Jan 15 2023 Sc-900: Microsoft Security, Compliance, Identity (Feb 2023) BaDshaH LEARNING / e-learning - Tutorials 12:03 0 Last updated 1/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.18 GB | Duration: 5h 58mLearn about SCI in Microsoft Azure, Azure Sentinel, Microsoft 365 Defender, InTune and MS Purview. For exam SC-900. What you'll learnDescribe the concepts of security, compliance, and identityDescribe the capabilities of Microsoft identity and access management solutionsDescribe the capabilities of Microsoft security solutionsDescribe the capabilities of Microsoft compliance solutionsRequirementsYou need to know how to use a computer, and hopefully know how to use a spreadsheet.No prior knowledge of Microsoft Azure or 365 is required.Also, no prior knowledge of security, compliance or identity is required.You can access Azure or Microsoft 365 Centers on Windows, iOS or Linux.There is a 30-day refund guarantee of this Udemy course (see Udemy's refund policy).Why not have a look at the curriculum below and see what you can learn?DescriptionThis course covers the content required for the SC-900 certification exam, current as per the SC-900 exam updates of 4 November 2022 and 7 February 2023.What do people like you say about this course?Syed says: "I have cleared with 813. Your Explanations where informative and detailed. Thank you!"Deepthi says: "Topics are explained clearly and they are easy to understand. For SC-900 this is one of the best course in Udemy."Kunjar says: "The short quiz between chapters is helpful. Practice test at the end of the course is a confidence booster."This course is the foundation for the Microsoft Certificate SC-900 "Microsoft Security, Compliance, and Identity Fundamentals" across cloud-based and related Microsoft services.We'll start off with looking at the concepts of Security, Compliance and Identity (SCI). We'll look at security methodologies, security concepts and Microsoft Security and compliance principles. We'll then look at Microsoft Identity and Access Management Solutions. We'll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.The final item is Microsoft Compliance Solutions. In this section, we'll largely concentrate on Microsoft Purview compliance (previously known as Microsoft 365 compliance). We'll look at information protection and data lifecycle management capabilities, and inside risk. We'll end with looking at the resource governance capabilities in Azure.No prior knowledge is required - we'll even see how to get a free Microsoft Azure and Microsoft 365 and Purview compliance trial!There are regular quizzes to help you remember the information, so you can be sure that you are learning.Once you have completed this course, you will have a good introductory knowledge of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. And with some practice, you could even go for the official Microsoft certification SC-900 - wouldn't that look good on your CV or resume? And if you are an American college student, you might even get college credit for passing that exam.So, without any further ado, let's have a look at how you can use the Udemy interface, and then we'll have a look at the objectives for the exam and therefore the syllabus for this course. And if you are an American college student, you might even get college credit for passing that exam.OverviewSection 1: IntroductionLecture 1 IntroductionLecture 2 Welcome to UdemyLecture 3 How to get the best out of your Udemy courseLecture 4 Do you want auto-translated subtitles in more languages?Lecture 5 CurriculumLecture 6 ResourcesSection 2: Part 1 - Describe the Concepts of Security, Compliance, and IdentityLecture 7 2. Define defense in depthLecture 8 3. Describe the Zero-Trust methodologyLecture 9 On Prem versus the CloudLecture 10 1. Describe the shared responsibility modelLecture 11 4. Describe encryption and hashingLecture 12 47. Describe Microsoft's privacy principlesLecture 13 46. Describe the offerings of the service trust portalLecture 14 -. Describe common threatsLecture 15 5. Describe compliance conceptsLecture 16 -. Describe cloud adoption frameworkSection 3: Part 2 - Define identity principles/conceptsLecture 17 6. Define identity as the primary security perimeterLecture 18 7, 8. Define authentication and authorizationLecture 19 9. Describe what identity providers areLecture 20 10. Describe what Active Directory isLecture 21 11. Describe the concept of Federated servicesLecture 22 -. Define common Identity AttacksSection 4: Part 2 - Describe the basic identity services and identity types of Azure ADLecture 23 12. Describe what Azure Active Directory isLecture 24 13. Describe Azure AD identity typeLecture 25 14. Describe what hybrid identity isLecture 26 15. Describe the different external identity typesSection 5: Part 2 - Authentication and access management capabilities of Azure ADLecture 27 16, 17. Different AuthN methods, inc. Multi-factor AuthenticationLecture 28 18. Describe self-service password resetLecture 29 19. Describe password protection and management capabilitiesLecture 30 -. Describe Windows Hello for BusinessLecture 31 20. Describe what conditional access is, and its uses and benefitsLecture 32 21. Describe the benefits of Azure AD rolesLecture 33 22. Describe the benefits of Azure AD role-based access controlSection 6: Part 2 - Describe the identity protection & governance capabilities of Azure ADLecture 34 23. Describe what identity governance isLecture 35 24a. Describe what entitlement management isLecture 36 24b. Describe what access reviews isLecture 37 25. Describe the capabilities of PIMLecture 38 26. Describe Azure AD Identity ProtectionSection 7: Part 3 - Describe basic security capabilities in AzureLecture 39 31. Describe Azure Network Security groupsLecture 40 27. Describe Azure DDoS protectionLecture 41 28. Describe what Azure Firewall isLecture 42 32. Describe what Azure Bastion isLecture 43 29. Describe what Web Application Firewall isLecture 44 30. Describe Network Segmentation with Azure Virtual Networks (VNets)Lecture 45 33. Describe ways Azure encrypts dataSection 8: Part 3 - Describe security management capabilities of AzureLecture 46 35. Describe Microsoft Defender for CloudLecture 47 35. Describe secure score in Microsoft Defender for CloudLecture 48 36. Describe enhanced security of Microsoft Defender for CloudLecture 49 34. Describe Cloud security posture management (CSPM)Lecture 50 37. Describe security baselines for AzureSection 9: Part 3 - Describe security capabilities of Azure SentinelLecture 51 38. Define the concepts of SIEM, SOAR, XDRLecture 52 39. Describe how Azure Sentinel provides integrated threat protectionSection 10: Part 3 - Describe threat protection with Microsoft 365 DefenderLecture 53 40. Describe Microsoft 365 Defender servicesLecture 54 44. Describe Microsoft Defender for Identity (formerly Azure ATP)Lecture 55 41. Describe Microsoft Defender for Office 365 (formerly Office 365 ATP)Lecture 56 42. Describe Microsoft Defender for Endpoint, former Microsoft Defender ATPLecture 57 43. Describe Microsoft Defender for Cloud AppsSection 11: Part 3 - Describe security management capabilities of Microsoft 365Lecture 58 45. Describe security reports and dashboardsLecture 59 45. Describe how to use Microsoft Secure ScoreLecture 60 45. Describe incidents and incident management capabilitiesLecture 61 45. Describe the Microsoft 365 Defender Portal (Security Center)Section 12: Part 4 - Describe compliance management capabilities in Microsoft 365/PurviewLecture 62 Microsoft 365 and Microsoft PurviewLecture 63 48. Describe the compliance portalLecture 64 49. Describe compliance managerLecture 65 50. Describe use and benefits of compliance scoreSection 13: Part 4 - Information protection and governance capabilities of MS 365/PurviewLecture 66 51. Describe data classification capabilitiesLecture 67 53. Describe sensitivity labelsLecture 68 52. Describe the value of content explorer and activity explorerLecture 69 56. Describe Retention Polices and Retention LabelsLecture 70 55. Describe Records ManagementLecture 71 54. Describe Data Loss PreventionSection 14: Part 4 - Describe insider risk capabilities in Microsoft 365/PurviewLecture 72 57. Describe Insider risk management solutionLecture 73 58. Describe communication complianceLecture 74 59. Describe information barriersSection 15: Part 4 - Describe resource governance capabilities in AzureLecture 75 -. Describe the use of Azure Resource locksLecture 76 60. Define Azure Policy and describe its use casesLecture 77 61. Describe what Azure Blueprints isLecture 78 62. Describe the Microsoft Purview unified data governance solutionSection 16: CongratulationsLecture 79 What's Next?Lecture 80 Well doneSection 17: Additional - insider risk and the eDiscovery capabilities of Microsoft 365Lecture 81 No longer needed for SC-900 examLecture 82 Describe privileged access managementLecture 83 Describe customer lockboxLecture 84 Describe the purpose of eDiscoveryLecture 85 Describe the capabilities of the content search toolLecture 86 Describe the core eDiscovery workflowLecture 87 Describe the advanced eDiscovery workflowSection 18: Additional - Describe the audit capabilities in Microsoft 365Lecture 88 Describe the core audit capabilities of M365Lecture 89 Describe purpose and value of Advanced AuditingSection 19: Bonus - Describe endpoint security with Microsoft IntuneLecture 90 Describe what Intune isLecture 91 Describe endpoint security with IntuneLecture 92 The endpoint security with Microsoft Endpoint Manager admin centerSection 20: Bonus LectureLecture 93 Bonus LectureThis course is for you if you want to understand what is available security, compliance and identity on Azure and Microsoft 365.,By the end of this course, with some practice, you could enter (and hopefully pass) Microsoft's official SC-900 exam.,Wouldn't the "Microsoft Certified: Security, Compliance, and Identity Fundamentals" certification look good on your CV or resume?Homepagehttps://www.udemy.com/course/sc-900-microsoft-security-complianceidentity-fundamentals/Download From Rapidgatorhttps://rapidgator.net/file/8d066c11ef43f78bfa3d678e35ea6a21https://rapidgator.net/file/c418c6283b9601c2c63e744f73009630https://rapidgator.net/file/7084537020a2469765f4d14649e0699cDownload From 1DLhttps://1dl.net/94usjb06xba6https://1dl.net/b25u0u8bq2o7https://1dl.net/lny0hyd3vq76Download From Ddownloadhttps://ddownload.com/bbrioy9cuzmhhttps://ddownload.com/baja9cnpy45thttps://ddownload.com/8sbodcqj3ajqTo Support My Work Buy Premium From My Links. Related News Mb-910: Microsoft Dynamics 365 Fundamentals (Crm) (Dec 22)Exam MS-100 Microsoft 365 Identity and Services (Video)AZ-720 Troubleshooting Microsoft Azure Connectivity courseTTC - Assessing America's National Security ThreatsExam Ref SC-300 Microsoft Identity and Access Administrator Comments (0)Add comment Submit NEWEST RELEASES 16.05: iA Writer 7.1.3 macOS 16.05: Sync Folders Pro 4.7.3 macOS 16.05: YT Saver Video Downloader & Converter 7.7.0 macOS 16.05: iTubeGo YouTube Downloader 7.7.0 macOS 16.05: Perfectly Clear WorkBench 4.6.1.2660 macOS 16.05: Topaz Photo AI 3.0.2 macOS 16.05: Nevercenter CameraBag Pro 2024.2.0 macOS 16.05: TinkerTool System 8.92 macOS 16.05: PDF Reader Pro 4.0.1 macOS 16.05: 4K Video Downloader Pro 4.31.0 macOS Recommended Filehosts Freinds Site