Section 1 : Welcome to SC-900
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 2 | Exam Topics at a High Level | 00:05:37 Duration |
|
Lecture 3 | SC-900 Exam Requirements | 00:06:22 Duration |
|
Lecture 4 | JULY 2021 SC-900 Updates__ | 00:02:29 Duration |
|
Lecture 5 | About Certification |
Section 2 : Describe security methodologies
|
Lecture 1 | Zero-Trust methodology | |
|
Lecture 2 | The shared responsibility model | 00:07:16 Duration |
|
Lecture 3 | Defense in depth | 00:02:58 Duration |
Section 3 : Describe security concepts
|
Lecture 1 | Common threats | 00:07:26 Duration |
|
Lecture 2 | Encryption | 00:05:46 Duration |
Section 4 : Describe Microsoft Security and compliance principles
|
Lecture 1 | Microsoft's six privacy principles | 00:02:52 Duration |
|
Lecture 2 | The service trust portal | 00:08:01 Duration |
Section 5 : Define identity principles_concepts
|
Lecture 1 | Identity as the primary security perimeter | 00:07:34 Duration |
|
Lecture 2 | Authentication and Authorization | 00:08:16 Duration |
|
Lecture 3 | What identity providers are | 00:02:09 Duration |
|
Lecture 4 | What Active Directory is | 00:02:09 Duration |
|
Lecture 5 | The concept of Federated services | 00:02:18 Duration |
|
Lecture 6 | Common Identity Attacks | 00:02:35 Duration |
Section 6 : Describe the basic identity services and identity types of Azure AD
|
Lecture 1 | What Azure Active Directory is | 00:03:02 Duration |
|
Lecture 2 | First Live AzureAD Demo | 00:04:58 Duration |
|
Lecture 3 | Users, Groups and Roles | 00:09:23 Duration |
|
Lecture 4 | Hybrid Identity | 00:02:44 Duration |
|
Lecture 5 | External identity types (Guest Users) | 00:04:07 Duration |
Section 7 : Describe the authentication capabilities of Azure AD
|
Lecture 1 | The different authentication methods | 00:03:33 Duration |
|
Lecture 2 | Self-service password reset | 00:03:23 Duration |
|
Lecture 3 | Password protection and management capabilities | 00:04:07 Duration |
|
Lecture 4 | Multi-factor Authentication | 00:03:57 Duration |
|
Lecture 5 | Windows Hello for Business and Passwordless | 00:02:57 Duration |
Section 8 : Describe access management capabilities of Azure AD
|
Lecture 1 | Azure AD Conditional Access | 00:04:47 Duration |
|
Lecture 2 | Azure AD roles and Role-Based Authentication Control (RBAC) | 00:04:46 Duration |
Section 9 : Describe the identity protection & governance capabilities of Azure AD
|
Lecture 1 | What identity governance is | 00:07:51 Duration |
Section 10 : Describe basic security capabilities in Azure
|
Lecture 1 | Azure Network Security groups | 00:04:45 Duration |
|
Lecture 2 | Azure DDoS protection | 00:03:09 Duration |
|
Lecture 3 | Azure Firewall | 00:01:29 Duration |
|
Lecture 4 | Azure Bastion | 00:01:47 Duration |
|
Lecture 5 | Web Application Firewall | 00:03:11 Duration |
|
Lecture 6 | Ways Azure encrypts data |
Section 11 : Describe security management capabilities of Azure
|
Lecture 1 | Azure Security center | 00:06:48 Duration |
|
Lecture 2 | Azure Secure score | 00:07:16 Duration |
|
Lecture 3 | Azure Defender | 00:03:55 Duration |
|
Lecture 4 | Security baselines for Azure | 00:02:43 Duration |
Section 12 : Describe security capabilities of Azure Sentinel
|
Lecture 1 | Azure Sentinel | 00:07:25 Duration |
Section 13 : Describe threat protection with Microsoft 365 Defender
|
Lecture 1 | Microsoft 365 Defender services | 00:03:06 Duration |
|
Lecture 2 | M365 Defender for Identity | 00:05:39 Duration |
|
Lecture 3 | M365 Defender for Office 365 | 00:03:11 Duration |
|
Lecture 4 | M365 Defender for Endpoint | 00:03:50 Duration |
|
Lecture 5 | Microsoft Cloud App Security | 00:04:37 Duration |
Section 14 : Describe security management capabilities of Microsoft 365
|
Lecture 1 | Microsoft 365 Security Center | 00:06:39 Duration |
Section 15 : Describe endpoint security with Microsoft Intune
|
Lecture 1 | Microsoft Intune | 00:04:27 Duration |
Section 16 : Describe the compliance management capabilities in Microsoft
|
Lecture 1 | Compliance Center and Compliance Management | 00:05:41 Duration |
Section 17 : Describe information protection and governance
|
Lecture 1 | Data classification capabilities | 00:06:52 Duration |
|
Lecture 2 | Sensitivity labels | |
|
Lecture 3 | Retention Polices and Retention Labels | 00:03:30 Duration |
|
Lecture 4 | Records Management | |
|
Lecture 5 | Data Loss Prevention | 00:03:55 Duration |
Section 18 : Describe insider risk capabilities in Microsoft 365
|
Lecture 1 | Insider risk management | |
|
Lecture 2 | Communication compliance | 00:03:15 Duration |
|
Lecture 3 | Information barriers | 00:01:19 Duration |
|
Lecture 4 | Privileged access management | 00:03:11 Duration |
|
Lecture 5 | Customer lockbox | 00:01:15 Duration |
Section 19 : Describe the eDiscovery capabilities of Microsoft 365
|
Lecture 1 | eDiscovery | 00:05:14 Duration |
Section 20 : Describe the audit capabilities in Microsoft 365
|
Lecture 1 | Audit Log | 00:04:10 Duration |
Section 21 : Describe resource governance capabilities in Azure
|
Lecture 1 | Azure Resource locks, Blueprints and Policy | 00:06:52 Duration |
|
Lecture 2 | Cloud adoption framework | 00:03:38 Duration |