только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » SC-900 Microsoft Security, Compliance and Identity

SC-900 Microsoft Security, Compliance and Identity


SC-900  Microsoft Security, Compliance and Identity
SC-900: Microsoft Security, Compliance and Identity
Published 11/2024
Created by Christopher Nett
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 163 Lectures ( 11h 20m ) | Size: 3.66 GB



Pass SC-900 | Elevate your Career

What you'll learn
Describe security and compliance concepts
Define identity concepts
Describe function and identity types of Microsoft Entra ID
Describe authentication capabilities of Microsoft Entra ID
Describe access management capabilities of Microsoft Entra ID
Describe identity protection and governance capabilities of Microsoft Entra
Describe core infrastructure security services in Azure
Describe security management capabilities of Azure
Describe capabilities of Microsoft Sentinel
Describe threat protection with Microsoft Defender XDR
Describe Microsoft Service Trust Portal and privacy principles
Describe compliance management capabilities of Microsoft Purview
Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview

Requirements
Basic IT Knowledge
Willingness to learn cool stuff!

Description
This SC-900 course by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to pass the SC-900: Microsoft Security, Compliance and Identity exam. This course systematically guides you from the basics to advanced concepts of Microsoft Security, Compliance and Identity.By mastering Microsoft Security, Compliance and Identity, you're developing expertise in essential topics in today's cybersecurity landscape. The course is always aligned with Microsoft's latest study guide and exam objectives:Skills at a glanceDescribe the concepts of security, compliance, and identity (10–15%)Describe the capabilities of Microsoft Entra (25–30%)Describe the capabilities of Microsoft security solutions (35–40%)Describe the capabilities of Microsoft compliance solutions (20–25%)Describe the concepts of security, compliance, and identity (10–15%)Describe security and compliance conceptsDescribe the shared responsibility modelDescribe defense-in-depthDescribe the Zero Trust modelDescribe encryption and hashingDescribe Governance, Risk, and Compliance (GRC) conceptsDefine identity conceptsDefine identity as the primary security perimeterDefine authenticationDefine authorizationDescribe identity providersDescribe the concept of directory services and Active DirectoryDescribe the concept of federationDescribe the capabilities of Microsoft Entra (25–30%)Describe function and identity types of Microsoft Entra IDDescribe Microsoft Entra IDDescribe types of identitiesDescribe hybrid identityDescribe authentication capabilities of Microsoft Entra IDDescribe the authentication methodsDescribe multi-factor authentication (MFA)Describe password protection and management capabilitiesDescribe access management capabilities of Microsoft Entra IDDescribe Conditional AccessDescribe Microsoft Entra roles and role-based access control (RBAC)Describe identity protection and governance capabilities of Microsoft EntraDescribe Microsoft Entra ID GovernanceDescribe access reviewsDescribe the capabilities of Microsoft Entra Privileged Identity ManagementDescribe Microsoft Entra ID ProtectionDescribe Microsoft Entra Permissions ManagementDescribe the capabilities of Microsoft security solutions (35–40%)Describe core infrastructure security services in AzureDescribe Azure distributed denial-of-service (DDoS) ProtectionDescribe Azure FirewallDescribe Web Application Firewall (WAF)Describe network segmentation with Azure virtual networksDescribe network security groups (NSGs)Describe Azure BastionDescribe Azure Key VaultDescribe security management capabilities of AzureDescribe Microsoft Defender for CloudDescribe Cloud Security Posture Management (CSPM)Describe how security policies and initiatives improve the cloud security postureDescribe enhanced security features provided by cloud workload protectionDescribe capabilities of Microsoft SentinelDefine the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)Describe threat detection and mitigation capabilities in Microsoft SentinelDescribe threat protection with Microsoft Defender XDRDescribe Microsoft Defender XDR servicesDescribe Microsoft Defender for Office 365Describe Microsoft Defender for EndpointDescribe Microsoft Defender for Cloud AppsDescribe Microsoft Defender for IdentityDescribe Microsoft Defender Vulnerability ManagementDescribe Microsoft Defender Threat Intelligence (Defender TI)Describe the Microsoft Defender portalDescribe the capabilities of Microsoft compliance solutions (20–25%)Describe Microsoft Service Trust Portal and privacy principlesDescribe the Service Trust Portal offeringsDescribe the privacy principles of MicrosoftDescribe Microsoft PrivaDescribe compliance management capabilities of Microsoft PurviewDescribe the Microsoft Purview compliance portalDescribe Compliance ManagerDescribe the uses and benefits of compliance scoreDescribe information protection, data lifecycle management, and data governance capabilities of Microsoft PurviewDescribe the data classification capabilitiesDescribe the benefits of Content explorer and Activity explorerDescribe sensitivity labels and sensitivity label policiesDescribe data loss prevention (DLP)Describe records managementDescribe retention policies, retention labels, and retention label policiesDescribe unified data governance solutions in Microsoft PurviewDescribe insider risk, eDiscovery, and audit capabilities in Microsoft PurviewDescribe insider risk managementDescribe eDiscovery solutions in Microsoft PurviewDescribe audit solutions in Microsoft Purview

Who this course is for
SOC Analyst
Security Engineer
Security Consultant
Security Architect
Security Manager
Cloud Engineer
Cloud Architect
IT Manager
CISO

https://rapidgator.net/file/929fd1bf0c6e75e2aa26fb8cdaace185/SC-900_Microsoft_Security,_Compliance_and_Identity.part1.rar.html
https://rapidgator.net/file/67eea2b5a80dc041f415daed8e7fc873/SC-900_Microsoft_Security,_Compliance_and_Identity.part2.rar.html
https://rapidgator.net/file/b9129b7663e2944c85820534bc3d1e4b/SC-900_Microsoft_Security,_Compliance_and_Identity.part3.rar.html
https://rapidgator.net/file/64f85848581091d67a498112a44711b2/SC-900_Microsoft_Security,_Compliance_and_Identity.part4.rar.html
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.