Exclusive SALE Offer Today

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Best Seller 140 Lectures 6h 59m
Prepare for your Microsoft examination with our training course. The SC-900 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Microsoft certification exam. Pass the Microsoft SC-900 test with flying colors.
$13.99$19.99
Curriculum For This Course

  • 1. Chapter 1 : Security concepts and methodologies - Introduction 1m
  • 2. Zero Trust - Guidelines 3m
  • 3. Zero Trust - Six Foundational Pillars 4m
  • 4. The Shared Responsibility Model 6m
  • 5. Defence in Depth Strategy 3m
  • 6. The CIA Triad 6m
  • 7. Describe Common Threats 6m
  • 8. Describe Encryption , hashing and Signing -I 4m
  • 9. Describe Encryption , hashing and Signing - II 4m
  • 10. Lesson Conclusion 1m
  • 11. Microsoft security and compliance principles - Lesson Introduction 1m
  • 12. Microsoft's Privacy Principles 2m
  • 13. What is Service Trust Portal 2m
  • 14. Azure Compliance Documentation 1m
  • 15. Module 1 : Chapter Summary 1m
  • 1. Describe Identity Concepts - Introduction 1m
  • 2. Common Identity Attacks 5m
  • 3. Identity As a Security perimeter 4m
  • 4. Four Pillars of Identity 6m
  • 5. Modern Authentication and the role of Identity provider 3m
  • 6. SSO and the Concept of Federation 4m
  • 7. The concept of directory services and Active Directory 3m
  • 8. Describe the basic services and identity types - Introduction 1m
  • 9. Describe Azure Active Directory 3m
  • 10. Azure AD Editions 4m
  • 11. Describe the Azure AD identity types 8m
  • 12. Difference between System assigned and user assigned managed Identity 3m
  • 13. Describe the types external identities 5m
  • 14. Describe the concept of hybrid Identities 4m
  • 15. Describe the authentication capabilities of Azure - Introduction 1m
  • 16. Describe the different authentication methods 3m
  • 17. Security defaults and MFA 4m
  • 18. MFA in Azure AD - Part 1 2m
  • 19. MFA in Azure AD - Part 2 3m
  • 20. Windows Hello 3m
  • 21. Why is Windows Hello safer than a password 2m
  • 22. Self-service password reset in Azure AD 5m
  • 23. Password protection and management capabilities of Azure AD 5m
  • 24. Protecting against password spray 2m
  • 25. Hybrid security 2m
  • 26. Describe the access management capabilties of AzureAD 1m
  • 27. Conditional access in Azure AD 4m
  • 28. Conditional access in Azure AD - II 6m
  • 29. Conditional access in Azure AD - III 3m
  • 30. Azure AD Roles & Custom Roles 3m
  • 31. Chapter Summary 1m
  • 32. Describe the identity protection and governance capabilties of Azure AD 1m
  • 33. What is Identity Governance 1m
  • 34. What is Identity lifecycle 4m
  • 35. Access Lifecycle 2m
  • 36. Privileged access lifecycle 2m
  • 37. What is Entitlement management 3m
  • 38. Azure AD access reviews 3m
  • 39. Azure AD terms of use 2m
  • 40. Capabilities of Privileged identity Management 2m
  • 1. Module Introduction 2m
  • 2. Network security groups 3m
  • 3. Inbound and outbound security rules 4m
  • 4. What is DDOS 3m
  • 5. Azure DDOS protection plans and pricing 3m
  • 6. Azure Firewall 4m
  • 7. Azure Bastion Host 4m
  • 8. Web Application Firewall 2m
  • 9. Azure Encryption 3m
  • 10. Azure Key Vault 2m
  • 11. Lesson Summary 2m
  • 12. Cloud Security Posture management 4m
  • 13. Azure Security Center 4m
  • 14. Azure Security Center - Features 4m
  • 15. Azure Security Center - Security Score 2m
  • 16. Azure defender 6m
  • 17. Azure Security Benchmark 5m
  • 18. Azure Security Center - Pricing Tier 1m
  • 19. Chapter Summary 1m
  • 20. Describe the security capabilities of Azure Sentinel 2m
  • 21. Define the concepts of SIEM, SOAR and XDR 6m
  • 22. Azure Sentinel 2m
  • 23. Azure Sentinel Features 6m
  • 24. Azure Sentinel - Pricing 1m
  • 25. Describe the threat protection capabilities of - Introduction 2m
  • 26. Microsoft 365 Defender services - Introduction 3m
  • 27. Microsoft Defender for Identity 5m
  • 28. Microsoft Defender for O365 5m
  • 29. Microsoft Defender for Endpoint 4m
  • 30. What is CASB 3m
  • 31. The Cloud App Security framework 2m
  • 32. Microsoft Cloud App Security architecture 3m
  • 33. O365 Cloud App security And Azure AD Cloud App Discovery 1m
  • 34. Security Management Capabilties of M365 - Introduction 2m
  • 35. Microsoft 365 Security Center - Intro 5m
  • 36. How to use Microsoft Secure Score 3m
  • 37. Differences between the Azure and Microsoft Secure Score 1m
  • 38. Managing Incidents 2m
  • 39. Describe endpoint security with Microsoft Intune - Introduction 1m
  • 40. What is Intune 2m
  • 41. MDM and MAM 3m
  • 42. Endpoint Security with Intune 7m
  • 1. Module 4 introduction 1m
  • 2. Common Compliance Needs 2m
  • 3. Common compliance regulations 3m
  • 4. Compliance Center 2m
  • 5. What is Compliance Manager 2m
  • 6. What are Controls 1m
  • 7. What are Assesments 2m
  • 8. Understand Compliance score 3m
  • 9. Chapter Summary 1m
  • 10. The information protection and governance capabiliities of Microsoft 365 1m
  • 11. Know your data, protect your data, and govern your data 3m
  • 12. Data classification capabilities of compliance Center 5m
  • 13. Content Explorer and Activity Explorer 4m
  • 14. Sensitivity labels 5m
  • 15. Label Policies 3m
  • 16. Data Loss Prevention 3m
  • 17. Data Loss Prevention on endpoints and teams 2m
  • 18. Retention Polices and Retention Labels 4m
  • 19. Records Management 3m
  • 20. The insider risk capabilities in Microsoft - Introduction 1m
  • 21. Insider Risk management 2m
  • 22. Insider Risk management Workflow 3m
  • 23. Communications Compliance 5m
  • 24. Information barriers in Microsoft Teams 2m
  • 25. Privileged Access Management 4m
  • 26. Customer Lockbox 4m
  • 27. Lesson Summary 1m
  • 28. eDiscovery capabilities of Microsoft M365 - Introduction 1m
  • 29. The Purpose of eDiscovery 2m
  • 30. The capabilities of the content search 5m
  • 31. The Core eDiscovery Workflow 6m
  • 32. The advanced eDiscovery workflow 4m
  • 33. The audit capabilities of Microsoft 365- introduction 1m
  • 34. The core audit capabilities of M365 4m
  • 35. What are the Advance Auditing Capabilities 5m
  • 36. High Bandwidth for Office 365 API Activities 2m
  • 37. Describe the resource governance capabilities- introduction 1m
  • 38. Resource Manager - Locks 2m
  • 39. What is Azure Blueprints 3m
  • 40. What is Azure Policy 4m
  • 41. Difference between Azure Policy and RBAC 2m
  • 42. Cloud Adoption Framework 2m

How to Open Test Engine .dumpsarena Files

Use FREE DumpsArena Test Engine player to open .dumpsarena files

DumpsArena Test Engine

Windows

Refund Policy
Refund Policy

DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.

How our refund policy works?

safe checkout

Your purchase with DumpsArena.com is safe and fast.

The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?