15 Free YouTube subscribers for your channel
Get Free YouTube Subscribers, Views and Likes

Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam

Follow
freeCodeCamp.org

Prepare for the Microsoft Security Compliance and Identity Certification and pass!

✏ Course developed by Andrew Brown of ExamPro. Check out the ExamPro YouTube channel:    / examprochannel  
ExamPro Cloud Obsessed Certification Training: https://www.exampro.co

☁ Introduction
00:00:00 Meet Your Instructor
00:06:41 What is the SC 900
00:06:45 Exam Guide

☁ Security Methodologies
00:11:35 Zero Trust Model
00:13:15 Zero Trust Principles
00:14:07 Zero Trust Pillars
00:18:01 Zero Trust Assessment Tool
00:18:45 Follow Along Zero Trust Assessment Tool
00:21:07 Shared Responsibility Model
00:24:11 Defense In Depth
00:25:57 CIA Triad

☁ Security Concepts
00:27:53 Common Threats
00:29:25 Vulnerabilities
00:30:40 Encryption
00:31:29 Cyphers
00:32:42 Cryptographic Keys
00:33:40 Hashing and Salting
00:35:45 Digital Signatures
00:38:17 In Transit vs At Rest
00:39:34 MFA
00:40:22 SIEM
00:42:04 SOAR
00:43:16 XDR
00:44:02 EDR
00:45:38 CASB
00:47:03 Security Posture
00:49:37 CSPM
00:50:58 JIT & JEP
00:52:07 Ingress vs Egress
00:52:45 Shadow It
00:53:32 AIR
00:54:47 Threat Modeling
00:55:35 STRIDE
00:56:45 Follow Along Microsoft Threat Modeling
00:58:14 IDS IPS
01:00:09 MITRE Attack Framework
01:01:04 Follow Along Mitre Attack Framework

☁ Privacy
01:01:56 Microsoft Privacy Principles
01:03:03 Microsoft Privacy

☁ Identity
01:05:35 Primary Security Perimeter
01:07:11 Identity Providers

☁ Azure AD
01:08:52 Introduction to Auzre AD
01:11:16 Active Directory vs Azure AD
01:12:21 App Registrations
01:13:02 External Identities
01:16:21 Service Principle
01:17:32 Managed Identity
01:18:55 Device Management
01:21:15 MDM & MAM
01:22:15 Windows Hello
01:23:32 Azure AD Connect
01:24:35 SSPR
01:25:18 Password Protection
01:26:42 Identity Management Best Practices
01:27:32 Emergency Access Accounts

☁ Azure AD Authentication
01:28:45 Authentication Methods
01:29:20 Microsoft Authenticator
01:29:47 Follow Along Microsoft Authenticator
01:30:39 Biometrics
01:31:29 FIDO and Security Keys
01:32:55 Open Authentication
01:34:02 Passwordless Authentication

☁ Azure AD Management
01:35:29 Conditional Access
01:38:28 Azure AD Roles
01:39:13 RBAC

☁ Azure AD Protection Governance
01:40:32 Identity Governance
01:41:24 HCM
01:42:23 Identity Lifecycle
01:43:54 Access Lifecycle
01:44:45 Privilege Access Lifecycle
01:45:22 Entitlement Management
01:46:52 PIM
01:47:50 Identity Protection
01:48:37 Detection and Remediation
01:50:02 Investigation

☁ Azure NSG
01:51:13 NSG Rules
01:52:14 Default Security Rules
01:52:54 Security Rules Logic
01:55:00 NSG Combinations
01:56:53 NSG CheatSheet

☁ Azure Firewall
01:58:16 Azure Firewall

☁ Azure DDoS Protection
01:59:36 Azure Ddos Protection

☁ Azure Bastion
02:01:53 Azure Bastion

☁ Azure WAF
02:03:35 Azure WAF

☁ Encryption
02:05:04 Encryption Overview
02:05:48 Azure Disk Encryption
02:06:42 TDE
02:07:34 Key Vault

☁ Azure Security Center
02:09:03 Azure Security Benchmark
02:09:53 Azuire Security Center
02:11:27 Azure Security Benchmark Detailed

☁ Azure Defender
02:14:10 Azure Defender

☁ Azure Sentinel
02:17:05 Azure Sentinel
02:18:15 Data Sources
02:18:52 Workbooks
02:19:44 Sentinel Features
02:21:39 Sentinel Pricing

☁ M365 Defender
02:22:04 M365
02:22:48 M365 Defender
02:23:38 Secure Score
02:24:11 Defender for Endpoint
02:26:20 Security Reports
02:27:37 Defender for Indentity
02:29:09 Defender for Office 365
02:31:59 MCAS

☁ Microsoft Endpoint Manager
02:34:41 Microsoft Endpoint Manager

☁ Compliance
02:36:09 Regulatory Compliance
02:37:29 M365 Compliance Center
02:38:16 Azure Trust Center
02:38:55 Compliance Manager
02:40:39 Follow Along Compliance Manager
02:41:50 Compliance Programs

☁ Protection and Governance
02:44:34 MIP
02:45:17 Know Protect Prevent
02:47:34 GIP
02:48:20 Sensitive Information Types
02:49:30 Trainable Classifiers
02:50:37 Content Explorer
02:51:26 Activity Explorer
02:52:09 Sensitivity Labels
02:54:25 Label Policies
02:56:00 Retention Labels and Policies
02:56:39 Records Management
02:57:58 DLP

☁ Risk Capabilities
02:58:33 Insider Risk Management
03:01:26 Communication Compliance
03:03:59 Information Barriers
03:05:05 Privilege Access Management
03:06:01 Customer Lockbox
03:06:59 eDiscovery
03:07:52 Core eDiscovery Workflow
03:08:40 Content Search and Holds
03:09:45 Advanced eDiscovery Workflow
03:10:19 M365 Audit

☁ Azure Security Concepts
03:11:20 Resource Locks
03:12:06 Resource Tags
03:13:02 Azure Blueprints
03:14:26 Azure Policy
03:16:07 Cloud Adoption Framework
03:18:38 Well Architected Framework
03:20:27 Microsoft Security Best Practices
03:21:31 Follow Along Microsoft Security Best Practices
03:22:46 SAS
03:24:41 CORS
03:26:29 SDL

posted by okrpanipz