Autoplay
Autocomplete
Previous Lesson
Complete and Continue
SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Course Introduction
Traditional War & Cyber Security (1:49)
Course Introduction (4:16)
Module 1: Describe the Concepts of Security, Compliance and Identity
Chapter 1 - Security concepts and methodologies - Introduction (1:06)
Zero Trust - Guidelines (2:31)
Zero Trust - Six Foundational Pillars (3:46)
Shared Responsibility Model (5:30)
Defense in Depth (2:57)
The CIA Triad (5:49)
Describe Common Threats (5:34)
Describe Encryption , hashing and Signing - I (4:07)
Describe Encryption , hashing and Signing - II (3:40)
Lesson Conclusion (1:10)
Microsoft security and compliance principles - Lesson Introduction (0:40)
Microsoft's Privacy Principles (1:57)
What is Service Trust Portal (1:38)
Azure Compliance Documentation (1:29)
Module 1: Chapter Summary (0:20)
Quiz 1
Module 2: Describe the Concepts and Capabilities of Microsoft identity and Access
Describe identity concepts - introduction (0:59)
Common identity attacks (4:44)
Identity As a Security perimeter (4:11)
Four pillars of identity (6:13)
Modern authentication and the role of the identity (3:00)
SSO and the Concept of Federation (3:56)
The concept of directory services and Active Directory (3:27)
Describe the basic services and identity types - Introduction (1:06)
Describe Azure Active Directory (3:20)
Azure AD Editions (3:59)
Describe the Azure AD identity types (8:07)
Difference between system and user assigned managed identity (3:07)
Describe the types external identities (5:14)
Describe the concept of hybrid Identities (3:57)
Describe the authentication capabilities of Azure - Introduction (1:18)
Describe the different authentication methods (2:52)
Security defaults and MFA (4:16)
MFA in Azure AD - Part 1 (2:03)
MFA in Azure AD - Part 2 (2:53)
Windows Hello (3:03)
Why is Windows Hello safer than a password (1:56)
Self-service password reset in Azure AD (5:12)
Password protection and management capabilities of Azure AD (5:02)
Protecting against password spray (2:01)
Hybrid security (2:10)
Describe the access management capabilities of AzureAD (1:04)
Conditional access in Azure AD (3:56)
Conditional access in Azure AD - II (5:51)
Conditional access in Azure AD - III (2:37)
Azure AD Roles and Custom Roles (3:25)
Chapter Summary (0:51)
Describe the identity protection and governance capabilties of Azure AD (0:57)
What is Identity Governance (1:21)
What is Identity lifecycle (3:48)
Access Lifecycle (1:34)
Privileged access lifecycle (2:15)
What is Entitlement management (2:34)
Azure AD access reviews (2:37)
Azure AD terms of use (2:09)
Capabilities of Privileged identity Management (2:29)
Quiz 2
Module 3: Describe the Capabilities of Microsoft Security Solutions
Module 3 - Introduction (1:53)
Network security groups (3:08)
Inbound and outbound security rules (3:59)
What is DDOS (2:35)
Azure DDOS protection plans and pricing (2:56)
Azure Firewall (4:00)
Azure Bastion Host (4:00)
Web Application Firewall (1:59)
Azure Encryption (2:38)
Azure Key vault (2:08)
Lesson Summary (1:40)
Cloud Security Posture management (4:19)
Azure Security Center (3:42)
Azure Security Center - Features (4:08)
Azure Security Center - Security Score (2:29)
Azure Defender (5:36)
Azure Security Benchmark (4:34)
Azure Security Center - Pricing Tiers (1:22)
Lesson Summary (1:18)
Describe the security capabilities of Azure Sentinel (1:40)
Define the concepts of SIEM, SOAR, XDR (5:54)
Azure Sentinel (2:18)
Azure Sentinel Features (5:34)
Azure Sentinel - Pricing
Lesson Summary (0:55)
Describe the threat protection capabilities of - Introduction (1:34)
Microsoft 365 Defender services - Introduction (3:08)
Microsoft Defender for Identity (4:49)
Microsoft Defender for O365 (5:08)
Microsoft Defender for Endpoint (4:25)
What is CASB (3:23)
The Cloud App Security framework (1:50)
Microsoft Cloud App Security architecture (2:34)
O365 Cloud App security And Azure AD Cloud App Discovery (1:22)
Chapter Summary (1:23)
Security management capabilities of M365 - Intro (1:31)
Microsoft 365 Security Center - Intro (4:52)
How to use Microsoft Secure Score (2:33)
Differences between the Azure and Microsoft Secure Score (1:27)
Managing Incidents (1:56)
Chapter Summary (0:38)
Describe endpoint security with Microsoft Intune - Introduction (0:22)
What is Intune (1:55)
MDM and MAM (2:38)
Endpoint security with Intune (6:40)
Chapter Summary (1:22)
Quiz 3
Module 4: Describe the Capabilities of Microsoft Compliance Solutions
Module 4 introduction (1:26)
Common compliance needs (2:06)
Common compliance regulations (2:38)
Compliance Center (2:24)
What is Compliance Manager (1:47)
What are Controls (1:10)
What are Assessments (2:16)
Understand Compliance score (3:08)
Chapter Summary (0:50)
The information protection and governance capabiliities of Microsoft 365 (1:15)
Know your data, protect your data, and govern your data (2:53)
Data classification capabilities of compliance Center (5:06)
Content Explorer and Activity Explorer (3:57)
Sensitivity labels (4:42)
Label Policies (2:39)
Data Loss Prevention (3:08)
Data Loss Prevention on endpoints and teams (2:19)
Retention Polices and Retention Labels (4:03)
Records Management (2:31)
Chapter Summary (0:59)
The insider risk capabilities in Microsoft - Introduction (1:01)
Insider Risk Management (2:29)
Insider Risk Management Workflow (2:51)
Communications Compliance (4:37)
Informaiton barriers in Microsoft Teams (2:27)
Privileged access management (3:57)
Customer Lockbox (3:54)
Lesson Summary (1:11)
eDiscovery capabilities of Microsoft M365 - Introduction (0:56)
The Purpose of eDiscovery-edited (1:37)
The capabilities of the content search (5:09)
The Core eDiscovery Workflow (6:25)
The advanced eDiscovery workflow (3:31)
Lesson Summary (0:55)
The audit capabilities of Microsoft 365- introduction (0:45)
The core audit capabilities of M365 (3:32)
What are the Advance Auditing Capabilities (5:09)
High Bandwidth for O365 APi Activities (1:51)
Lesson Summary (1:02)
Describe the resource governance capabilities - Introduction (0:53)
Resource Manager - Locks (2:04)
What is Azure Blueprints (2:49)
What is Azure Policy (3:30)
Difference between Azure Policy and RBAC (1:41)
Cloud Adoption Framework (1:50)
Quiz 4
Module 5: SC-900 Certification - Updates
Authentication and Authorization - Introduction (0:37)
Authentication Authorization and Protocols (6:44)
Azure AD Authentication Options (8:50)
Defense in Depth
Download
Azure defense in depth
Complete and Continue
Become a Member and Get
Unlimited Access
to 340+ Top Cyber Security Courses.
UPGRADE NOW