Sc-900 Microsoft Security, Compliance, Identity (Feb 2023)



Last updated 1/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.18 GB | Duration: 5h 58m
Learn about SCI in Microsoft Azure, Azure Sentinel, Microsoft 365 Defender, InTune and MS Purview. For exam SC-900.


What you’ll learn
Describe the concepts of security, compliance, and identity
Describe the capabilities of Microsoft identity and access management solutions
Describe the capabilities of Microsoft security solutions
Describe the capabilities of Microsoft compliance solutions
Requirements
You need to know how to use a computer, and hopefully know how to use a spreadsheet.
No prior knowledge of Microsoft Azure or 365 is required.
Also, no prior knowledge of security, compliance or identity is required.
You can access Azure or Microsoft 365 Centers on Windows, iOS or Linux.
There is a 30-day refund guarantee of this Udemy course (see Udemy’s refund policy).
Why not have a look at the curriculum below and see what you can learn?
Description
This course covers the content required for the SC-900 certification exam, current as per the SC-900 exam updates of 4 November 2022 and 7 February 2023.What do people like you say about this course?Syed says: "I have cleared with 813. Your Explanations where informative and detailed. Thank you!"Deepthi says: "Topics are explained clearly and they are easy to understand. For SC-900 this is one of the best course in Udemy."Kunjar says: "The short quiz between chapters is helpful. Practice test at the end of the course is a confidence booster."This course is the foundation for the Microsoft Certificate SC-900 "Microsoft Security, Compliance, and Identity Fundamentals" across cloud-based and related Microsoft services.We’ll start off with looking at the concepts of Security, Compliance and Identity (SCI). We’ll look at security methodologies, security concepts and Microsoft Security and compliance principles. We’ll then look at Microsoft Identity and Access Management Solutions. We’ll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.The final item is Microsoft Compliance Solutions. In this section, we’ll largely concentrate on Microsoft Purview compliance (previously known as Microsoft 365 compliance). We’ll look at information protection and data lifecycle management capabilities, and inside risk. We’ll end with looking at the resource governance capabilities in Azure.No prior knowledge is required – we’ll even see how to get a free Microsoft Azure and Microsoft 365 and Purview compliance trial!There are regular quizzes to help you remember the information, so you can be sure that you are learning.Once you have completed this course, you will have a good introductory knowledge of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. And with some practice, you could even go for the official Microsoft certification SC-900 – wouldn’t that look good on your CV or resume? And if you are an American college student, you might even get college credit for passing that exam.So, without any further ado, let’s have a look at how you can use the Udemy interface, and then we’ll have a look at the objectives for the exam and therefore the syllabus for this course. And if you are an American college student, you might even get college credit for passing that exam.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Welcome to Udemy
Lecture 3 How to get the best out of your Udemy course
Lecture 4 Do you want auto-translated subtitles in more languages?
Lecture 5 Curriculum
Lecture 6 Resources
Section 2: Part 1 – Describe the Concepts of Security, Compliance, and Identity
Lecture 7 2. Define defense in depth
Lecture 8 3. Describe the Zero-Trust methodology
Lecture 9 On Prem versus the Cloud
Lecture 10 1. Describe the shared responsibility model
Lecture 11 4. Describe encryption and hashing
Lecture 12 47. Describe Microsoft’s privacy principles
Lecture 13 46. Describe the offerings of the service trust portal
Lecture 14 -. Describe common threats
Lecture 15 5. Describe compliance concepts
Lecture 16 -. Describe cloud adoption framework
Section 3: Part 2 – Define identity principles/concepts
Lecture 17 6. Define identity as the primary security perimeter
Lecture 18 7, 8. Define authentication and authorization
Lecture 19 9. Describe what identity providers are
Lecture 20 10. Describe what Active Directory is
Lecture 21 11. Describe the concept of Federated services
Lecture 22 -. Define common Identity Attacks
Section 4: Part 2 – Describe the basic identity services and identity types of Azure AD
Lecture 23 12. Describe what Azure Active Directory is
Lecture 24 13. Describe Azure AD identity type
Lecture 25 14. Describe what hybrid identity is
Lecture 26 15. Describe the different external identity types
Section 5: Part 2 – Authentication and access management capabilities of Azure AD
Lecture 27 16, 17. Different AuthN methods, inc. Multi-factor Authentication
Lecture 28 18. Describe self-service password reset
Lecture 29 19. Describe password protection and management capabilities
Lecture 30 -. Describe Windows Hello for Business
Lecture 31 20. Describe what conditional access is, and its uses and benefits
Lecture 32 21. Describe the benefits of Azure AD roles
Lecture 33 22. Describe the benefits of Azure AD role-based access control
Section 6: Part 2 – Describe the identity protection & governance capabilities of Azure AD
Lecture 34 23. Describe what identity governance is
Lecture 35 24a. Describe what entitlement management is
Lecture 36 24b. Describe what access reviews is
Lecture 37 25. Describe the capabilities of PIM
Lecture 38 26. Describe Azure AD Identity Protection
Section 7: Part 3 – Describe basic security capabilities in Azure
Lecture 39 31. Describe Azure Network Security groups
Lecture 40 27. Describe Azure DDoS protection
Lecture 41 28. Describe what Azure Firewall is
Lecture 42 32. Describe what Azure Bastion is
Lecture 43 29. Describe what Web Application Firewall is
Lecture 44 30. Describe Network Segmentation with Azure Virtual Networks (VNets)
Lecture 45 33. Describe ways Azure encrypts data
Section 8: Part 3 – Describe security management capabilities of Azure
Lecture 46 35. Describe Microsoft Defender for Cloud
Lecture 47 35. Describe secure score in Microsoft Defender for Cloud
Lecture 48 36. Describe enhanced security of Microsoft Defender for Cloud
Lecture 49 34. Describe Cloud security posture management (CSPM)
Lecture 50 37. Describe security baselines for Azure
Section 9: Part 3 – Describe security capabilities of Azure Sentinel
Lecture 51 38. Define the concepts of SIEM, SOAR, XDR
Lecture 52 39. Describe how Azure Sentinel provides integrated threat protection
Section 10: Part 3 – Describe threat protection with Microsoft 365 Defender
Lecture 53 40. Describe Microsoft 365 Defender services
Lecture 54 44. Describe Microsoft Defender for Identity (formerly Azure ATP)
Lecture 55 41. Describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
Lecture 56 42. Describe Microsoft Defender for Endpoint, former Microsoft Defender ATP
Lecture 57 43. Describe Microsoft Defender for Cloud Apps
Section 11: Part 3 – Describe security management capabilities of Microsoft 365
Lecture 58 45. Describe security reports and dashboards
Lecture 59 45. Describe how to use Microsoft Secure Score
Lecture 60 45. Describe incidents and incident management capabilities
Lecture 61 45. Describe the Microsoft 365 Defender Portal (Security Center)
Section 12: Part 4 – Describe compliance management capabilities in Microsoft 365/Purview
Lecture 62 Microsoft 365 and Microsoft Purview
Lecture 63 48. Describe the compliance portal
Lecture 64 49. Describe compliance manager
Lecture 65 50. Describe use and benefits of compliance score
Section 13: Part 4 – Information protection and governance capabilities of MS 365/Purview
Lecture 66 51. Describe data classification capabilities
Lecture 67 53. Describe sensitivity labels
Lecture 68 52. Describe the value of content explorer and activity explorer
Lecture 69 56. Describe Retention Polices and Retention Labels
Lecture 70 55. Describe Records Management
Lecture 71 54. Describe Data Loss Prevention
Section 14: Part 4 – Describe insider risk capabilities in Microsoft 365/Purview
Lecture 72 57. Describe Insider risk management solution
Lecture 73 58. Describe communication compliance
Lecture 74 59. Describe information barriers
Section 15: Part 4 – Describe resource governance capabilities in Azure
Lecture 75 -. Describe the use of Azure Resource locks
Lecture 76 60. Define Azure Policy and describe its use cases
Lecture 77 61. Describe what Azure Blueprints is
Lecture 78 62. Describe the Microsoft Purview unified data governance solution
Section 16: Congratulations
Lecture 79 What’s Next?
Lecture 80 Well done
Section 17: Additional – insider risk and the eDiscovery capabilities of Microsoft 365
Lecture 81 No longer needed for SC-900 exam
Lecture 82 Describe privileged access management
Lecture 83 Describe customer lockbox
Lecture 84 Describe the purpose of eDiscovery
Lecture 85 Describe the capabilities of the content search tool
Lecture 86 Describe the core eDiscovery workflow
Lecture 87 Describe the advanced eDiscovery workflow
Section 18: Additional – Describe the audit capabilities in Microsoft 365
Lecture 88 Describe the core audit capabilities of M365
Lecture 89 Describe purpose and value of Advanced Auditing
Section 19: Bonus – Describe endpoint security with Microsoft Intune
Lecture 90 Describe what Intune is
Lecture 91 Describe endpoint security with Intune
Lecture 92 The endpoint security with Microsoft Endpoint Manager admin center
Section 20: Bonus Lecture
Lecture 93 Bonus Lecture
This course is for you if you want to understand what is available security, compliance and identity on Azure and Microsoft 365.,By the end of this course, with some practice, you could enter (and hopefully pass) Microsoft’s official SC-900 exam.,Wouldn’t the "Microsoft Certified: Security, Compliance, and Identity Fundamentals" certification look good on your CV or resume?

Homepage

https://www.udemy.com/course/sc-900-microsoft-security-complianceidentity-fundamentals/
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me

Download from Fikper
https://fikper.com/xsMKdsAnCz/jrmya.Sc900.Microsoft.Security.Compliance.Identity.Feb.2023.part1.rar.html
https://fikper.com/iS1RKXVtDl/jrmya.Sc900.Microsoft.Security.Compliance.Identity.Feb.2023.part2.rar.html
https://fikper.com/cyA9DavMQP/jrmya.Sc900.Microsoft.Security.Compliance.Identity.Feb.2023.part3.rar.html

DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET

DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM

DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM

Links are Interchangeable – No Password – Single Extraction