Price: 899 INR (12.00 USD) | Size: 8.27 GB | 2 DVDs | Duration : 7.00+ Hours | BRAND: Expert TRAINING | ENGLISH | DOWNLOAD
Table of contents
Chapter 1 : Introduction to the Course
Course Introduction
Chapter 2 : Module 1 - Describe the Concepts of Security, Compliance, and Identity
Security Concepts and Methodologies - Introduction
Zero Trust - Guidelines
Zero Trust – Six Foundational Pillars
The Shared Responsibility Models
Defense in Depth Strategy
The CIA Triad
Describe Common Threats
Describe Encryption, Hashing, and Signing - I
Describe Encryption, Hashing, and Signing – II
Summary
Microsoft Security and Compliance principles - Introduction
Microsoft's Privacy Principles
What is Service Trust Portal
Azure Compliance Documentation
Module 1: Section Summary
Chapter 3 : Module 2 - Describe the Concepts and Capabilities of Microsoft Identity and Access
Describe Identity Concepts - Introduction
Common Identity Attacks
Identity as a Security perimeter
Four Pillars of Identity
Modern Authentication and the Role of Identity Provider
SSO and the Concept of Federation
The Concept of Directory Services and Active Directory
Describe the Basic Services and Identity Types – Introduction
Describe Azure Active Directory
Azure AD Editions
Describe the Azure AD Identity types
Difference between System Assigned and User Assigned Managed Identity
Describe the Types of External Identities
Describe the Concept of Hybrid Identities
Describe the Authentication Capabilities of Azure – Introduction
Describe the Different Authentication Methods
Security Defaults and MFA
MFA in Azure AD - Part 1
Video 3.2: MFA in Azure AD - Part 2
Windows Hello
Why is Windows Hello Safer than a Password
Self-Service Password Reset in Azure AD
Password Protection and Management Capabilities of Azure AD
Protecting against Password Spray
Hybrid security
Describe the Access Management Capabilities of Azure AD
Conditional Access in Azure AD
Conditional Access in Azure AD – II
Conditional Access in Azure AD – III
Azure AD Roles and Custom Roles
Summary
Describe the Identity Protection and Governance Capabilities of Azure AD
What is Identity Governance
What is Identity Lifecycle
Access Lifecycle
Privileged Access lifecycle
What is Entitlement Management
Azure AD Access Reviews
Azure AD Terms of Use
Capabilities of Privileged Identity Management
Chapter 4 : Module 3 - Describe the Capabilities of Microsoft Security Solutions
Module Introduction
Network Security Groups
Inbound and Outbound Security Rules
What is DDOS
Azure DDOS Protection Plans and Pricing
Azure Firewall
Azure Bastion Host
Web Application Firewall
Azure Encryption
Azure Key Vault
Lesson Summary
Cloud Security Posture Management
Azure Security Center
Azure Security Center – Features
Azure Security Center - Security Score
Azure Defender
Azure Security Benchmark
Azure Security Center - Pricing Tier
Summary
Describe the Security Capabilities of Azure Sentinel
Define the Concepts of SIEM, SOAR, and XDR
Azure Sentinel
Azure Sentinel Features
Azure Sentinel – Pricing
Summary
Describe the Threat Protection Capabilities of Microsoft 365 – Introduction
Microsoft 365 Defender Services – Introduction
Microsoft Defender for Identity
Microsoft Defender for O365
Microsoft Defender for Endpoint
What is CASB
The Cloud App Security Framework
Microsoft Cloud App Security Architecture
O365 Cloud App Security and Azure AD Cloud App Discovery
Summary
Security Management Capabilities of M365 – Introduction
Microsoft 365 Security Center – Introduction
How to Use Microsoft Secure Score
Differences Between Azure and Microsoft Secure Score
Managing Incidents
Summary
Describe Endpoint Security with Microsoft Intune – Introduction
What is Intune
MDM and MAM
Endpoint Security with Intune
Summary
Chapter 5 : Module 4 - Describe the Capabilities of Microsoft Compliance Solutions
Module introduction
Common Compliance Needs
Common Compliance Regulations
Compliance Center
What is Compliance Manager
What are Controls
What are Assessments
Understand Compliance score
Summary
The Information Protection and Governance Capabilities of Microsoft 365
Know Your Data, Protect Your Data, and Govern Your Data
Data Classification Capabilities of Compliance Center
Content Explorer and Activity Explorer
Sensitivity Labels
Label Policies
Data Loss Prevention
Data Loss Prevention on Endpoints and Teams
Retention Polices and Retention Labels
Records Management
Summary
The Insider Risk Capabilities in Microsoft – Introduction
Insider Risk Management
Insider Risk Management Workflow
Communications Compliance
Information Barriers in Microsoft Teams
Privileged Access Management
Customer Lockbox
Summary
eDiscovery Capabilities of Microsoft M365 – Introduction
The Purpose of eDiscovery
The Capabilities of the Content Search
The Core eDiscovery Workflow
The Advanced eDiscovery Workflow
Summary
The Audit Capabilities of Microsoft 365 - Introduction
The Core Audit Capabilities of M365
What are the Advanced Auditing Capabilities
High Bandwidth for Office 365 API Activities
Summary
Describe the Resource Governance Capabilities - Introduction
Resource Manager – Locks
What is Azure Blueprint
What is Azure Policy
Difference between Azure Policy and RBAC
Cloud Adoption Framework
SC-900 MICROSOFT SECURITY COMPLIANCE AND IDENTITY Video Course
If you Select DVD It will delivery only in INDIA.
Download Links Will Send to foreign Buyers If you select Download via email links.
Download Links will send to your email address within 12 hours of purchase.
You just click and download Instantly your course Anywhere from that Download links.