Section 1 : Welcome to SC-900

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 2 Exam Topics at a High Level 00:05:37 Duration
Lecture 3 SC-900 Exam Requirements 00:06:22 Duration
Lecture 4 JULY 2021 SC-900 Updates__ 00:02:29 Duration
Lecture 5 About Certification

Section 2 : Describe security methodologies

Lecture 1 Zero-Trust methodology
Lecture 2 The shared responsibility model 00:07:16 Duration
Lecture 3 Defense in depth 00:02:58 Duration

Section 3 : Describe security concepts

Lecture 1 Common threats 00:07:26 Duration
Lecture 2 Encryption 00:05:46 Duration

Section 4 : Describe Microsoft Security and compliance principles

Lecture 1 Microsoft's six privacy principles 00:02:52 Duration
Lecture 2 The service trust portal 00:08:01 Duration

Section 5 : Define identity principles_concepts

Lecture 1 Identity as the primary security perimeter 00:07:34 Duration
Lecture 2 Authentication and Authorization 00:08:16 Duration
Lecture 3 What identity providers are 00:02:09 Duration
Lecture 4 What Active Directory is 00:02:09 Duration
Lecture 5 The concept of Federated services 00:02:18 Duration
Lecture 6 Common Identity Attacks 00:02:35 Duration

Section 6 : Describe the basic identity services and identity types of Azure AD

Lecture 1 What Azure Active Directory is 00:03:02 Duration
Lecture 2 First Live AzureAD Demo 00:04:58 Duration
Lecture 3 Users, Groups and Roles 00:09:23 Duration
Lecture 4 Hybrid Identity 00:02:44 Duration
Lecture 5 External identity types (Guest Users) 00:04:07 Duration

Section 7 : Describe the authentication capabilities of Azure AD

Lecture 1 The different authentication methods 00:03:33 Duration
Lecture 2 Self-service password reset 00:03:23 Duration
Lecture 3 Password protection and management capabilities 00:04:07 Duration
Lecture 4 Multi-factor Authentication 00:03:57 Duration
Lecture 5 Windows Hello for Business and Passwordless 00:02:57 Duration

Section 8 : Describe access management capabilities of Azure AD

Lecture 1 Azure AD Conditional Access 00:04:47 Duration
Lecture 2 Azure AD roles and Role-Based Authentication Control (RBAC) 00:04:46 Duration

Section 9 : Describe the identity protection & governance capabilities of Azure AD

Lecture 1 What identity governance is 00:07:51 Duration

Section 10 : Describe basic security capabilities in Azure

Lecture 1 Azure Network Security groups 00:04:45 Duration
Lecture 2 Azure DDoS protection 00:03:09 Duration
Lecture 3 Azure Firewall 00:01:29 Duration
Lecture 4 Azure Bastion 00:01:47 Duration
Lecture 5 Web Application Firewall 00:03:11 Duration
Lecture 6 Ways Azure encrypts data

Section 11 : Describe security management capabilities of Azure

Lecture 1 Azure Security center 00:06:48 Duration
Lecture 2 Azure Secure score 00:07:16 Duration
Lecture 3 Azure Defender 00:03:55 Duration
Lecture 4 Security baselines for Azure 00:02:43 Duration

Section 12 : Describe security capabilities of Azure Sentinel

Lecture 1 Azure Sentinel 00:07:25 Duration

Section 13 : Describe threat protection with Microsoft 365 Defender

Lecture 1 Microsoft 365 Defender services 00:03:06 Duration
Lecture 2 M365 Defender for Identity 00:05:39 Duration
Lecture 3 M365 Defender for Office 365 00:03:11 Duration
Lecture 4 M365 Defender for Endpoint 00:03:50 Duration
Lecture 5 Microsoft Cloud App Security 00:04:37 Duration

Section 14 : Describe security management capabilities of Microsoft 365

Lecture 1 Microsoft 365 Security Center 00:06:39 Duration

Section 15 : Describe endpoint security with Microsoft Intune

Lecture 1 Microsoft Intune 00:04:27 Duration

Section 16 : Describe the compliance management capabilities in Microsoft

Lecture 1 Compliance Center and Compliance Management 00:05:41 Duration

Section 17 : Describe information protection and governance

Lecture 1 Data classification capabilities 00:06:52 Duration
Lecture 2 Sensitivity labels
Lecture 3 Retention Polices and Retention Labels 00:03:30 Duration
Lecture 4 Records Management
Lecture 5 Data Loss Prevention 00:03:55 Duration

Section 18 : Describe insider risk capabilities in Microsoft 365

Lecture 1 Insider risk management
Lecture 2 Communication compliance 00:03:15 Duration
Lecture 3 Information barriers 00:01:19 Duration
Lecture 4 Privileged access management 00:03:11 Duration
Lecture 5 Customer lockbox 00:01:15 Duration

Section 19 : Describe the eDiscovery capabilities of Microsoft 365

Lecture 1 eDiscovery 00:05:14 Duration

Section 20 : Describe the audit capabilities in Microsoft 365

Lecture 1 Audit Log 00:04:10 Duration

Section 21 : Describe resource governance capabilities in Azure

Lecture 1 Azure Resource locks, Blueprints and Policy 00:06:52 Duration
Lecture 2 Cloud adoption framework 00:03:38 Duration