Companies Home Search Profile

Security Administrator Associate Online Training

Focused View

John Munjoma

12:09:34

85 View
  • 1 Intro.mp4
    05:16
  • 2 Azure AD Authentication Options.mp4
    13:01
  • 3 Monitoring Azure AD Connect .mp4
    09:26
  • 4 Troubleshooting Azure AD Connect.mp4
    17:40
  • 5 Implementing Azure AD Group Membership.mp4
    10:39
  • 6 Implementing Password Management.mp4
    08:52
  • 7 Implementing MFA Using Conditional Access Policies.mp4
    13:00
  • 8 Managing And Monitoring MFA.mp4
    07:46
  • 9 Passwordless Authentication.mp4
    07:32
  • 10 Conditional Access Policies.mp4
    09:42
  • 11 Application Based Conditional Access Policies.mp4
    11:23
  • 12 Configuring Access Management.mp4
    16:09
  • 13 Configuring Cloud Application Security.mp4
    08:25
  • 14 What Is Role Based Access.mp4
    09:19
  • 15 Configuring Roles And Role Groups.mp4
    11:49
  • 16 Implement Azure AD Group Membership.mp4
    10:39
  • 17 Auditing Roles For Least Privileged Access.mp4
    15:38
  • 18 Introduction To Azure AD Identity Protection.mp4
    01:45
  • 19 User Risk Policies.mp4
    09:05
  • 20 Implementing Sign-in Risk Policies.mp4
    10:24
  • 21 Risk Alerts And Detection.mp4
    11:04
  • 22 Configuring Identity Synchronization .mp4
    13:33
  • 23 Microsoft Defender For EndPoint.mp4
    08:10
  • 24 Microsoft Defender For Identity Solutions.mp4
    03:59
  • 25 Integrating Microsoft Defender With Endpoint Manager.mp4
    04:59
  • 26 Attack Surface Reduction.mp4
    07:37
  • 27 EndPoint Security Controls.mp4
    08:57
  • 28 Disk Encryption And Firewall Policies.mp4
    05:30
  • 29 Creating Security Baselines.mp4
    06:29
  • 30 Introduction To Device And Application Protection.mp4
    01:33
  • 31 Configuring Microsoft Defender Application Guard.mp4
    11:27
  • 32 Managing Exploit Protection.mp4
    08:34
  • 33 Device Encryption.mp4
    07:44
  • 34 Windows Information Protection.mp4
    14:20
  • 35 Verifying WIP Policy.mp4
    04:20
  • 36 Configuring Microsoft Sentinel And Defender For Office 365.mp4
    03:55
  • 37 Getting Started With Microsoft Sentinel.mp4
    07:15
  • 38 Managing And Monitoring With Microsoft Sentinel.mp4
    09:42
  • 39 Creating Office 365 Security Policies.mp4
    08:01
  • 40 Using KQL to Analyze Sign in Activities.mp4
    08:59
  • 41 Conducting Simulated Attacks.mp4
    11:11
  • 42 What Is A Sensitivity Label.mp4
    04:54
  • 43 Managing Sensitive Information Types.mp4
    12:02
  • 44 Configuring Sensitivity Label Policies.mp4
    16:06
  • 45 Sensitivity Labels Teams, SharePoint ,OneDrive and Office Apps..mp4
    10:26
  • 46 Using The Activity Explorer.mp4
    04:34
  • 47 Working With DLP.mp4
    03:38
  • 48 Creating DLP Policies In Microsoft 365.mp4
    19:14
  • 49 DLP Full Functionality Test.mp4
    10:42
  • 50 Implementing Endpoint DLP.mp4
    22:32
  • 51 Microsoft Defender For Cloud Apps.mp4
    14:50
  • 52 Configuring Mass Download Monitoring Policy.mp4
    06:27
  • 53 Review And Interpret Cloud App Alerts.mp4
    07:26
  • 54 Connecting Cloud Apps to Microsoft Defender..mp4
    08:34
  • 55 Log and Snapshot Reports.mp4
    08:46
  • 56 Configuring Data Retention Labels.mp4
    05:26
  • 57 Data Classification.mp4
    05:54
  • 58 Creating Retention Policies.mp4
    08:57
  • 59 Setting Up A Litigation Hold.mp4
    07:04
  • 60 Records Management.mp4
    12:03
  • 61 Microsoft 365 Retention Policies.mp4
    07:09
  • 62 Planning Compliance Solutions.mp4
    06:40
  • 63 Creating Compliance Assessments.mp4
    10:17
  • 64 Communication Compliance Policies.mp4
    06:14
  • 65 Creating Data Loss Prevention Policies.mp4
    08:16
  • 66 Creating DSR Cases for GDPR Compliance.mp4
    08:05
  • 67 Service Assurance.mp4
    07:02
  • 68 Introduction to Insider Risk Solutions In Microsoft 365.mp4
    04:20
  • 69 Managing Customer Lockbox.mp4
    06:43
  • 70 Implementing Customer Lockbox.mp4
    04:15
  • 71 Managing Communication Compliance.mp4
    10:44
  • 72 Verifying Communication Compliance.mp4
    05:25
  • 73 Implementing Insider Risk Management Policies.mp4
    08:40
  • 74 Creating An Insider Risk Policy.mp4
    08:19
  • 75 Implementing Information Barrier Policies.mp4
    13:53
  • 76 Working With eDiscovery.mp4
    10:04
  • 77 Using eDiscovery Content Search.mp4
    07:08
  • 78 Deleting Malicious Emails.mp4
    06:35
  • 79 Creating Audit Retention Policies.mp4
    07:51
  • 80 Usage Reports.mp4
    05:19
  • 81 Insider Risk Management.mp4
    12:11
  • Description


    This intermediate Microsoft Security Administrator Associate training prepares security professionals to take the MS-500 exam, which is the one required exam to earn the Microsoft 365 Certified: Security Administrator Associate certification.

    Plenty of professions and industries depend on certifications to measure the abilities and competence of the people who work in the field. But few industries have as many different technologies, providers and authorities as the IT field. Within IT as a whole, systems administration in particular has many different certifications. A sysadmin who wants to advance in their career needs to demonstrate technological competence in different softwares, hardwares, concepts and capabilities. With this training, you’ll be prepared to certify as a security administrator associate for Microsoft 365, a certification that can prepare you for future roles in security or systems administration.

    More details


    For IT managers, this Security Administrator Associate training can be used for MS-500 exam prep, on-boarding new security professionals, or as part of a team training plan.

    Security Administrator Associate: What You Need to Know

    This Security Administrator Associate training has videos that cover topics such as:

    • Securing user accounts and implementing authentication and access methods
    • Using active directory for identity management
    • Implementing threat protection for enterprises, devices and applications
    • Managing data loss prevention and Azure information protection
    • Analyzing logs and reporting security metrics

    Who Should Take Security Administrator Associate Training?

    This Security Administrator Associate training is considered associate-level Microsoft training, which means it was designed for security professionals. This Windows 10 skills course is valuable for new IT professionals with at least a year of experience with desktop support and experienced security professionals looking to validate their Microsoft skills.

    New or aspiring security professionals. The argument for earning your Microsoft Security Administrator Associate certification is a simple one: more is better. Whether you’re looking forward to a career in security administration, systems administration, network engineering or technology management, demonstrating and certifying mastery of security principles is a necessary stepping stone to future expertise.

    Experienced security professionals. If you’ve been working as a network or system security professional for a while already, you might worry that earning an associate-level certification would be a step backwards. Stop worrying! Holding associate-level certifications demonstrates competence in basics and commitment to process. Your later career will benefit from the basics this training reinforces and your trajectory will be faster with the certification it prepares you for.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    John Munjoma
    John Munjoma
    Instructor's Courses

    I deeply love empowering others and helping them increase their knowledge so that their work and lives are easier.

    Circuit boards originally sparked John’s interest as a young boy in technology. However, it wasn’t until after he completed his schooling that he gravitated toward IT. Prior to becoming a technical trainer, John worked as a network and systems administrator. When he’s not creating training, John enjoys learning, especially about the universe, history, and of course, technology.

    Certifications: CompTIA A+, CompTIA Network+, CompTIA Security+, CompTIA Certified Trainer, Microsoft Certified Trainer, Cisco CCNA, Azure Administrator

    Areas of expertise: Cybersecurity, systems, and network administration

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 81
    • duration 12:09:34
    • Release Date 2023/03/02