Udemy – SC900 Microsoft Security Compliance Identity Feb 2023

Udemy – SC900 Microsoft Security Compliance Identity Feb 2023
English | Tutorial | Size: 2.18 GB


Learn about SCI in Microsoft Azure, Azure Sentinel, Microsoft 365 Defender, InTune and MS Purview. For exam SC-900.

What you’ll learn
Describe the concepts of security, compliance, and identity
Describe the capabilities of Microsoft identity and access management solutions
Describe the capabilities of Microsoft security solutions
Describe the capabilities of Microsoft compliance solutions

Requirements
You need to know how to use a computer, and hopefully know how to use a spreadsheet.
No prior knowledge of Microsoft Azure or 365 is required.
Also, no prior knowledge of security, compliance or identity is required.
You can access Azure or Microsoft 365 Centers on Windows, iOS or Linux.
There is a 30-day refund guarantee of this Udemy course (see Udemy’s refund policy).
Why not have a look at the curriculum below and see what you can learn?

Description
This course covers the content required for the SC-900 certification exam, current as per the SC-900 exam updates of 4 November 2022 and 7 February 2023.What do people like you say about this course?Syed says: “I have cleared with 813. Your Explanations where informative and detailed. Thank you!”Deepthi says: “Topics are explained clearly and they are easy to understand. For SC-900 this is one of the best course in Udemy.”Kunjar says: “The short quiz between chapters is helpful. Practice test at the end of the course is a confidence booster.”This course is the foundation for the Microsoft Certificate SC-900 “Microsoft Security, Compliance, and Identity Fundamentals” across cloud-based and related Microsoft services.We’ll start off with looking at the concepts of Security, Compliance and Identity (SCI). We’ll look at security methodologies, security concepts and Microsoft Security and compliance principles. We’ll then look at Microsoft Identity and Access Management Solutions. We’ll look at identity principles and concepts, basic identity and identity types, and authentication, access management and identity protection and governance capabilities of Azure Active Directory.Next up is Microsoft Security Solutions. This includes basic security capabilities and security management capabilities of Azure, and also Azure Sentinel, Microsoft 365 Defender, InTune and Microsoft 365.The final item is Microsoft Compliance Solutions. In this section, we’ll largely concentrate on Microsoft Purview compliance (previously known as Microsoft 365 compliance). We’ll look at information protection and data lifecycle management capabilities, and inside risk. We’ll end with looking at the resource governance capabilities in Azure.No prior knowledge is required – we’ll even see how to get a free Microsoft Azure and Microsoft 365 and Purview compliance trial!There are regular quizzes to help you remember the information, so you can be sure that you are learning.Once you have completed this course, you will have a good introductory knowledge of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. And with some practice, you could even go for the official Microsoft certification SC-900 – wouldn’t that look good on your CV or resume? And if you are an American college student, you might even get college credit for passing that exam.So, without any further ado, let’s have a look at how you can use the Udemy interface, and then we’ll have a look at the objectives for the exam and therefore the syllabus for this course. And if you are an American college student, you might even get college credit for passing that exam.

Overview
Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Welcome to Udemy

Lecture 3 How to get the best out of your Udemy course

Lecture 4 Do you want auto-translated subtitles in more languages?

Lecture 5 Curriculum

Lecture 6 Resources

Section 2: Part 1 – Describe the Concepts of Security, Compliance, and Identity

Lecture 7 2. Define defense in depth

Lecture 8 3. Describe the Zero-Trust methodology

Lecture 9 On Prem versus the Cloud

Lecture 10 1. Describe the shared responsibility model

Lecture 11 4. Describe encryption and hashing

Lecture 12 47. Describe Microsoft’s privacy principles

Lecture 13 46. Describe the offerings of the service trust portal

Lecture 14 -. Describe common threats

Lecture 15 5. Describe compliance concepts

Lecture 16 -. Describe cloud adoption framework

Section 3: Part 2 – Define identity principles/concepts

Lecture 17 6. Define identity as the primary security perimeter

Lecture 18 7, 8. Define authentication and authorization

Lecture 19 9. Describe what identity providers are

Lecture 20 10. Describe what Active Directory is

Lecture 21 11. Describe the concept of Federated services

Lecture 22 -. Define common Identity Attacks

Section 4: Part 2 – Describe the basic identity services and identity types of Azure AD

Lecture 23 12. Describe what Azure Active Directory is

Lecture 24 13. Describe Azure AD identity type

Lecture 25 14. Describe what hybrid identity is

Lecture 26 15. Describe the different external identity types

Section 5: Part 2 – Authentication and access management capabilities of Azure AD

Lecture 27 16, 17. Different AuthN methods, inc. Multi-factor Authentication

Lecture 28 18. Describe self-service password reset

Lecture 29 19. Describe password protection and management capabilities

Lecture 30 -. Describe Windows Hello for Business

Lecture 31 20. Describe what conditional access is, and its uses and benefits

Lecture 32 21. Describe the benefits of Azure AD roles

Lecture 33 22. Describe the benefits of Azure AD role-based access control

Section 6: Part 2 – Describe the identity protection & governance capabilities of Azure AD

Lecture 34 23. Describe what identity governance is

Lecture 35 24a. Describe what entitlement management is

Lecture 36 24b. Describe what access reviews is

Lecture 37 25. Describe the capabilities of PIM

Lecture 38 26. Describe Azure AD Identity Protection

Section 7: Part 3 – Describe basic security capabilities in Azure

Lecture 39 31. Describe Azure Network Security groups

Lecture 40 27. Describe Azure DDoS protection

Lecture 41 28. Describe what Azure Firewall is

Lecture 42 32. Describe what Azure Bastion is

Lecture 43 29. Describe what Web Application Firewall is

Lecture 44 30. Describe Network Segmentation with Azure Virtual Networks (VNets)

Lecture 45 33. Describe ways Azure encrypts data

Section 8: Part 3 – Describe security management capabilities of Azure

Lecture 46 35. Describe Microsoft Defender for Cloud

Lecture 47 35. Describe secure score in Microsoft Defender for Cloud

Lecture 48 36. Describe enhanced security of Microsoft Defender for Cloud

Lecture 49 34. Describe Cloud security posture management (CSPM)

Lecture 50 37. Describe security baselines for Azure

Section 9: Part 3 – Describe security capabilities of Azure Sentinel

Lecture 51 38. Define the concepts of SIEM, SOAR, XDR

Lecture 52 39. Describe how Azure Sentinel provides integrated threat protection

Section 10: Part 3 – Describe threat protection with Microsoft 365 Defender

Lecture 53 40. Describe Microsoft 365 Defender services

Lecture 54 44. Describe Microsoft Defender for Identity (formerly Azure ATP)

Lecture 55 41. Describe Microsoft Defender for Office 365 (formerly Office 365 ATP)

Lecture 56 42. Describe Microsoft Defender for Endpoint, former Microsoft Defender ATP

Lecture 57 43. Describe Microsoft Defender for Cloud Apps

Section 11: Part 3 – Describe security management capabilities of Microsoft 365

Lecture 58 45. Describe security reports and dashboards

Lecture 59 45. Describe how to use Microsoft Secure Score

Lecture 60 45. Describe incidents and incident management capabilities

Lecture 61 45. Describe the Microsoft 365 Defender Portal (Security Center)

Section 12: Part 4 – Describe compliance management capabilities in Microsoft 365/Purview

Lecture 62 Microsoft 365 and Microsoft Purview

Lecture 63 48. Describe the compliance portal

Lecture 64 49. Describe compliance manager

Lecture 65 50. Describe use and benefits of compliance score

Section 13: Part 4 – Information protection and governance capabilities of MS 365/Purview

Lecture 66 51. Describe data classification capabilities

Lecture 67 53. Describe sensitivity labels

Lecture 68 52. Describe the value of content explorer and activity explorer

Lecture 69 56. Describe Retention Polices and Retention Labels

Lecture 70 55. Describe Records Management

Lecture 71 54. Describe Data Loss Prevention

Section 14: Part 4 – Describe insider risk capabilities in Microsoft 365/Purview

Lecture 72 57. Describe Insider risk management solution

Lecture 73 58. Describe communication compliance

Lecture 74 59. Describe information barriers

Section 15: Part 4 – Describe resource governance capabilities in Azure

Lecture 75 -. Describe the use of Azure Resource locks

Lecture 76 60. Define Azure Policy and describe its use cases

Lecture 77 61. Describe what Azure Blueprints is

Lecture 78 62. Describe the Microsoft Purview unified data governance solution

Section 16: Congratulations

Lecture 79 What’s Next?

Lecture 80 Well done

Section 17: Additional – insider risk and the eDiscovery capabilities of Microsoft 365

Lecture 81 No longer needed for SC-900 exam

Lecture 82 Describe privileged access management

Lecture 83 Describe customer lockbox

Lecture 84 Describe the purpose of eDiscovery

Lecture 85 Describe the capabilities of the content search tool

Lecture 86 Describe the core eDiscovery workflow

Lecture 87 Describe the advanced eDiscovery workflow

Section 18: Additional – Describe the audit capabilities in Microsoft 365

Lecture 88 Describe the core audit capabilities of M365

Lecture 89 Describe purpose and value of Advanced Auditing

Section 19: Bonus – Describe endpoint security with Microsoft Intune

Lecture 90 Describe what Intune is

Lecture 91 Describe endpoint security with Intune

Lecture 92 The endpoint security with Microsoft Endpoint Manager admin center

Section 20: Bonus Lecture

Lecture 93 Bonus Lecture

This course is for you if you want to understand what is available security, compliance and identity on Azure and Microsoft 365.,By the end of this course, with some practice, you could enter (and hopefully pass) Microsoft’s official SC-900 exam.,Wouldn’t the “Microsoft Certified: Security, Compliance, and Identity Fundamentals” certification look good on your CV or resume?
course info

Buy Long-term Premium Accounts To Support Me & Max Speed


RAPIDGATOR
rapidgator.net/file/a9c1b0c2ace16caaa7511411a876592a/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part1.rar.html
rapidgator.net/file/7c4d10fe9cd727c14f0754fcb61c4966/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part2.rar.html
rapidgator.net/file/89ed7a0a9df6c96fbb998a1d2a4f3963/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part3.rar.html
rapidgator.net/file/c25b6825613da7b108291413a9301e90/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part4.rar.html

NITROFLARE
nitroflare.com/view/7461CDE067CB5F1/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part1.rar
nitroflare.com/view/6AE2A95EB2DD8B2/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part2.rar
nitroflare.com/view/31ECFB8CF775889/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part3.rar
nitroflare.com/view/7904312D9737AD6/Udemy_SC900_Microsoft_Security_Compliance_Identity_Feb_2023.part4.rar

If any links die or problem unrar, send request to goo.gl/aUHSZc

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.