top of page

Related Courses

SC-900 MICROSOFT SECURITY COMPLIANCE AND IDENTITY Video Course

Price: 899 INR (12.00 USD) | Size: 8.27 GB | 2 DVDs | Duration : 7.00+ Hours | BRAND: Expert TRAINING | ENGLISH | DOWNLOAD

 

Table of contents

Chapter 1 : Introduction to the Course

Course Introduction

Chapter 2 : Module 1 - Describe the Concepts of Security, Compliance, and Identity

Security Concepts and Methodologies - Introduction

Zero Trust - Guidelines

Zero Trust – Six Foundational Pillars

The Shared Responsibility Models

Defense in Depth Strategy

The CIA Triad

Describe Common Threats

Describe Encryption, Hashing, and Signing - I

Describe Encryption, Hashing, and Signing – II

Summary

Microsoft Security and Compliance principles - Introduction

Microsoft's Privacy Principles

What is Service Trust Portal

Azure Compliance Documentation

Module 1: Section Summary

Chapter 3 : Module 2 - Describe the Concepts and Capabilities of Microsoft Identity and Access

Describe Identity Concepts - Introduction

Common Identity Attacks

Identity as a Security perimeter

Four Pillars of Identity

Modern Authentication and the Role of Identity Provider

SSO and the Concept of Federation

The Concept of Directory Services and Active Directory

Describe the Basic Services and Identity Types – Introduction

Describe Azure Active Directory

Azure AD Editions

Describe the Azure AD Identity types

Difference between System Assigned and User Assigned Managed Identity

Describe the Types of External Identities

Describe the Concept of Hybrid Identities

Describe the Authentication Capabilities of Azure – Introduction

Describe the Different Authentication Methods

Security Defaults and MFA

MFA in Azure AD - Part 1

Video 3.2: MFA in Azure AD - Part 2

Windows Hello

Why is Windows Hello Safer than a Password

Self-Service Password Reset in Azure AD

Password Protection and Management Capabilities of Azure AD

Protecting against Password Spray

Hybrid security

Describe the Access Management Capabilities of Azure AD

Conditional Access in Azure AD

Conditional Access in Azure AD – II

Conditional Access in Azure AD – III

Azure AD Roles and Custom Roles

Summary

Describe the Identity Protection and Governance Capabilities of Azure AD

What is Identity Governance

What is Identity Lifecycle

Access Lifecycle

Privileged Access lifecycle

What is Entitlement Management

Azure AD Access Reviews

Azure AD Terms of Use

Capabilities of Privileged Identity Management

Chapter 4 : Module 3 - Describe the Capabilities of Microsoft Security Solutions

Module Introduction

Network Security Groups

Inbound and Outbound Security Rules

What is DDOS

Azure DDOS Protection Plans and Pricing

Azure Firewall

Azure Bastion Host

Web Application Firewall

Azure Encryption

Azure Key Vault

Lesson Summary

Cloud Security Posture Management

Azure Security Center

Azure Security Center – Features

Azure Security Center - Security Score

Azure Defender

Azure Security Benchmark

Azure Security Center - Pricing Tier

Summary

Describe the Security Capabilities of Azure Sentinel

Define the Concepts of SIEM, SOAR, and XDR

Azure Sentinel

Azure Sentinel Features

Azure Sentinel – Pricing

Summary

Describe the Threat Protection Capabilities of Microsoft 365 – Introduction

Microsoft 365 Defender Services – Introduction

Microsoft Defender for Identity

Microsoft Defender for O365

Microsoft Defender for Endpoint

What is CASB

The Cloud App Security Framework

Microsoft Cloud App Security Architecture

O365 Cloud App Security and Azure AD Cloud App Discovery

Summary

Security Management Capabilities of M365 – Introduction

Microsoft 365 Security Center – Introduction

How to Use Microsoft Secure Score

Differences Between Azure and Microsoft Secure Score

Managing Incidents

Summary

Describe Endpoint Security with Microsoft Intune – Introduction

What is Intune

MDM and MAM

Endpoint Security with Intune

Summary

Chapter 5 : Module 4 - Describe the Capabilities of Microsoft Compliance Solutions

Module introduction

Common Compliance Needs

Common Compliance Regulations

Compliance Center

What is Compliance Manager

What are Controls

What are Assessments

Understand Compliance score

Summary

The Information Protection and Governance Capabilities of Microsoft 365

Know Your Data, Protect Your Data, and Govern Your Data

Data Classification Capabilities of Compliance Center

Content Explorer and Activity Explorer

Sensitivity Labels

Label Policies

Data Loss Prevention

Data Loss Prevention on Endpoints and Teams

Retention Polices and Retention Labels

Records Management

Summary

The Insider Risk Capabilities in Microsoft – Introduction

Insider Risk Management

Insider Risk Management Workflow

Communications Compliance

Information Barriers in Microsoft Teams

Privileged Access Management

Customer Lockbox

Summary

eDiscovery Capabilities of Microsoft M365 – Introduction

The Purpose of eDiscovery

The Capabilities of the Content Search

The Core eDiscovery Workflow

The Advanced eDiscovery Workflow

Summary

The Audit Capabilities of Microsoft 365 - Introduction

The Core Audit Capabilities of M365

What are the Advanced Auditing Capabilities

High Bandwidth for Office 365 API Activities

Summary

Describe the Resource Governance Capabilities - Introduction

Resource Manager – Locks

What is Azure Blueprint

What is Azure Policy

Difference between Azure Policy and RBAC

Cloud Adoption Framework

SC-900 MICROSOFT SECURITY COMPLIANCE AND IDENTITY Video Course

$18.00Price
Quantity
  • If you Select DVD It will delivery only in INDIA.

    Download Links Will Send to foreign Buyers If you select Download via email links.

    Download Links will send to your email address within 12 hours of purchase.

    You just click and download Instantly your course Anywhere from that Download links.

     

bottom of page