

Video Training → Microsoft Information Protection Administrator (SC-400)
Published by: voska89 on 26-10-2021, 19:15 |
0

Michael Brown, JS Padoan | Duration: 7:34 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 865 MB | Language: English + SUB
One of the key ingredients in having a secure enterprise is controlling information protection. These courses will show you how to use Microsoft information protection solutions to make sure your data is safe.
These courses cover the objectives of the SC-400 certification exam and can help you prepare.
Video Training → Microsoft Identity and Access Implementing an Identity Governance Strategy
Published by: voska89 on 26-10-2021, 19:15 |
0

Sahil Malik | Duration: 1:09 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 159 MB | Language: English + SUB
This course will teach you how to manage entitlements, perform access reviews, set up PIM, and monitor your AAD via logs.
Security and governance should be at the forefront of every responsible IT administrator. In this course, Implement an Identity Governance Strategy, you'll learn to manage and govern your Azure Active Directory or AAD. First, you'll explore entitlement management where we will understand catalogs, access packages, and user lifecycle management. Next, you'll discover important concepts such as access reviews and privileged identity management. Finally, you'll learn how to how to make the best use of the logs that AAD produces. When you're finished with this course, you'll have the skills and knowledge of implement an identity governance strategy needed to govern and manage your AAD.
Video Training → Microsoft Identity and Access Implementing an Authentication and Access Management Solution
Published by: voska89 on 26-10-2021, 19:14 |
0

Reza Salehi | Duration: 2:09 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 280 MB | Language: English + SUB
Are you an Azure Active Directory administrator? This course will teach you how to use MFA, conditional access, and identity protection to manage your identity solution.
Do you need to manage your identity solution in Microsoft Azure? In this course, Microsoft Identity and Access: Implementing an Authentication and Access Management Solution, you'll learn to manage identities in Azure AD. First, you'll explore how to secure Azure AD users with MFA. Next, you'll discover managing user authentication and conditional access. Finally, you'll learn how to manage Azure AD identity protection. When you're finished with this course, you'll have the skills and knowledge of Microsoft identity and access needed to implement an authentication and access management solution.
Video Training → Microsoft Identity and Access Implementing Access Management for Apps
Published by: voska89 on 26-10-2021, 19:14 |
0

Reza Salehi | Duration: 1:26 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 198 MB | Language: English + SUB
Are you an Azure Active Directory (AD) administrator? This course will teach you how applications can be added to your identity and access solution with application registration in Azure AD.
Applications can use Azure Active Directory identities to secure access to resources in the cloud. In this course, Microsoft Identity and Access: Implementing Access Management for Apps, you'll learn to add your applications to Azure AD identity solutions. First, you'll explore designing enterprise apps integration for SSO. Next, you'll discover how to implement and monitor these integrations. Finally, you'll learn how to implement app registrations in Azure AD. When you're finished with this course, you'll have the skills and knowledge of Azure Active Directory needed to implement access management for apps.
Video Training → Microsoft Endpoint Manager Package Software for Deployment with MECM and Intune
Published by: voska89 on 26-10-2021, 19:13 |
0

Greg Shields | Duration: 1:02 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 128 MB | Language: English + SUB
Step away from MECM and Intune as you explore the art and science of software packaging in this course.
At exactly the midpoint of this learning path, we have completed the steps necessary to build both an Intune and MECM environment, including their integration together. The second half of this learning path turns its attentions to actually using this environment. It begins with this course, which explores the tactics and techniques in software packaging -- all of which are needed to be successful in deploying software to devices via either half of Microsoft Endpoint Manager.
Video Training → Microsoft Endpoint Manager Inventory, QueriesCollections, and CMPivot with MECM
Published by: voska89 on 26-10-2021, 19:13 |
0

Greg Shields | Duration: 2:13 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 392 MB | Language: English + SUB
Explore the data collection and presentation side of Configuration Manager in this course as you customize hardware and software inventory, create queries and collections, and get to know the CMPivot tool.
The previous course finishes most of the foundational configurations to get an MECM primary site operational. But one final preparation involves the settings required to configure and customize hardware and software inventory collection. Enabling this data collection delivers access to an impressive range of machine characteristics. Understanding both the art and the science of then querying that data is arguably the most important and the most difficult part of the job.
Video Training → Microsoft Endpoint Manager Intune Co-management with Cloud Attach
Published by: voska89 on 26-10-2021, 19:13 |
0

Greg Shields | Duration: 2:15 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 341 MB | Language: English + SUB
Integrate Intune with MECM via Cloud Attach and Co-management, configure Tenant Attach and Client Attach, get introduced to Endpoint Analytics, and explore enrolling devices into Intune in this course.
Seven courses in, and this learning path finally gets around to the Microsoft Endpoint Manager integration between MECM and Intune. Delaying this topic to nearly the midpoint in the learning path was intentional, as the setup processes for MECM are so complex in nature. What results from their co-management interconnection is the ability to select which workload accomplishes each major category of activities.
Video Training → Microsoft Endpoint Manager Introduction and Lab Preparation
Published by: voska89 on 26-10-2021, 19:12 |
0

Greg Shields | Duration: 1:18 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 137 MB | Language: English
Get introduced to Microsoft Endpoint Manager (MEM), including Microsoft Endpoint Configuration Manager (MECM) and Microsoft Intune in this course.
Whether you're new to Microsoft Endpoint Manager, or have worked with it's many versions, you're surely aware of how complex any MEM implementation can be. The reach of this solution is so broad, and also so deep, that you almost have to know everything about MEM to truly appreciate anything about it.
Video Training → Microsoft Endpoint Manager Deploy an On-premises MECM Site
Published by: voska89 on 26-10-2021, 19:12 |
0

Greg Shields | Duration: 1:57 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 290 MB | Language: English + SUB
Walk through the design, installation, and initial configuration of a Microsoft Endpoint Configuration Manager (MECM) primary site in this course.
The central core of an MECM hierarchy is the site, and for a lot of environments it's the primary site. That site is the boundary of administration for all the devices, machines, and software that needs configuration control.
Video Training → Microsoft Endpoint Manager Deploy MECM Clients
Published by: voska89 on 26-10-2021, 19:11 |
0

Greg Shields | Duration: 0:59 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 167 MB | Language: English + SUB
Learn the best ways to prepare for, deploy clients, and monitor client health in this course.
With a primary site and site server now installed, this course turns the attention to MECM's clients. While MECM is a great solution for deploying software, there is as you might imagine some client-side bootstrapping that's required to install clients and begin communication. MECM supports at least six different ways to deploy client software, as well as innumerable ways to customize client behaviors once installed.


