riversongs Posted November 23, 2024 Report Share Posted November 23, 2024 Free Download SC-900 Microsoft Security, Compliance and IdentityPublished 11/2024Created by Christopher NettMP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning | Language: English | Duration: 163 Lectures ( 11h 20m ) | Size: 3.66 GBPass SC-900 | Elevate your CareerWhat you'll learnDescribe security and compliance conceptsDefine identity conceptsDescribe function and identity types of Microsoft Entra IDDescribe authentication capabilities of Microsoft Entra IDDescribe access management capabilities of Microsoft Entra IDDescribe identity protection and governance capabilities of Microsoft EntraDescribe core infrastructure security services in AzureDescribe security management capabilities of AzureDescribe capabilities of Microsoft SentinelDescribe threat protection with Microsoft Defender XDRDescribe Microsoft Service Trust Portal and privacy principlesDescribe compliance management capabilities of Microsoft PurviewDescribe information protection, data lifecycle management, and data governance capabilities of Microsoft PurviewDescribe insider risk, eDiscovery, and audit capabilities in Microsoft PurviewRequirementsBasic IT KnowledgeWillingness to learn cool stuff!DescriptionThis SC-900 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the SC-900: Microsoft Security, Compliance and Identity exam. This course systematically guides you from the basics to advanced concepts of Microsoft Security, Compliance and Identity.By mastering Microsoft Security, Compliance and Identity, you're developing expertise in essential topics in today's cybersecurity landscape. The course is always aligned with Microsoft's latest study guide and exam objectives:Skills at a glanceDescribe the concepts of security, compliance, and identity (10-15%)Describe the capabilities of Microsoft Entra (25-30%)Describe the capabilities of Microsoft security solutions (35-40%)Describe the capabilities of Microsoft compliance solutions (20-25%)Describe the concepts of security, compliance, and identity (10-15%)Describe security and compliance conceptsDescribe the shared responsibility modelDescribe defense-in-depthDescribe the Zero Trust modelDescribe encryption and hashingDescribe Governance, Risk, and Compliance (GRC) conceptsDefine identity conceptsDefine identity as the primary security perimeterDefine authenticationDefine authorizationDescribe identity providersDescribe the concept of directory services and Active DirectoryDescribe the concept of federationDescribe the capabilities of Microsoft Entra (25-30%)Describe function and identity types of Microsoft Entra IDDescribe Microsoft Entra IDDescribe types of identitiesDescribe hybrid identityDescribe authentication capabilities of Microsoft Entra IDDescribe the authentication methodsDescribe multi-factor authentication (MFA)Describe password protection and management capabilitiesDescribe access management capabilities of Microsoft Entra IDDescribe Conditional AccessDescribe Microsoft Entra roles and role-based access control (RBAC)Describe identity protection and governance capabilities of Microsoft EntraDescribe Microsoft Entra ID GovernanceDescribe access reviewsDescribe the capabilities of Microsoft Entra Privileged Identity ManagementDescribe Microsoft Entra ID ProtectionDescribe Microsoft Entra Permissions ManagementDescribe the capabilities of Microsoft security solutions (35-40%)Describe core infrastructure security services in AzureDescribe Azure distributed denial-of-service (DDoS) ProtectionDescribe Azure FirewallDescribe Web Application Firewall (WAF)Describe network segmentation with Azure virtual networksDescribe network security groups (NSGs)Describe Azure BastionDescribe Azure Key VaultDescribe security management capabilities of AzureDescribe Microsoft Defender for CloudDescribe Cloud Security Posture Management (CSPM)Describe how security policies and initiatives improve the cloud security postureDescribe enhanced security features provided by cloud workload protectionDescribe capabilities of Microsoft SentinelDefine the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)Describe threat detection and mitigation capabilities in Microsoft SentinelDescribe threat protection with Microsoft Defender XDRDescribe Microsoft Defender XDR servicesDescribe Microsoft Defender for Office 365Describe Microsoft Defender for EndpointDescribe Microsoft Defender for Cloud AppsDescribe Microsoft Defender for IdentityDescribe Microsoft Defender Vulnerability ManagementDescribe Microsoft Defender Threat Intelligence (Defender TI)Describe the Microsoft Defender portalDescribe the capabilities of Microsoft compliance solutions (20-25%)Describe Microsoft Service Trust Portal and privacy principlesDescribe the Service Trust Portal offeringsDescribe the privacy principles of MicrosoftDescribe Microsoft PrivaDescribe compliance management capabilities of Microsoft PurviewDescribe the Microsoft Purview compliance portalDescribe Compliance ManagerDescribe the uses and benefits of compliance scoreDescribe information protection, data lifecycle management, and data governance capabilities of Microsoft PurviewDescribe the data classification capabilitiesDescribe the benefits of Content explorer and Activity explorerDescribe sensitivity labels and sensitivity label policiesDescribe data loss prevention (DLP)Describe records managementDescribe retention policies, retention labels, and retention label policiesDescribe unified data governance solutions in Microsoft PurviewDescribe insider risk, eDiscovery, and audit capabilities in Microsoft PurviewDescribe insider risk managementDescribe eDiscovery solutions in Microsoft PurviewDescribe audit solutions in Microsoft PurviewWho this course is forSOC AnalystSecurity EngineerSecurity ConsultantSecurity ArchitectSecurity ManagerCloud EngineerCloud ArchitectIT ManagerCISOHomepagehttps://www.udemy.com/course/sc-900-microsoft-security-compliance-and-identity-n/Download ( Rapidgator )https://rg.to/file/0072712cf5f205cda6d1c16902123124/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part4.rar.htmlhttps://rg.to/file/2595f7c206d942b280df597fc4c0bcac/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part1.rar.htmlhttps://rg.to/file/3b5d99ebec2869f7f56061a5a94e6df2/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part3.rar.htmlhttps://rg.to/file/58fc9a57c3eb6f0514dfc0e2d03d589e/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part2.rar.htmlFikperhttps://fikper.com/DrisDskS0U/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part4.rar.htmlhttps://fikper.com/GWbux54v9t/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part3.rar.htmlhttps://fikper.com/JbLkdiGNge/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part2.rar.htmlhttps://fikper.com/h2PvS0qxTU/bqebj.SC900.Microsoft.Security.Compliance.and.Identity.part1.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now