Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam

Prepare for the Microsoft Security Compliance and Identity Certification and pass! ✏️ Course developed by Andrew Brown of ExamPro. Check out the ExamPro You...

freeCodeCamp.org583.9K views03:27:20

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

Prepare for the Microsoft Security Compliance and Identity Certification and pass! ✏️ Course developed by Andrew Brown of ExamPro. Check out the ExamPro YouTube channel: https://www.youtube.com/ExamProChannel 🔗 ExamPro Cloud Obsessed Certification Training: https://www.exampro.co ☁️ Introduction 🎤 00:00:00 Meet Your Instructor 🎤 00:06:41 What is the SC 900 🎤 00:06:45 Exam Guide ☁️ Security Methodologies 🎤 00:11:35 Zero Trust Model 🎤 00:13:15 Zero Trust Principles 🎤 00:14:07 Zero Trust Pillars 🎤 00:18:01 Zero Trust Assessment Tool 🎤 00:18:45 Follow Along Zero Trust Assessment Tool 🎤 00:21:07 Shared Responsibility Model 🎤 00:24:11 Defense In Depth 🎤 00:25:57 CIA Triad ☁️ Security Concepts 🎤 00:27:53 Common Threats 🎤 00:29:25 Vulnerabilities 🎤 00:30:40 Encryption 🎤 00:31:29 Cyphers 🎤 00:32:42 Cryptographic Keys 🎤 00:33:40 Hashing and Salting 🎤 00:35:45 Digital Signatures 🎤 00:38:17 In Transit vs At Rest 🎤 00:39:34 MFA 🎤 00:40:22 SIEM 🎤 00:42:04 SOAR 🎤 00:43:16 XDR 🎤 00:44:02 EDR 🎤 00:45:38 CASB 🎤 00:47:03 Security Posture 🎤 00:49:37 CSPM 🎤 00:50:58 JIT & JEP 🎤 00:52:07 Ingress vs Egress 🎤 00:52:45 Shadow It 🎤 00:53:32 AIR 🎤 00:54:47 Threat Modeling 🎤 00:55:35 STRIDE 🎤 00:56:45 Follow Along Microsoft Threat Modeling 🎤 00:58:14 IDS IPS 🎤 01:00:09 MITRE Attack Framework 🎤 01:01:04 Follow Along Mitre Attack Framework ☁️ Privacy 🎤 01:01:56 Microsoft Privacy Principles 🎤 01:03:03 Microsoft Privacy ☁️ Identity 🎤 01:05:35 Primary Security Perimeter 🎤 01:07:11 Identity Providers ☁️ Azure AD 🎤 01:08:52 Introduction to Auzre AD 🎤 01:11:16 Active Directory vs Azure AD 🎤 01:12:21 App Registrations 🎤 01:13:02 External Identities 🎤 01:16:21 Service Principle 🎤 01:17:32 Managed Identity 🎤 01:18:55 Device Management 🎤 01:21:15 MDM & MAM 🎤 01:22:15 Windows Hello 🎤 01:23:32 Azure AD Connect 🎤 01:24:35 SSPR 🎤 01:25:18 Password Protection 🎤 01:26:42 Identity Management Best Practices 🎤 01:27:32 Emergency Access Accounts ☁️ Azure AD Authentication 🎤 01:28:45 Authentication Methods 🎤 01:29:20 Microsoft Authenticator 🎤 01:29:47 Follow Along Microsoft Authenticator 🎤 01:30:39 Biometrics 🎤 01:31:29 FIDO and Security Keys 🎤 01:32:55 Open Authentication 🎤 01:34:02 Passwordless Authentication ☁️ Azure AD Management 🎤 01:35:29 Conditional Access 🎤 01:38:28 Azure AD Roles 🎤 01:39:13 RBAC ☁️ Azure AD Protection Governance 🎤 01:40:32 Identity Governance 🎤 01:41:24 HCM 🎤 01:42:23 Identity Lifecycle 🎤 01:43:54 Access Lifecycle 🎤 01:44:45 Privilege Access Lifecycle 🎤 01:45:22 Entitlement Management 🎤 01:46:52 PIM 🎤 01:47:50 Identity Protection 🎤 01:48:37 Detection and Remediation 🎤 01:50:02 Investigation ☁️ Azure NSG 🎤 01:51:13 NSG Rules 🎤 01:52:14 Default Security Rules 🎤 01:52:54 Security Rules Logic 🎤 01:55:00 NSG Combinations 🎤 01:56:53 NSG CheatSheet ☁️ Azure Firewall 🎤 01:58:16 Azure Firewall ☁️ Azure DDoS Protection 🎤 01:59:36 Azure Ddos Protection ☁️ Azure Bastion 🎤 02:01:53 Azure Bastion ☁️ Azure WAF 🎤 02:03:35 Azure WAF ☁️ Encryption 🎤 02:05:04 Encryption Overview 🎤 02:05:48 Azure Disk Encryption 🎤 02:06:42 TDE 🎤 02:07:34 Key Vault ☁️ Azure Security Center 🎤 02:09:03 Azure Security Benchmark 🎤 02:09:53 Azuire Security Center 🎤 02:11:27 Azure Security Benchmark Detailed ☁️ Azure Defender 🎤 02:14:10 Azure Defender ☁️ Azure Sentinel 🎤 02:17:05 Azure Sentinel 🎤 02:18:15 Data Sources 🎤 02:18:52 Workbooks 🎤 02:19:44 Sentinel Features 🎤 02:21:39 Sentinel Pricing ☁️ M365 Defender 🎤 02:22:04 M365 🎤 02:22:48 M365 Defender 🎤 02:23:38 Secure Score 🎤 02:24:11 Defender for Endpoint 🎤 02:26:20 Security Reports 🎤 02:27:37 Defender for Indentity 🎤 02:29:09 Defender for Office 365 🎤 02:31:59 MCAS ☁️ Microsoft Endpoint Manager 🎤 02:34:41 Microsoft Endpoint Manager ☁️ Compliance 🎤 02:36:09 Regulatory Compliance 🎤 02:37:29 M365 Compliance Center 🎤 02:38:16 Azure Trust Center 🎤 02:38:55 Compliance Manager 🎤 02:40:39 Follow Along Compliance Manager 🎤 02:41:50 Compliance Programs ☁️ Protection and Governance 🎤 02:44:34 MIP 🎤 02:45:17 Know Protect Prevent 🎤 02:47:34 GIP 🎤 02:48:20 Sensitive Information Types 🎤 02:49:30 Trainable Classifiers 🎤 02:50:37 Content Explorer 🎤 02:51:26 Activity Explorer 🎤 02:52:09 Sensitivity Labels 🎤 02:54:25 Label Policies 🎤 02:56:00 Retention Labels and Policies 🎤 02:56:39 Records Management 🎤 02:57:58 DLP ☁️ Risk Capabilities 🎤 02:58:33 Insider Risk Management 🎤 03:01:26 Communication Compliance 🎤 03:03:59 Information Barriers 🎤 03:05:05 Privilege Access Management 🎤 03:06:01 Customer Lockbox 🎤 03:06:59 eDiscovery 🎤 03:07:52 Core eDiscovery Workflow 🎤 03:08:40 Content Search and Holds 🎤 03:09:45 Advanced eDiscovery Workflow 🎤 03:10:19 M365 Audit ☁️ Azure Security Concepts 🎤 03:11:20 Resource Locks 🎤 03:12:06 Resource Tags 🎤 03:13:02 Azure Blueprints 🎤 03:14:26 Azure Policy 🎤 03:16:07 Cloud Adoption Framework 🎤 03:18:38 Well Architected Framework 🎤 03:20:27 Microsoft Security Best Practices 🎤 03:21:31 Follow Along Microsoft Security Best Practices 🎤 03:22:46 SAS 🎤 03:24:41 CORS 🎤 03:26:29 SDL

Video Information

Views
583.9K

Total views since publication

Likes
5.5K

User likes and reactions

Duration
03:27:20

Video length

Published
Jun 29, 2021

Release date

Quality
hd

Video definition