SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Best Seller
140 Lectures
6h 59m
Prepare for your Microsoft examination with our training course. The SC-900 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Microsoft certification exam. Pass the Microsoft SC-900 test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. Course Introduction 4m
- 1. Chapter 1 : Security concepts and methodologies - Introduction 1m
- 2. Zero Trust - Guidelines 3m
- 3. Zero Trust - Six Foundational Pillars 4m
- 4. The Shared Responsibility Model 6m
- 5. Defence in Depth Strategy 3m
- 6. The CIA Triad 6m
- 7. Describe Common Threats 6m
- 8. Describe Encryption , hashing and Signing -I 4m
- 9. Describe Encryption , hashing and Signing - II 4m
- 10. Lesson Conclusion 1m
- 11. Microsoft security and compliance principles - Lesson Introduction 1m
- 12. Microsoft's Privacy Principles 2m
- 13. What is Service Trust Portal 2m
- 14. Azure Compliance Documentation 1m
- 15. Module 1 : Chapter Summary 1m
- 1. Describe Identity Concepts - Introduction 1m
- 2. Common Identity Attacks 5m
- 3. Identity As a Security perimeter 4m
- 4. Four Pillars of Identity 6m
- 5. Modern Authentication and the role of Identity provider 3m
- 6. SSO and the Concept of Federation 4m
- 7. The concept of directory services and Active Directory 3m
- 8. Describe the basic services and identity types - Introduction 1m
- 9. Describe Azure Active Directory 3m
- 10. Azure AD Editions 4m
- 11. Describe the Azure AD identity types 8m
- 12. Difference between System assigned and user assigned managed Identity 3m
- 13. Describe the types external identities 5m
- 14. Describe the concept of hybrid Identities 4m
- 15. Describe the authentication capabilities of Azure - Introduction 1m
- 16. Describe the different authentication methods 3m
- 17. Security defaults and MFA 4m
- 18. MFA in Azure AD - Part 1 2m
- 19. MFA in Azure AD - Part 2 3m
- 20. Windows Hello 3m
- 21. Why is Windows Hello safer than a password 2m
- 22. Self-service password reset in Azure AD 5m
- 23. Password protection and management capabilities of Azure AD 5m
- 24. Protecting against password spray 2m
- 25. Hybrid security 2m
- 26. Describe the access management capabilties of AzureAD 1m
- 27. Conditional access in Azure AD 4m
- 28. Conditional access in Azure AD - II 6m
- 29. Conditional access in Azure AD - III 3m
- 30. Azure AD Roles & Custom Roles 3m
- 31. Chapter Summary 1m
- 32. Describe the identity protection and governance capabilties of Azure AD 1m
- 33. What is Identity Governance 1m
- 34. What is Identity lifecycle 4m
- 35. Access Lifecycle 2m
- 36. Privileged access lifecycle 2m
- 37. What is Entitlement management 3m
- 38. Azure AD access reviews 3m
- 39. Azure AD terms of use 2m
- 40. Capabilities of Privileged identity Management 2m
- 1. Module Introduction 2m
- 2. Network security groups 3m
- 3. Inbound and outbound security rules 4m
- 4. What is DDOS 3m
- 5. Azure DDOS protection plans and pricing 3m
- 6. Azure Firewall 4m
- 7. Azure Bastion Host 4m
- 8. Web Application Firewall 2m
- 9. Azure Encryption 3m
- 10. Azure Key Vault 2m
- 11. Lesson Summary 2m
- 12. Cloud Security Posture management 4m
- 13. Azure Security Center 4m
- 14. Azure Security Center - Features 4m
- 15. Azure Security Center - Security Score 2m
- 16. Azure defender 6m
- 17. Azure Security Benchmark 5m
- 18. Azure Security Center - Pricing Tier 1m
- 19. Chapter Summary 1m
- 20. Describe the security capabilities of Azure Sentinel 2m
- 21. Define the concepts of SIEM, SOAR and XDR 6m
- 22. Azure Sentinel 2m
- 23. Azure Sentinel Features 6m
- 24. Azure Sentinel - Pricing 1m
- 25. Describe the threat protection capabilities of - Introduction 2m
- 26. Microsoft 365 Defender services - Introduction 3m
- 27. Microsoft Defender for Identity 5m
- 28. Microsoft Defender for O365 5m
- 29. Microsoft Defender for Endpoint 4m
- 30. What is CASB 3m
- 31. The Cloud App Security framework 2m
- 32. Microsoft Cloud App Security architecture 3m
- 33. O365 Cloud App security And Azure AD Cloud App Discovery 1m
- 34. Security Management Capabilties of M365 - Introduction 2m
- 35. Microsoft 365 Security Center - Intro 5m
- 36. How to use Microsoft Secure Score 3m
- 37. Differences between the Azure and Microsoft Secure Score 1m
- 38. Managing Incidents 2m
- 39. Describe endpoint security with Microsoft Intune - Introduction 1m
- 40. What is Intune 2m
- 41. MDM and MAM 3m
- 42. Endpoint Security with Intune 7m
- 1. Module 4 introduction 1m
- 2. Common Compliance Needs 2m
- 3. Common compliance regulations 3m
- 4. Compliance Center 2m
- 5. What is Compliance Manager 2m
- 6. What are Controls 1m
- 7. What are Assesments 2m
- 8. Understand Compliance score 3m
- 9. Chapter Summary 1m
- 10. The information protection and governance capabiliities of Microsoft 365 1m
- 11. Know your data, protect your data, and govern your data 3m
- 12. Data classification capabilities of compliance Center 5m
- 13. Content Explorer and Activity Explorer 4m
- 14. Sensitivity labels 5m
- 15. Label Policies 3m
- 16. Data Loss Prevention 3m
- 17. Data Loss Prevention on endpoints and teams 2m
- 18. Retention Polices and Retention Labels 4m
- 19. Records Management 3m
- 20. The insider risk capabilities in Microsoft - Introduction 1m
- 21. Insider Risk management 2m
- 22. Insider Risk management Workflow 3m
- 23. Communications Compliance 5m
- 24. Information barriers in Microsoft Teams 2m
- 25. Privileged Access Management 4m
- 26. Customer Lockbox 4m
- 27. Lesson Summary 1m
- 28. eDiscovery capabilities of Microsoft M365 - Introduction 1m
- 29. The Purpose of eDiscovery 2m
- 30. The capabilities of the content search 5m
- 31. The Core eDiscovery Workflow 6m
- 32. The advanced eDiscovery workflow 4m
- 33. The audit capabilities of Microsoft 365- introduction 1m
- 34. The core audit capabilities of M365 4m
- 35. What are the Advance Auditing Capabilities 5m
- 36. High Bandwidth for Office 365 API Activities 2m
- 37. Describe the resource governance capabilities- introduction 1m
- 38. Resource Manager - Locks 2m
- 39. What is Azure Blueprints 3m
- 40. What is Azure Policy 4m
- 41. Difference between Azure Policy and RBAC 2m
- 42. Cloud Adoption Framework 2m
Hot Exams
Microsoft AZ-204 Exam Dumps
Cisco 350-401 Exam Dumps
Microsoft AZ-104 Exam Dumps
Exin ITIL Exam Dumps
ISC2 CISSP Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
Nutanix NCS-Core Exam Dumps
Nutanix NCP-MCI-6.5 Exam Dumps
Isaca CRISC Exam Dumps
Nutanix NCM-MCI Exam Dumps
Linux Foundation CKS Exam Dumps
Isaca CDPSE Exam Dumps
IIA IIA-CIA-Part3-3P Exam Dumps
IAPP CIPM Exam Dumps
AAFM GLO_CWM_LVL_1 Exam Dumps
Microsoft AI-900 Exam Dumps
Microsoft DP-300 Exam Dumps
Microsoft MO-201 Exam Dumps
Cisco 350-501 Exam Dumps
Cisco 300-515 Exam Dumps
CompTIA 220-1101 Exam Dumps
ISC2 CISSP Exam Dumps
CompTIA SY0-701 Exam Dumps
Microsoft AZ-104 Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
Amazon Web Services SCS-C02 Exam Dumps
ITIL ITILFND-V4 Exam Dumps
PMI PMP Exam Dumps
Cisco 350-401 Exam Dumps
Cisco 350-501 Exam Dumps
Microsoft AZ-204 Exam Dumps
Okta Okta-Certified-Professional Exam Dumps
Amazon AWS SAA-C03 Exam Dumps
Nutanix NCS-Core Exam Dumps
PEOPLECERT ITIL-4-DITS Exam Dumps
Nutanix NCP-MCI-6.5 Exam Dumps
Amazon Web Services CLF-C02 Exam Dumps
IIA IIA-CIA-Part2 Exam Dumps
Exin ITIL Exam Dumps
Cisco 300-410 Exam Dumps
How to Open Test Engine .dumpsarena Files
Use FREE DumpsArena Test Engine player to open .dumpsarena files
Refund Policy
DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.
Your purchase with DumpsArena.com is safe and fast.
The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.