19

272 View
  • 1. Zero-Trust, Foundational Elements, and Shared Responsibility.mp4
    15:37
  • 2. Foundational Elements.mp4
    11:45
  • 3. The Shared Responsibility Model.mp4
    17:00
  • 4. Security and Compliance Pop Quiz.mp4
    02:45
  • 5. Defense in Depth Pillars.mp4
    14:29
  • 6. Traditional Defense in Depth.mp4
    11:27
  • 7. Azure Defense in Depth.mp4
    12:28
  • 8. Windows Firewall.mp4
    08:32
  • 9. Phishing, Data Breaches, and Ransomware.mp4
    10:21
  • 10. Passwords and Cryptojacking.mp4
    11:06
  • 11. Scanning, Eavesdropping, and Man-in-the-Middle.mp4
    09:28
  • 12. Describe Encryption and Cloud Adoption Framework.mp4
    12:30
  • 13. Summary Quiz.mp4
    03:06
  • 14. Identity as the Primary Security Perimeter.mp4
    06:40
  • 15. Authentication, Authorization, and Accounting.mp4
    11:48
  • 16. Active Directory Features.mp4
    10:14
  • 17. Identity Providers and Federations.mp4
    10:49
  • 18. Define Identity Concepts Quiz.mp4
    09:04
  • 19. Describe What Azure Active Directory Is.mp4
    17:47
  • 20. Create an Azure Account.mp4
    17:09
  • 21. Hybrid Identity Synchronization.mp4
    13:58
  • 22. Joining to Azure Active Directory.mp4
    08:16
  • 23. Registering a Device to Azure Active Directory.mp4
    07:52
  • 24. Hybrid Join a Device.mp4
    02:18
  • 25. External Identity Types.mp4
    11:13
  • 26. Intune and Microsoft Endpoint Management.mp4
    15:08
  • 27. Azure Active Directory Password Protection.mp4
    08:04
  • 28. Self-Service Password Reset.mp4
    08:00
  • 29. Describe the Different Authentication Methods.mp4
    10:46
  • 30. Configure Authenticator and PIN.mp4
    04:33
  • 31. Authenticate with Picture Password.mp4
    03:45
  • 32. Authenticate with Fingerprint.mp4
    06:23
  • 33. Authenticate with Facial Recognition.mp4
    06:00
  • 34. Authenticate with a Security Key.mp4
    03:35
  • 35. Windows Hello for Business.mp4
    11:02
  • 36. Understand Identity Governance.mp4
    11:20
  • 37. Use Cases for Identity Governance.mp4
    05:33
  • 38. Create an Access Package.mp4
    12:28
  • 39. Describe the Capabilities of PIM.mp4
    13:22
  • 40. Describe Azure AD Identity Protection.mp4
    10:22
  • 41. Microsoft Defender For Cloud Apps.mp4
    14:50
  • 42. Microsoft Defender for Endpoint.mp4
    08:10
  • 43. Implementing Microsoft Defender for Identity.mp4
    03:59
  • 44. Integrating Microsoft Defender With Endpoint Manager.mp4
    04:59
  • 45. Configuring Endpoint Security.mp4
    08:57
  • 46. Disk Encryption and Firewall Policies.mp4
    05:30
  • 47. Attack Surface Reduction.mp4
    07:37
  • 48. Microsoft Defender For Cloud.mp4
    07:32
  • 49. Onboarding Non-Azure Servers To Defender For Cloud.mp4
    12:15
  • 50. SIEM, SOAR And XDR.mp4
    07:16
  • 51. Managing Identity Access In Azure.mp4
    13:50
  • 52. Security Baselines.mp4
    07:52
  • 53. Introduction To Azure Security Capabilities.mp4
    02:59
  • 54. Azure Network Security groups..mp4
    20:45
  • 55. Azure DDoS Protection.mp4
    10:31
  • 56. Azure Firewall.mp4
    05:41
  • 57. Azure Bastion.mp4
    08:51
  • 58. Azure Encryption And WAFs.mp4
    05:50
  • 59. Planning Intune Device Enrollment..mp4
    07:00
  • 60. Auto-Device Enrollment.mp4
    08:24
  • 61. Joining Devices to Azure AD.mp4
    06:06
  • 62. Endpoint Security.mp4
    10:52
  • 63. Conditional Access Policies.mp4
    09:42
  • 64. Attack Surface Reduction.mp4
    06:43
  • 65. Exploring The Microsoft 365 Defender Portal.mp4
    08:19
  • 66. Advanced Threat Hunting.mp4
    12:41
  • 67. Microsoft Secure Score.mp4
    14:06
  • 68. Exploring Security Reports.mp4
    11:25
  • 69. Working With eDiscovery.mp4
    10:04
  • 70. Using eDiscovery Content Search.mp4
    07:08
  • 71. Deleting Malicious Emails.mp4
    06:35
  • 72. Creating Audit Retention Policies.mp4
    07:51
  • 73. Usage Reports.mp4
    05:18
  • 74. Insider Risk Management.mp4
    12:11
  • 75. Data Classification.mp4
    05:54
  • 76. Data Loss Prevention Policies.mp4
    06:54
  • 77. Records Management.mp4
    12:03
  • 78. Configuring Retention Policies.mp4
    11:49
  • 79. Protecting Documents With Sensitivity Labels.mp4
    08:26
  • 80. Using Content Search To Explore User Activity.mp4
    05:12
  • 81. Planning Compliance Solutions.mp4
    06:41
  • 82. Planning For Device Compliance.mp4
    06:38
  • 83. Configuring Device Compliance.mp4
    05:39
  • 84. Communication Compliance Policies.mp4
    06:14
  • 85. Understanding Your Compliance Score.mp4
    10:18
  • 86. Securing Information And Resources.mp4
    11:39
  • Description


    This foundational Microsoft Certified: Security, Compliance, and Identity Fundamentals training covers the objectives in the SC-900 exam, which is the one required exam to earn the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

    It's hard to overstate how important security, compliance and identity are to network stability and reliability. Those three concepts are so important that everyone who touches a network's operations – from administrators to managers to executive stakeholders – should consider training in the basic concepts around security, compliance and identity (SCI). This Microsoft Certified: Security, Compliance, and Identity Fundamentals training prepares learners for passing the SC-900 and earning an entry-level certification, but the knowledge within it is highly valuable for anyone who makes decisions that affect networks and their security.

    More details


    For anyone who manages security technicians, this Microsoft training can be used for SC-900 exam prep, onboarding new security technicians, individual or team training plans, or as a Microsoft reference resource.

    SC-900: What You Need to Know

    This Microsoft Certified: Security, Compliance, and Identity Fundamentals training has videos that cover topics such as:

    • Fundamental concepts and terms of security, compliance and identity
    • Understanding the capabilities of Microsoft Identity and Access Management solutions
    • Using Microsoft Azure's built-in security management capabilities and features
    • Deploying Microsoft Azure's compliance management solutions

    Who Should Take SC-900 Training?

    This Microsoft Certified: Security, Compliance, and Identity Fundamentals training is valuable for new or aspiring IT professionals, experienced security technicians looking to validate foundational skills, and non-technical professionals.

    Compliance user training. It's so important that non-technical professionals get this Security, Compliance and Identity Fundamentals training because when there are decisions about a network to be made, it's only when you understand how one gets secured, how users are identified, and how compliance is verified that you can ensure they're wise decisions.

    New or aspiring IT professionals. If you hope to have a career in cybersecurity, starting with a Microsoft Fundamentals certification is a good way to get your feet wet with big concepts that will persist throughout your career. This Microsoft Certified: Security, Compliance, and Identity Fundamentals training is great for new security technicians, since it defines the concepts and tools you'll be managing and configuring practically every day.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    James Conrad
    James Conrad
    Instructor's Courses

    I really enjoy teaching someone a topic that was difficult for me to learn so they don’t have to go through the same pain that I did while learning that topic.

    James brings more than 30 years of IT experience to his training. He got his start in IT volunteering for a nonprofit and becoming their defacto IT pro — while using an MS-DOS portable computer. Before joining CBT Nuggets, James did freelance IT work, and wrote and reviewed technical books. His hobbies include photography, hiking, and traveling, especially to Eastern Europe and Russia.

    Certifications: Microsoft Certified Professional, Microsoft Certified Solutions Associate, Microsoft Certified Solutions Expert, Microsoft Certified Technician, Certified Ethical Hacker, and CompTIA A+

    Areas of expertise: Microsoft (Group Policy) and CompTIA

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 86
    • duration 13:17:19
    • Release Date 2023/02/22