Microsoft Security, Compliance, and Identity Fundamentals Video Course

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

Your Microsoft SC-900 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SC-900 certification test. Ace your Microsoft SC-900 at the first attempt and obtain the Microsoft Security, Compliance, and Identity Fundamentals credential with ease.

# of Students
102
# of Lectures
147
Course Length
7 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for SC-900 Video Course

Course Introduction

  Video Name Time
  1. Course Introduction 4:00
  Video Name Time
  1. Chapter 1 : Security concepts and methodologies - Introduction 1:00
  2. Zero Trust - Guidelines 3:00
  3. Zero Trust - Six Foundational Pillars 4:00
  4. The Shared Responsibility Model 6:00
  5. Defence in Depth Strategy 3:00
  6. The CIA Triad 6:00
  7. Describe Common Threats 6:00
  8. Describe Encryption , hashing and Signing -I 4:00
  9. Describe Encryption , hashing and Signing - II 4:00
  10. Lesson Conclusion 1:00
  11. Microsoft security and compliance principles - Lesson Introduction 1:00
  12. Microsoft's Privacy Principles 2:00
  13. What is Service Trust Portal 2:00
  14. Azure Compliance Documentation 1:00
  15. Module 1 : Chapter Summary 1:00
  Video Name Time
  1. Describe Identity Concepts - Introduction 1:00
  2. Common Identity Attacks 5:00
  3. Identity As a Security perimeter 4:00
  4. Four Pillars of Identity 6:00
  5. Modern Authentication and the role of Identity provider 3:00
  6. SSO and the Concept of Federation 4:00
  7. The concept of directory services and Active Directory 3:00
  8. Describe the basic services and identity types - Introduction 1:00
  9. Describe Azure Active Directory 3:00
  10. Azure AD Editions 4:00
  11. Describe the Azure AD identity types 8:00
  12. Difference between System assigned and user assigned managed Identity 3:00
  13. Describe the types external identities 5:00
  14. Describe the concept of hybrid Identities 4:00
  15. Describe the authentication capabilities of Azure - Introduction 1:00
  16. Describe the different authentication methods 3:00
  17. Security defaults and MFA 4:00
  18. MFA in Azure AD - Part 1 2:00
  19. MFA in Azure AD - Part 2 3:00
  20. Windows Hello 3:00
  21. Why is Windows Hello safer than a password 2:00
  22. Self-service password reset in Azure AD 5:00
  23. Password protection and management capabilities of Azure AD 5:00
  24. Protecting against password spray 2:00
  25. Hybrid security 2:00
  26. Describe the access management capabilties of AzureAD 1:00
  27. Conditional access in Azure AD 4:00
  28. Conditional access in Azure AD - II 6:00
  29. Conditional access in Azure AD - III 3:00
  30. Azure AD Roles & Custom Roles 3:00
  31. Chapter Summary 1:00
  32. Describe the identity protection and governance capabilties of Azure AD 1:00
  33. What is Identity Governance 1:00
  34. What is Identity lifecycle 4:00
  35. Access Lifecycle 2:00
  36. Privileged access lifecycle 2:00
  37. What is Entitlement management 3:00
  38. Azure AD access reviews 3:00
  39. Azure AD terms of use 2:00
  40. Capabilities of Privileged identity Management 2:00
  Video Name Time
  1. Module Introduction 2:00
  2. Network security groups 3:00
  3. Inbound and outbound security rules 4:00
  4. What is DDOS 3:00
  5. Azure DDOS protection plans and pricing 3:00
  6. Azure Firewall 4:00
  7. Azure Bastion Host 4:00
  8. Web Application Firewall 2:00
  9. Azure Encryption 3:00
  10. Azure Key Vault 2:00
  11. Lesson Summary 2:00
  12. Cloud Security Posture management 4:00
  13. Azure Security Center 4:00
  14. Azure Security Center - Features 4:00
  15. Azure Security Center - Security Score 2:00
  16. Azure defender 6:00
  17. Azure Security Benchmark 5:00
  18. Azure Security Center - Pricing Tier 1:00
  19. Chapter Summary 1:00
  20. Describe the security capabilities of Azure Sentinel 2:00
  21. Define the concepts of SIEM, SOAR and XDR 6:00
  22. Azure Sentinel 2:00
  23. Azure Sentinel Features 6:00
  24. Azure Sentinel - Pricing 1:00
  25. Chapter Summary 1:00
  26. Describe the threat protection capabilities of - Introduction 2:00
  27. Microsoft 365 Defender services - Introduction 3:00
  28. Microsoft Defender for Identity 5:00
  29. Microsoft Defender for O365 5:00
  30. Microsoft Defender for Endpoint 4:00
  31. What is CASB 3:00
  32. The Cloud App Security framework 2:00
  33. Microsoft Cloud App Security architecture 3:00
  34. O365 Cloud App security And Azure AD Cloud App Discovery 1:00
  35. Chapter Summary 1:00
  36. Security Management Capabilties of M365 - Introduction 2:00
  37. Microsoft 365 Security Center - Intro 5:00
  38. How to use Microsoft Secure Score 3:00
  39. Differences between the Azure and Microsoft Secure Score 1:00
  40. Managing Incidents 2:00
  41. Chapter Summary 1:00
  42. Describe endpoint security with Microsoft Intune - Introduction 1:00
  43. What is Intune 2:00
  44. MDM and MAM 3:00
  45. Endpoint Security with Intune 7:00
  46. Lesson Summary 1:00
  Video Name Time
  1. Module 4 introduction 1:00
  2. Common Compliance Needs 2:00
  3. Common compliance regulations 3:00
  4. Compliance Center 2:00
  5. What is Compliance Manager 2:00
  6. What are Controls 1:00
  7. What are Assesments 2:00
  8. Understand Compliance score 3:00
  9. Chapter Summary 1:00
  10. The information protection and governance capabiliities of Microsoft 365 1:00
  11. Know your data, protect your data, and govern your data 3:00
  12. Data classification capabilities of compliance Center 5:00
  13. Content Explorer and Activity Explorer 4:00
  14. Sensitivity labels 5:00
  15. Label Policies 3:00
  16. Data Loss Prevention 3:00
  17. Data Loss Prevention on endpoints and teams 2:00
  18. Retention Polices and Retention Labels 4:00
  19. Records Management 3:00
  20. Chapter Summary 1:00
  21. The insider risk capabilities in Microsoft - Introduction 1:00
  22. Insider Risk management 2:00
  23. Insider Risk management Workflow 3:00
  24. Communications Compliance 5:00
  25. Information barriers in Microsoft Teams 2:00
  26. Privileged Access Management 4:00
  27. Customer Lockbox 4:00
  28. Lesson Summary 1:00
  29. eDiscovery capabilities of Microsoft M365 - Introduction 1:00
  30. The Purpose of eDiscovery 2:00
  31. The capabilities of the content search 5:00
  32. The Core eDiscovery Workflow 6:00
  33. The advanced eDiscovery workflow 4:00
  34. Lesson Summary 1:00
  35. The audit capabilities of Microsoft 365- introduction 1:00
  36. The core audit capabilities of M365 4:00
  37. What are the Advance Auditing Capabilities 5:00
  38. High Bandwidth for Office 365 API Activities 2:00
  39. Lesson Summary 1:00
  40. Describe the resource governance capabilities- introduction 1:00
  41. Resource Manager - Locks 2:00
  42. What is Azure Blueprints 3:00
  43. What is Azure Policy 4:00
  44. Difference between Azure Policy and RBAC 2:00
  45. Cloud Adoption Framework 2:00

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIMA
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • BICSI
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CWNP
  • CyberArc
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Microsoft
Next Step
Next Step

Special Offer! Get 25% Discount on All Your Purchases!

Passguide Products

Enter Your Email Address to Receive Your 25%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address