Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam
דרג סרטון זה
התחבר כדי לדרג
תיאור
Prepare for the Microsoft Security Compliance and Identity Certification and pass! ✏️ Course developed by Andrew Brown of ExamPro. Check out the ExamPro YouTube channel: https://www.youtube.com/ExamProChannel 🔗 ExamPro Cloud Obsessed Certification Training: https://www.exampro.co ☁️ Introduction 🎤 00:00:00 Meet Your Instructor 🎤 00:06:41 What is the SC 900 🎤 00:06:45 Exam Guide ☁️ Security Methodologies 🎤 00:11:35 Zero Trust Model 🎤 00:13:15 Zero Trust Principles 🎤 00:14:07 Zero Trust Pillars 🎤 00:18:01 Zero Trust Assessment Tool 🎤 00:18:45 Follow Along Zero Trust Assessment Tool 🎤 00:21:07 Shared Responsibility Model 🎤 00:24:11 Defense In Depth 🎤 00:25:57 CIA Triad ☁️ Security Concepts 🎤 00:27:53 Common Threats 🎤 00:29:25 Vulnerabilities 🎤 00:30:40 Encryption 🎤 00:31:29 Cyphers 🎤 00:32:42 Cryptographic Keys 🎤 00:33:40 Hashing and Salting 🎤 00:35:45 Digital Signatures 🎤 00:38:17 In Transit vs At Rest 🎤 00:39:34 MFA 🎤 00:40:22 SIEM 🎤 00:42:04 SOAR 🎤 00:43:16 XDR 🎤 00:44:02 EDR 🎤 00:45:38 CASB 🎤 00:47:03 Security Posture 🎤 00:49:37 CSPM 🎤 00:50:58 JIT & JEP 🎤 00:52:07 Ingress vs Egress 🎤 00:52:45 Shadow It 🎤 00:53:32 AIR 🎤 00:54:47 Threat Modeling 🎤 00:55:35 STRIDE 🎤 00:56:45 Follow Along Microsoft Threat Modeling 🎤 00:58:14 IDS IPS 🎤 01:00:09 MITRE Attack Framework 🎤 01:01:04 Follow Along Mitre Attack Framework ☁️ Privacy 🎤 01:01:56 Microsoft Privacy Principles 🎤 01:03:03 Microsoft Privacy ☁️ Identity 🎤 01:05:35 Primary Security Perimeter 🎤 01:07:11 Identity Providers ☁️ Azure AD 🎤 01:08:52 Introduction to Auzre AD 🎤 01:11:16 Active Directory vs Azure AD 🎤 01:12:21 App Registrations 🎤 01:13:02 External Identities 🎤 01:16:21 Service Principle 🎤 01:17:32 Managed Identity 🎤 01:18:55 Device Management 🎤 01:21:15 MDM & MAM 🎤 01:22:15 Windows Hello 🎤 01:23:32 Azure AD Connect 🎤 01:24:35 SSPR 🎤 01:25:18 Password Protection 🎤 01:26:42 Identity Management Best Practices 🎤 01:27:32 Emergency Access Accounts ☁️ Azure AD Authentication 🎤 01:28:45 Authentication Methods 🎤 01:29:20 Microsoft Authenticator 🎤 01:29:47 Follow Along Microsoft Authenticator 🎤 01:30:39 Biometrics 🎤 01:31:29 FIDO and Security Keys 🎤 01:32:55 Open Authentication 🎤 01:34:02 Passwordless Authentication ☁️ Azure AD Management 🎤 01:35:29 Conditional Access 🎤 01:38:28 Azure AD Roles 🎤 01:39:13 RBAC ☁️ Azure AD Protection Governance 🎤 01:40:32 Identity Governance 🎤 01:41:24 HCM 🎤 01:42:23 Identity Lifecycle 🎤 01:43:54 Access Lifecycle 🎤 01:44:45 Privilege Access Lifecycle 🎤 01:45:22 Entitlement Management 🎤 01:46:52 PIM 🎤 01:47:50 Identity Protection 🎤 01:48:37 Detection and Remediation 🎤 01:50:02 Investigation ☁️ Azure NSG 🎤 01:51:13 NSG Rules 🎤 01:52:14 Default Security Rules 🎤 01:52:54 Security Rules Logic 🎤 01:55:00 NSG Combinations 🎤 01:56:53 NSG CheatSheet ☁️ Azure Firewall 🎤 01:58:16 Azure Firewall ☁️ Azure DDoS Protection 🎤 01:59:36 Azure Ddos Protection ☁️ Azure Bastion 🎤 02:01:53 Azure Bastion ☁️ Azure WAF 🎤 02:03:35 Azure WAF ☁️ Encryption 🎤 02:05:04 Encryption Overview 🎤 02:05:48 Azure Disk Encryption 🎤 02:06:42 TDE 🎤 02:07:34 Key Vault ☁️ Azure Security Center 🎤 02:09:03 Azure Security Benchmark 🎤 02:09:53 Azuire Security Center 🎤 02:11:27 Azure Security Benchmark Detailed ☁️ Azure Defender 🎤 02:14:10 Azure Defender ☁️ Azure Sentinel 🎤 02:17:05 Azure Sentinel 🎤 02:18:15 Data Sources 🎤 02:18:52 Workbooks 🎤 02:19:44 Sentinel Features 🎤 02:21:39 Sentinel Pricing ☁️ M365 Defender 🎤 02:22:04 M365 🎤 02:22:48 M365 Defender 🎤 02:23:38 Secure Score 🎤 02:24:11 Defender for Endpoint 🎤 02:26:20 Security Reports 🎤 02:27:37 Defender for Indentity 🎤 02:29:09 Defender for Office 365 🎤 02:31:59 MCAS ☁️ Microsoft Endpoint Manager 🎤 02:34:41 Microsoft Endpoint Manager ☁️ Compliance 🎤 02:36:09 Regulatory Compliance 🎤 02:37:29 M365 Compliance Center 🎤 02:38:16 Azure Trust Center 🎤 02:38:55 Compliance Manager 🎤 02:40:39 Follow Along Compliance Manager 🎤 02:41:50 Compliance Programs ☁️ Protection and Governance 🎤 02:44:34 MIP 🎤 02:45:17 Know Protect Prevent 🎤 02:47:34 GIP 🎤 02:48:20 Sensitive Information Types 🎤 02:49:30 Trainable Classifiers 🎤 02:50:37 Content Explorer 🎤 02:51:26 Activity Explorer 🎤 02:52:09 Sensitivity Labels 🎤 02:54:25 Label Policies 🎤 02:56:00 Retention Labels and Policies 🎤 02:56:39 Records Management 🎤 02:57:58 DLP ☁️ Risk Capabilities 🎤 02:58:33 Insider Risk Management 🎤 03:01:26 Communication Compliance 🎤 03:03:59 Information Barriers 🎤 03:05:05 Privilege Access Management 🎤 03:06:01 Customer Lockbox 🎤 03:06:59 eDiscovery 🎤 03:07:52 Core eDiscovery Workflow 🎤 03:08:40 Content Search and Holds 🎤 03:09:45 Advanced eDiscovery Workflow 🎤 03:10:19 M365 Audit ☁️ Azure Security Concepts 🎤 03:11:20 Resource Locks 🎤 03:12:06 Resource Tags 🎤 03:13:02 Azure Blueprints 🎤 03:14:26 Azure Policy 🎤 03:16:07 Cloud Adoption Framework 🎤 03:18:38 Well Architected Framework 🎤 03:20:27 Microsoft Security Best Practices 🎤 03:21:31 Follow Along Microsoft Security Best Practices 🎤 03:22:46 SAS 🎤 03:24:41 CORS 🎤 03:26:29 SDL