Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam

Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam
Prepare for the Microsoft Security Compliance and Identity Certification and pass!

Prepare for the Microsoft Security Compliance and Identity Certification and pass!

☁️ Introduction
🎤 00:00:00 Meet Your Instructor
🎤 00:06:41 What is the SC 900
🎤 00:06:45 Exam Guide

☁️ Security Methodologies
🎤 00:11:35 Zero Trust Model
🎤 00:13:15 Zero Trust Principles
🎤 00:14:07 Zero Trust Pillars
🎤 00:18:01 Zero Trust Assessment Tool
🎤 00:18:45 Follow Along Zero Trust Assessment Tool
🎤 00:21:07 Shared Responsibility Model
🎤 00:24:11 Defense In Depth
🎤 00:25:57 CIA Triad

☁️ Security Concepts
🎤 00:27:53 Common Threats
🎤 00:29:25 Vulnerabilities
🎤 00:30:40 Encryption
🎤 00:31:29 Cyphers
🎤 00:32:42 Cryptographic Keys
🎤 00:33:40 Hashing and Salting
🎤 00:35:45 Digital Signatures
🎤 00:38:17 In Transit vs At Rest
🎤 00:39:34 MFA
🎤 00:40:22 SIEM
🎤 00:42:04 SOAR
🎤 00:43:16 XDR
🎤 00:44:02 EDR
🎤 00:45:38 CASB
🎤 00:47:03 Security Posture
🎤 00:49:37 CSPM
🎤 00:50:58 JIT & JEP
🎤 00:52:07 Ingress vs Egress
🎤 00:52:45 Shadow It
🎤 00:53:32 AIR
🎤 00:54:47 Threat Modeling
🎤 00:55:35 STRIDE
🎤 00:56:45 Follow Along Microsoft Threat Modeling
🎤 00:58:14 IDS IPS
🎤 01:00:09 MITRE Attack Framework
🎤 01:01:04 Follow Along Mitre Attack Framework

☁️ Privacy
🎤 01:01:56 Microsoft Privacy Principles
🎤 01:03:03 Microsoft Privacy

☁️ Identity
🎤 01:05:35 Primary Security Perimeter
🎤 01:07:11 Identity Providers

☁️ Azure AD
🎤 01:08:52 Introduction to Auzre AD
🎤 01:11:16 Active Directory vs Azure AD
🎤 01:12:21 App Registrations
🎤 01:13:02 External Identities
🎤 01:16:21 Service Principle
🎤 01:17:32 Managed Identity
🎤 01:18:55 Device Management
🎤 01:21:15 MDM & MAM
🎤 01:22:15 Windows Hello
🎤 01:23:32 Azure AD Connect
🎤 01:24:35 SSPR
🎤 01:25:18 Password Protection
🎤 01:26:42 Identity Management Best Practices
🎤 01:27:32 Emergency Access Accounts

☁️ Azure AD Authentication
🎤 01:28:45 Authentication Methods
🎤 01:29:20 Microsoft Authenticator
🎤 01:29:47 Follow Along Microsoft Authenticator
🎤 01:30:39 Biometrics
🎤 01:31:29 FIDO and Security Keys
🎤 01:32:55 Open Authentication
🎤 01:34:02 Passwordless Authentication

☁️ Azure AD Management
🎤 01:35:29 Conditional Access
🎤 01:38:28 Azure AD Roles
🎤 01:39:13 RBAC

☁️ Azure AD Protection Governance
🎤 01:40:32 Identity Governance
🎤 01:41:24 HCM
🎤 01:42:23 Identity Lifecycle
🎤 01:43:54 Access Lifecycle
🎤 01:44:45 Privilege Access Lifecycle
🎤 01:45:22 Entitlement Management
🎤 01:46:52 PIM
🎤 01:47:50 Identity Protection
🎤 01:48:37 Detection and Remediation
🎤 01:50:02 Investigation

☁️ Azure NSG
🎤 01:51:13 NSG Rules
🎤 01:52:14 Default Security Rules
🎤 01:52:54 Security Rules Logic
🎤 01:55:00 NSG Combinations
🎤 01:56:53 NSG CheatSheet

☁️ Azure Firewall
🎤 01:58:16 Azure Firewall

☁️ Azure DDoS Protection
🎤 01:59:36 Azure Ddos Protection

☁️ Azure Bastion
🎤 02:01:53 Azure Bastion

☁️ Azure WAF
🎤 02:03:35 Azure WAF

☁️ Encryption
🎤 02:05:04 Encryption Overview
🎤 02:05:48 Azure Disk Encryption
🎤 02:06:42 TDE
🎤 02:07:34 Key Vault

☁️ Azure Security Center
🎤 02:09:03 Azure Security Benchmark
🎤 02:09:53 Azuire Security Center
🎤 02:11:27 Azure Security Benchmark Detailed

☁️ Azure Defender
🎤 02:14:10 Azure Defender

☁️ Azure Sentinel
🎤 02:17:05 Azure Sentinel
🎤 02:18:15 Data Sources
🎤 02:18:52 Workbooks
🎤 02:19:44 Sentinel Features
🎤 02:21:39 Sentinel Pricing

☁️ M365 Defender
🎤 02:22:04 M365
🎤 02:22:48 M365 Defender
🎤 02:23:38 Secure Score
🎤 02:24:11 Defender for Endpoint
🎤 02:26:20 Security Reports
🎤 02:27:37 Defender for Indentity
🎤 02:29:09 Defender for Office 365
🎤 02:31:59 MCAS

☁️ Microsoft Endpoint Manager
🎤 02:34:41 Microsoft Endpoint Manager

☁️ Compliance
🎤 02:36:09 Regulatory Compliance
🎤 02:37:29 M365 Compliance Center
🎤 02:38:16 Azure Trust Center
🎤 02:38:55 Compliance Manager
🎤 02:40:39 Follow Along Compliance Manager
🎤 02:41:50 Compliance Programs

☁️ Protection and Governance
🎤 02:44:34 MIP
🎤 02:45:17 Know Protect Prevent
🎤 02:47:34 GIP
🎤 02:48:20 Sensitive Information Types
🎤 02:49:30 Trainable Classifiers
🎤 02:50:37 Content Explorer
🎤 02:51:26 Activity Explorer
🎤 02:52:09 Sensitivity Labels
🎤 02:54:25 Label Policies
🎤 02:56:00 Retention Labels and Policies
🎤 02:56:39 Records Management
🎤 02:57:58 DLP

☁️ Risk Capabilities
🎤 02:58:33 Insider Risk Management
🎤 03:01:26 Communication Compliance
🎤 03:03:59 Information Barriers
🎤 03:05:05 Privilege Access Management
🎤 03:06:01 Customer Lockbox
🎤 03:06:59 eDiscovery
🎤 03:07:52 Core eDiscovery Workflow
🎤 03:08:40 Content Search and Holds
🎤 03:09:45 Advanced eDiscovery Workflow
🎤 03:10:19 M365 Audit

☁️ Azure Security Concepts
🎤 03:11:20 Resource Locks
🎤 03:12:06 Resource Tags
🎤 03:13:02 Azure Blueprints
🎤 03:14:26 Azure Policy
🎤 03:16:07 Cloud Adoption Framework
🎤 03:18:38 Well Architected Framework
🎤 03:20:27 Microsoft Security Best Practices
🎤 03:21:31 Follow Along Microsoft Security Best Practices
🎤 03:22:46 SAS
🎤 03:24:41 CORS
🎤 03:26:29 SDL

Suggest:

Top 4 Programming Languages to Learn In 2019

Top 4 Programming Languages to Learn in 2019 to Get a Job

Dart Programming Tutorial - Full Course

Introduction to Functional Programming in Python

There Is No Best Programming Language

Python Django Tutorial 2018 for Beginners