Login: Password:  Do not remember me

Categories




E-Books / Video TrainingSc-900 Microsoft Security, Compliance, & Identity With Sims



Sc-900 Microsoft Security, Compliance, & Identity With Sims
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.30 GB | Duration: 9h 51m
Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7


Get prepared for the SC-900 exam with instructor led labs and hands on online simulations available 24/7
What you'll learn
Learn the concepts and perform hands on activities needed to pass the SC-900 exam
Gain a tremendous amount of knowledge involving securing Microsoft 365 / Azure Services
Get loads of hands on experience with securing Microsoft 365 / Azure Services
Utilize hands on simulations that can be access anytime, anywhere!
Requirements
Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more then the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the courseUnderstanding the Microsoft EnvironmentHaving a Solid Foundation of Active Directory DomainsHaving a Solid Foundation of RAS, DMZ, and VirtualizationHaving a Solid Foundation of the Microsoft Cloud ServicesQuestions for John ChristopherPerforming hands on activitiesIMPORTANT Using Assignments in the courseCreating a free Microsoft 365 Azure AD AccountGetting your free Azure creditDescribe security and compliance conceptsDescribe the shared responsibility modelDescribe defense in depthDescribe the Zero-Trust modelDescribe encryption and hashingDescribe compliance conceptsDefine identity conceptsDefine identity as the primary security perimeterDefine authenticationDefine authorizationDescribe identity providers and the concept of FederationDescribe Active DirectoryDescribe the basic identity services and identity types of Azure ADDescribe Azure ADDescribe Azure AD identities including external identitiesDescribe hybrid identityDescribe the authentication capabilities of Azure ADDescribe the authentication methods available in Azure ADDescribe Multi-factor AuthenticationDescribe self-service password resetDescribe password protection and management capabilities available in Azure ADDescribe access management capabilities of Azure ADDescribe conditional accessDescribe the benefits of Azure AD rolesDescribe the benefits of Azure AD role-based access controlDescribe the identity protection and governance capabilities of Azure ADDescribe identity governance in Azure ADDescribe entitlement managementDescribe access reviewsDescribe the capabilities of Azure AD Privileged Identity Management (PIM)Implementing Azure AD Privileged Identity Management (PIM)Describe Azure AD Identity ProtectionDescribe basic security capabilities in AzureVisualizing general Azure networkingDescribe Azure DDoS protectionDescribe Azure FirewallDescribe Network Segmentation with VNetDescribe Azure Network Security groupsCreate a virtual machine in AzureDescribe Azure Bastion and JIT AccessDescribe ways Azure encrypts dataDescribe security management capabilities of AzureDescribe Microsoft Defender for Cloud & Cloud security posture management (CSPM)Describe the enhanced security features of Microsoft Defender for CloudDescribe security baselines for AzureDescribe security capabilities of Microsoft SentinelDefine the concepts of SIEM and SOARSetting up a log analytics workspace for using SentinelDescribe how Microsoft Sentinel provides integrated threat managementDescribe threat protection with Microsoft 365 DefenderDescribe Microsoft 365 Defender servicesDescribe Microsoft Defender for Office 365Describe Microsoft Defender for EndpointDescribe Microsoft Defender for Cloud AppsUsing Microsoft Defender for Cloud Apps for policy creationDescribe Microsoft Defender for IdentityBasics of setting up Microsoft Defender for IdentityDescribe the Microsoft 365 Defender portalDescribe Microsoft's Service Trust Portal and privacy principlesDescribe the offerings of the Service Trust portalDescribe Microsoft's privacy principlesDescribe the compliance management capabilities of Microsoft PurviewDescribe the Microsoft Purview compliance portalDescribe compliance managerDescribe the use and benefits of compliance scoreDescribe information protection & data lifecycle management of Microsoft PurviewDescribe data classification capabilitiesDescribe the benefits of content explorer and activity explorerDescribe sensitivity labelsBasics of using sensitivity labelsDescribe Data Loss Prevention (DLP)Basics of using Data Loss Prevention (DLP)Describe Records ManagementDescribe Retention Polices and Retention LabelsDescribe insider risk capabilities in Microsoft PurviewDescribe Insider Risk ManagementDescribe communication complianceDescribe information barriersDescribe resource governance capabilities in AzureDescribe Azure PolicyDescribe Azure BlueprintsDescribe the capabilities of the Microsoft Purview governance portalFinishing UpWhere do I go from here?
Overview
Section 1: Introduction
Lecture 1 Welcome to the course!
Lecture 2 Understanding the Microsoft Environment
Lecture 3 Having a Solid Foundation of Active Directory Domains
Lecture 4 Having a Solid Foundation of RAS, DMZ, and Virtualization
Lecture 5 Having a Solid Foundation of the Microsoft Cloud Services
Lecture 6 Questions for John Christopher
Section 2: Performing hands on activities
Lecture 7 IMPORTANT Using Assignments in the course
Lecture 8 Creating a free Microsoft 365 Azure AD Account
Lecture 9 Getting your free Azure credit
Section 3: Describe security and compliance concepts
Lecture 10 Describe the shared responsibility model
Lecture 11 Describe defense in depth
Lecture 12 Describe the Zero-Trust model
Lecture 13 Describe encryption and hashing
Lecture 14 Describe compliance concepts
Section 4: Define identity concepts
Lecture 15 Define identity as the primary security perimeter
Lecture 16 Define authentication
Lecture 17 Define authorization
Lecture 18 Describe identity providers and the concept of Federation
Lecture 19 Describe Active Directory
Section 5: Describe the basic identity services and identity types of Azure AD
Lecture 20 Describe Azure AD
Lecture 21 Describe Azure AD identities including external identities
Lecture 22 Describe hybrid identity
Section 6: Describe the authentication capabilities of Azure AD
Lecture 23 Describe the authentication methods available in Azure AD
Lecture 24 Describe Multi-factor Authentication
Lecture 25 Describe self-service password reset
Lecture 26 Describe password protection and management capabilities available in Azure AD
Section 7: Describe access management capabilities of Azure AD
Lecture 27 Describe conditional access
Lecture 28 Describe the benefits of Azure AD roles
Lecture 29 Describe the benefits of Azure AD role-based access control
Section 8: Describe the identity protection and governance capabilities of Azure AD
Lecture 30 Describe identity governance in Azure AD
Lecture 31 Describe entitlement management
Lecture 32 Describe access reviews
Lecture 33 Describe the capabilities of Azure AD Privileged Identity Management (PIM)
Lecture 34 Implementing Azure AD Privileged Identity Management (PIM)
Lecture 35 Describe Azure AD Identity Protection
Section 9: Describe basic security capabilities in Azure
Lecture 36 Visualizing general Azure networking
Lecture 37 Describe Azure DDoS protection
Lecture 38 Describe Azure Firewall
Lecture 39 Describe Network Segmentation with vNet
Lecture 40 Describe Azure Network Security groups
Lecture 41 Create a virtual machine in Azure
Lecture 42 Describe Azure Bastion and JIT Access
Lecture 43 Describe ways Azure encrypts data
Section 10: Describe security management capabilities of Azure
Lecture 44 Describe Microsoft Defender for Cloud & Cloud security posture management (CSPM)
Lecture 45 Describe the enhanced security features of Microsoft Defender for Cloud
Lecture 46 Describe security baselines for Azure
Section 11: Describe security capabilities of Microsoft Sentinel
Lecture 47 Define the concepts of SIEM and SOAR
Lecture 48 Setting up a log analytics workspace for using Sentinel
Lecture 49 Describe how Microsoft Sentinel provides integrated threat management
Section 12: Describe threat protection with Microsoft 365 Defender
Lecture 50 Describe Microsoft 365 Defender services
Lecture 51 Describe Microsoft Defender for Office 365
Lecture 52 Describe Microsoft Defender for Endpoint
Lecture 53 Describe Microsoft Defender for Cloud Apps
Lecture 54 Using Microsoft Defender for Cloud Apps for policy creation
Lecture 55 Describe Microsoft Defender for Identity
Lecture 56 Basics of setting up Microsoft Defender for Identity
Lecture 57 Describe the Microsoft 365 Defender portal
Section 13: Describe Microsoft's Service Trust Portal and privacy principles
Lecture 58 Describe the offerings of the Service Trust portal
Lecture 59 Describe Microsoft's privacy principles
Section 14: Describe the compliance management capabilities of Microsoft Purview
Lecture 60 Describe the Microsoft Purview compliance portal
Lecture 61 Describe compliance manager
Lecture 62 Describe the use and benefits of compliance score
Section 15: Describe information protection & data lifecycle management of Microsoft Purview
Lecture 63 Describe data classification capabilities
Lecture 64 Describe the benefits of content explorer and activity explorer
Lecture 65 Describe sensitivity labels
Lecture 66 Basics of using sensitivity labels
Lecture 67 Describe Data Loss Prevention (DLP)
Lecture 68 Basics of using Data Loss Prevention (DLP)
Lecture 69 Describe Records Management
Lecture 70 Describe Retention Polices and Retention Labels
Section 16: Describe insider risk capabilities in Microsoft Purview
Lecture 71 Describe Insider Risk Management
Lecture 72 Describe communication compliance
Lecture 73 Describe information barriers
Section 17: Describe resource governance capabilities in Azure
Lecture 74 Describe Azure Policy
Lecture 75 Describe Azure Blueprints
Lecture 76 Describe the capabilities of the Microsoft Purview governance portal
IT people interested in learning and passing the Microsoft SC-900 exam!,IT people interested in learning a tremendous amount about security in Microsoft 365 / Azure Services
https://www.udemy.com/course/sc-900-microsoft-security-compliance-identity-with-sims/


Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


Download From 1DL
https://1dl.net/zaj6pr6cuvgr/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part1.rar.html
https://1dl.net/y5vt2s9jdzcy/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part2.rar.html
https://1dl.net/hwsuq45yz78p/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part3.rar.html
https://1dl.net/s19d3wc27xva/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part4.rar.html
https://1dl.net/gru14x1nrxw6/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part5.rar.html
https://1dl.net/i9gcp1zkk6g0/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part6.rar.html
Sc-900 Microsoft Security, Compliance, & Identity With Sims
https://rapidgator.net/file/44c96503ddade8575ee2936d96422846/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part1.rar.html
https://rapidgator.net/file/94e62986c431a63d2fe9b34ad732d649/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part2.rar.html
https://rapidgator.net/file/b6d2f1f6c957671cc00e4eaedfdae8bc/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part3.rar.html
https://rapidgator.net/file/9f2e68c51999ae3c00dc6c89666f6c38/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part4.rar.html
https://rapidgator.net/file/afa50ed104a33b04dba7d868f8a87223/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part5.rar.html
https://rapidgator.net/file/cd0d85e796bc4798288c02338028054a/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part6.rar.html
Sc-900 Microsoft Security, Compliance, & Identity With Sims
https://uploadgig.com/file/download/cfd3f656575Aa048/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part1.rar
https://uploadgig.com/file/download/700d843985Be04f6/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part2.rar
https://uploadgig.com/file/download/9eC1A80d1ed2eC4f/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part3.rar
https://uploadgig.com/file/download/d651f1C038dffd42/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part4.rar
https://uploadgig.com/file/download/c94596db1bb8c194/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part5.rar
https://uploadgig.com/file/download/81487318E0D86B77/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part6.rar
Sc-900 Microsoft Security, Compliance, & Identity With Sims
https://nitroflare.com/view/3E38D995FEBC924/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part1.rar
https://nitroflare.com/view/E453485BA4F26ED/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part2.rar
https://nitroflare.com/view/84D2CBD13E7313A/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part3.rar
https://nitroflare.com/view/300D6E808359A17/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part4.rar
https://nitroflare.com/view/AAA9E208EEBFBD4/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part5.rar
https://nitroflare.com/view/569F8CF0C10977B/hhvoa.Sc900.Microsoft.Security.Compliance..Identity.With.Sims.part6.rar

Links are Interchangeable - No Password - Single Extraction


[related-news]

Related News

    {related-news}
[/related-news]

Comments (0)

Search



Updates




Friend Sites


» TinyDL
» EbookTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)