CBT Nuggets – SC-900 Training Microsoft Security, Compliance, and Identity Fundamentals

دوره CBT Nuggets – SC-900 Training Microsoft Security, Compliance, and Identity Fundamentals مفاهیم، متدولوژی ها و تعاریف اصلی امنیتی مربوط به امنیت، انطباق و هویت را در سناریوهای ابری عمومی و ترکیبی مایکروسافت آموزش می دهد. دوره SC-900 بخشی از یک برنامه مطالعاتی برای کسانی است که به دنبال کسب گواهینامه Microsoft Security, Compliance, and Identity Fundamentals (SC-900) هستند.  این گواهینامه برای کسانی طراحی شده است که می خواهند با اصول امنیتی ، انطباق و هویت در سرویس های Microsoft مبتنی بر cloud و مرتبط با آن آشنا شوند.

لینک دانلود دوره آموزشی CBT Nuggets – SC-900 Training Microsoft Security, Compliance, and Identity Fundamentals

 

حجم: 6.91 گیگابایت

دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم
دانلود – بخش چهارم
دانلود – بخش پنجم
دانلود – بخش ششم
دانلود – بخش هفتم

رمز فايل: technet24.ir

Date: 2022
Duration: 13 HOURS
VIDEOS: 86
Publisher: CBT Nuggets
By: James Conrad

This foundational Microsoft Certified: Security, Compliance, and Identity Fundamentals training covers the objectives in the SC-900 exam, which is the one required exam to earn the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

It’s hard to overstate how important security, compliance and identity are to network stability and reliability. Those three concepts are so important that everyone who touches a network’s operations – from administrators to managers to executive stakeholders – should consider training in the basic concepts around security, compliance and identity (SCI). This Microsoft Certified: Security, Compliance, and Identity Fundamentals training prepares learners for passing the SC-900 and earning an entry-level certification, but the knowledge within it is highly valuable for anyone who makes decisions that affect networks and their security.

For anyone who manages security technicians, this Microsoft training can be used for SC-900 exam prep, onboarding new security technicians, individual or team training plans, or as a Microsoft reference resource.

SC-900: What You Need to Know

This Microsoft Certified: Security, Compliance, and Identity Fundamentals training has videos that cover topics such as:

  • Fundamental concepts and terms of security, compliance and identity
  • Understanding the capabilities of Microsoft Identity and Access Management solutions
  • Using Microsoft Azure’s built-in security management capabilities and features
  • Deploying Microsoft Azure’s compliance management solutions

Who Should Take SC-900 Training?

This Microsoft Certified: Security, Compliance, and Identity Fundamentals training is valuable for new or aspiring IT professionals, experienced security technicians looking to validate foundational skills, and non-technical professionals.

Compliance user training. It’s so important that non-technical professionals get this Security, Compliance and Identity Fundamentals training because when there are decisions about a network to be made, it’s only when you understand how one gets secured, how users are identified, and how compliance is verified that you can ensure they’re wise decisions.

New or aspiring IT professionals. If you hope to have a career in cybersecurity, starting with a Microsoft Fundamentals certification is a good way to get your feet wet with big concepts that will persist throughout your career. This Microsoft Certified: Security, Compliance, and Identity Fundamentals training is great for new security technicians, since it defines the concepts and tools you’ll be managing and configuring practically every day.

Zero-Trust, Foundational Elements, and Shared Responsibility

1. Zero-Trust Methodology
15 mins
2. Foundational Elements
11 mins
3. The Shared Responsibility Model
17 mins
4. Security and Compliance Pop Quiz
2 mins

Defense in Depth and Firewalls

1. Defense in Depth Pillars
14 mins
2. Traditional Defense in Depth
11 mins
3. Azure Defense in Depth
12 mins
4. Windows Firewall
8 mins

Common Threats and Encryption

1. Phishing, Data Breaches, and Ransomware
10 mins
2. Passwords and Cryptojacking
11 mins
3. Scanning, Eavesdropping, and Man-in-the-Middle
9 mins
4. Describe Encryption and Cloud Adoption Framework
12 mins
5. Summary Quiz
3 mins

Define Identity Concepts

1. Identity as the Primary Security Perimeter
6 mins
2. Authentication, Authorization, and Accounting
11 mins
3. Active Directory Features
10 mins
4. Identity Providers and Federations
10 mins
5. Define Identity Concepts Quiz
9 mins

Describe the Basic Identity Services and Identity Types of Azure AD

1. Describe What Azure Active Directory Is
17 mins
2. Create an Azure Account
17 mins
3. Hybrid Identity Synchronization
13 mins

Understanding Devices in Azure AD and Password Management

1. Joining to Azure Active Directory
8 mins
2. Registering a Device to Azure Active Directory
7 mins
3. Hybrid Join a Device
2 mins
4. External Identity Types
11 mins
5. Intune and Microsoft Endpoint Management
15 mins
6. Azure Active Directory Password Protection
8 mins
7. Self-Service Password Reset
8 mins

Describe the Authentication Capabilities of Azure AD

1. Describe the Different Authentication Methods
10 mins
2. Configure Authenticator and PIN
4 mins
3. Authenticate with Picture Password
3 mins
4. Authenticate with Fingerprint
6 mins
5. Authenticate with Facial Recognition
6 mins
6. Authenticate with a Security Key
3 mins
7. Windows Hello for Business
11 mins

Identity Protection & Governance Capabilities of Azure AD

1. Understand Identity Governance
11 mins
2. Use Cases for Identity Governance
5 mins
3. Create an Access Package
12 mins
4. Describe the Capabilities of PIM
13 mins
5. Describe Azure AD Identity Protection
10 mins

Describe Threat Protection With Microsoft Defender

1. Microsoft Defender For Cloud Apps
14 mins
2. Microsoft Defender for Endpoint
8 mins
3. Implementing Microsoft Defender for Identity
4 mins
4. Integrating Microsoft Defender With Endpoint Manager
5 mins
5. Configuring Endpoint Security
8 mins
6. Disk Encryption and Firewall Policies
5 mins
7. Attack Surface Reduction
7 mins

Describe Security Management Capabilities of Azure

1. Microsoft Defender For Cloud
7 mins
2. Onboarding Non-Azure Servers To Defender For Cloud
12 mins
3. SIEM, SOAR And XDR
7 mins
4. Managing Identity Access In Azure
13 mins
5. Security Baselines
7 mins

Describe Basic Security Capabilities in Azure

1. Introduction To Azure Security Capabilities
2 mins
2. Azure Network Security groups.
20 mins
3. Azure DDoS Protection
10 mins
4. Azure Firewall
5 mins
5. Azure Bastion
8 mins
6. Azure Encryption And WAFs
5 mins

Describe Endpoint Security With Microsoft Intune

1. Planning Intune Device Enrollment.
7 mins
2. Auto-Device Enrollment
8 mins
3. Joining Devices to Azure AD
6 mins
4. Endpoint Security
10 mins
5. Conditional Access Policies
9 mins
6. Attack Surface Reduction
6 mins

Describe Security Management Capabilities of Microsoft 365

1. Exploring The Microsoft 365 Defender Portal
8 mins
2. Advanced Threat Hunting
12 mins
3. Microsoft Secure Score
14 mins
4. Exploring Security Reports
11 mins

Microsoft eDiscovery and Audit Capabilities

1. Working With eDiscovery
10 mins
2. Using eDiscovery Content Search
7 mins
3. Deleting Malicious Emails
6 mins
4. Creating Audit Retention Policies
7 mins
5. Usage Reports
5 mins
6. Insider Risk Management
12 mins

Microsoft 365 Information Protection and Governance Capabilities

1. Data Classification
5 mins
2. Data Loss Prevention Policies
6 mins
3. Records Management
12 mins
4. Configuring Retention Policies
11 mins
5. Protecting Documents With Sensitivity Labels
8 mins
6. Using Content Search To Explore User Activity
5 mins

Compliance And Insider Risk Capabilities Management
1. Planning Compliance Solutions
6 mins
2. Planning For Device Compliance
6 mins
3. Configuring Device Compliance
5 mins
4. Communication Compliance Policies
6 mins
5. Understanding Your Compliance Score
10 mins
6. Securing Information And Resources
11 mins

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.