Microsoft Security Compliance and Identity (SC-900) – Full Course PASS the Exam



Prepare for the Microsoft Security Compliance and Identity Certification and pass! ✏️ Course developed by Andrew Brown of ExamPro. Check out the ExamPro YouTube channel: https://www.youtube.com/ExamProChannel
πŸ”— ExamPro Cloud Obsessed Certification Training: https://www.exampro.co ☁️ Introduction
🎀 00:00:00 Meet Your Instructor
🎀 00:06:41 What is the SC 900
🎀 00:06:45 Exam Guide ☁️ Security Methodologies
🎀 00:11:35 Zero Trust Model
🎀 00:13:15 Zero Trust Principles
🎀 00:14:07 Zero Trust Pillars
🎀 00:18:01 Zero Trust Assessment Tool
🎀 00:18:45 Follow Along Zero Trust Assessment Tool
🎀 00:21:07 Shared Responsibility Model
🎀 00:24:11 Defense In Depth
🎀 00:25:57 CIA Triad ☁️ Security Concepts
🎀 00:27:53 Common Threats
🎀 00:29:25 Vulnerabilities
🎀 00:30:40 Encryption
🎀 00:31:29 Cyphers
🎀 00:32:42 Cryptographic Keys
🎀 00:33:40 Hashing and Salting
🎀 00:35:45 Digital Signatures
🎀 00:38:17 In Transit vs At Rest
🎀 00:39:34 MFA
🎀 00:40:22 SIEM
🎀 00:42:04 SOAR
🎀 00:43:16 XDR
🎀 00:44:02 EDR
🎀 00:45:38 CASB
🎀 00:47:03 Security Posture
🎀 00:49:37 CSPM
🎀 00:50:58 JIT & JEP
🎀 00:52:07 Ingress vs Egress
🎀 00:52:45 Shadow It
🎀 00:53:32 AIR
🎀 00:54:47 Threat Modeling
🎀 00:55:35 STRIDE
🎀 00:56:45 Follow Along Microsoft Threat Modeling
🎀 00:58:14 IDS IPS
🎀 01:00:09 MITRE Attack Framework
🎀 01:01:04 Follow Along Mitre Attack Framework ☁️ Privacy
🎀 01:01:56 Microsoft Privacy Principles
🎀 01:03:03 Microsoft Privacy ☁️ Identity
🎀 01:05:35 Primary Security Perimeter
🎀 01:07:11 Identity Providers ☁️ Azure AD
🎀 01:08:52 Introduction to Auzre AD
🎀 01:11:16 Active Directory vs Azure AD
🎀 01:12:21 App Registrations
🎀 01:13:02 External Identities
🎀 01:16:21 Service Principle
🎀 01:17:32 Managed Identity
🎀 01:18:55 Device Management
🎀 01:21:15 MDM & MAM
🎀 01:22:15 Windows Hello
🎀 01:23:32 Azure AD Connect
🎀 01:24:35 SSPR
🎀 01:25:18 Password Protection
🎀 01:26:42 Identity Management Best Practices
🎀 01:27:32 Emergency Access Accounts ☁️ Azure AD Authentication
🎀 01:28:45 Authentication Methods
🎀 01:29:20 Microsoft Authenticator
🎀 01:29:47 Follow Along Microsoft Authenticator
🎀 01:30:39 Biometrics
🎀 01:31:29 FIDO and Security Keys
🎀 01:32:55 Open Authentication
🎀 01:34:02 Passwordless Authentication ☁️ Azure AD Management
🎀 01:35:29 Conditional Access
🎀 01:38:28 Azure AD Roles
🎀 01:39:13 RBAC ☁️ Azure AD Protection Governance
🎀 01:40:32 Identity Governance
🎀 01:41:24 HCM
🎀 01:42:23 Identity Lifecycle
🎀 01:43:54 Access Lifecycle
🎀 01:44:45 Privilege Access Lifecycle
🎀 01:45:22 Entitlement Management
🎀 01:46:52 PIM
🎀 01:47:50 Identity Protection
🎀 01:48:37 Detection and Remediation
🎀 01:50:02 Investigation ☁️ Azure NSG
🎀 01:51:13 NSG Rules
🎀 01:52:14 Default Security Rules
🎀 01:52:54 Security Rules Logic
🎀 01:55:00 NSG Combinations
🎀 01:56:53 NSG CheatSheet ☁️ Azure Firewall
🎀 01:58:16 Azure Firewall ☁️ Azure DDoS Protection
🎀 01:59:36 Azure Ddos Protection ☁️ Azure Bastion
🎀 02:01:53 Azure Bastion ☁️ Azure WAF
🎀 02:03:35 Azure WAF ☁️ Encryption
🎀 02:05:04 Encryption Overview
🎀 02:05:48 Azure Disk Encryption
🎀 02:06:42 TDE
🎀 02:07:34 Key Vault ☁️ Azure Security Center
🎀 02:09:03 Azure Security Benchmark
🎀 02:09:53 Azuire Security Center
🎀 02:11:27 Azure Security Benchmark Detailed ☁️ Azure Defender
🎀 02:14:10 Azure Defender ☁️ Azure Sentinel
🎀 02:17:05 Azure Sentinel
🎀 02:18:15 Data Sources
🎀 02:18:52 Workbooks
🎀 02:19:44 Sentinel Features
🎀 02:21:39 Sentinel Pricing ☁️ M365 Defender
🎀 02:22:04 M365
🎀 02:22:48 M365 Defender
🎀 02:23:38 Secure Score
🎀 02:24:11 Defender for Endpoint
🎀 02:26:20 Security Reports
🎀 02:27:37 Defender for Indentity
🎀 02:29:09 Defender for Office 365
🎀 02:31:59 MCAS ☁️ Microsoft Endpoint Manager
🎀 02:34:41 Microsoft Endpoint Manager ☁️ Compliance
🎀 02:36:09 Regulatory Compliance
🎀 02:37:29 M365 Compliance Center
🎀 02:38:16 Azure Trust Center
🎀 02:38:55 Compliance Manager
🎀 02:40:39 Follow Along Compliance Manager
🎀 02:41:50 Compliance Programs ☁️ Protection and Governance
🎀 02:44:34 MIP
🎀 02:45:17 Know Protect Prevent
🎀 02:47:34 GIP
🎀 02:48:20 Sensitive Information Types
🎀 02:49:30 Trainable Classifiers
🎀 02:50:37 Content Explorer
🎀 02:51:26 Activity Explorer
🎀 02:52:09 Sensitivity Labels
🎀 02:54:25 Label Policies
🎀 02:56:00 Retention Labels and Policies
🎀 02:56:39 Records Management
🎀 02:57:58 DLP ☁️ Risk Capabilities
🎀 02:58:33 Insider Risk Management
🎀 03:01:26 Communication Compliance
🎀 03:03:59 Information Barriers
🎀 03:05:05 Privilege Access Management
🎀 03:06:01 Customer Lockbox
🎀 03:06:59 eDiscovery
🎀 03:07:52 Core eDiscovery Workflow
🎀 03:08:40 Content Search and Holds
🎀 03:09:45 Advanced eDiscovery Workflow
🎀 03:10:19 M365 Audit ☁️ Azure Security Concepts
🎀 03:11:20 Resource Locks
🎀 03:12:06 Resource Tags
🎀 03:13:02 Azure Blueprints
🎀 03:14:26 Azure Policy
🎀 03:16:07 Cloud Adoption Framework
🎀 03:18:38 Well Architected Framework
🎀 03:20:27 Microsoft Security Best Practices
🎀 03:21:31 Follow Along Microsoft Security Best Practices
🎀 03:22:46 SAS
🎀 03:24:41 CORS
🎀 03:26:29 SDL

Microsoft Security Compliance and Identity (SC-900) – Full Course PASS the Exam

Microsoft Security Compliance and Identity (SC-900) – Full Course PASS the Exam

 

 

 

 

 

 

 

 

 

Contact us

More Microsoft Security Compliance and Identity (SC-900) – Full Course PASS the Exam Videos

Leave a Reply

Your email address will not be published. Required fields are marked *