Section 1 : Welcome to SC-900

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 2 Exam Topics at a High Level 5:37
Lecture 3 SC-900 Exam Requirements 6:22
Lecture 4 JULY 2021 SC-900 Updates__ 2:29
Lecture 5 About Certification Pdf

Section 2 : Describe security methodologies

Lecture 6 Zero-Trust methodology
Lecture 7 The shared responsibility model 7:16
Lecture 8 Defense in depth 2:58

Section 3 : Describe security concepts

Lecture 9 Common threats 7:26
Lecture 10 Encryption 5:46

Section 4 : Describe Microsoft Security and compliance principles

Lecture 11 Microsoft's six privacy principles 2:52
Lecture 12 The service trust portal 8:1

Section 5 : Define identity principles_concepts

Lecture 13 Identity as the primary security perimeter 7:34
Lecture 14 Authentication and Authorization 8:16
Lecture 15 What identity providers are 2:9
Lecture 16 What Active Directory is 2:9
Lecture 17 The concept of Federated services 2:18
Lecture 18 Common Identity Attacks 2:35

Section 6 : Describe the basic identity services and identity types of Azure AD

Lecture 19 What Azure Active Directory is 3:2
Lecture 20 First Live AzureAD Demo 4:58
Lecture 21 Users, Groups and Roles 9:23
Lecture 22 Hybrid Identity 2:44
Lecture 23 External identity types (Guest Users) 4:7

Section 7 : Describe the authentication capabilities of Azure AD

Lecture 24 The different authentication methods 3:33
Lecture 25 Self-service password reset 3:23
Lecture 26 Password protection and management capabilities 4:7
Lecture 27 Multi-factor Authentication 3:57
Lecture 28 Windows Hello for Business and Passwordless 2:57

Section 8 : Describe access management capabilities of Azure AD

Lecture 29 Azure AD Conditional Access 4:47
Lecture 30 Azure AD roles and Role-Based Authentication Control (RBAC) 4:46

Section 9 : Describe the identity protection & governance capabilities of Azure AD

Lecture 31 What identity governance is 7:51

Section 10 : Describe basic security capabilities in Azure

Lecture 32 Azure Network Security groups 4:45
Lecture 33 Azure DDoS protection 3:9
Lecture 34 Azure Firewall 1:29
Lecture 35 Azure Bastion 1:47
Lecture 36 Web Application Firewall 3:11
Lecture 37 Ways Azure encrypts data

Section 11 : Describe security management capabilities of Azure

Lecture 38 Azure Security center 6:48
Lecture 39 Azure Secure score 7:16
Lecture 40 Azure Defender 3:55
Lecture 41 Security baselines for Azure 2:43

Section 12 : Describe security capabilities of Azure Sentinel

Lecture 42 Azure Sentinel 7:25

Section 13 : Describe threat protection with Microsoft 365 Defender

Lecture 43 Microsoft 365 Defender services 3:6
Lecture 44 M365 Defender for Identity 5:39
Lecture 45 M365 Defender for Office 365 3:11
Lecture 46 M365 Defender for Endpoint 3:50
Lecture 47 Microsoft Cloud App Security 4:37

Section 14 : Describe security management capabilities of Microsoft 365

Lecture 48 Microsoft 365 Security Center 6:39

Section 15 : Describe endpoint security with Microsoft Intune

Lecture 49 Microsoft Intune 4:27

Section 16 : Describe the compliance management capabilities in Microsoft

Lecture 50 Compliance Center and Compliance Management 5:41

Section 17 : Describe information protection and governance

Lecture 51 Data classification capabilities 6:52
Lecture 52 Sensitivity labels
Lecture 53 Retention Polices and Retention Labels 3:30
Lecture 54 Records Management
Lecture 55 Data Loss Prevention 3:55

Section 18 : Describe insider risk capabilities in Microsoft 365

Lecture 56 Insider risk management
Lecture 57 Communication compliance 3:15
Lecture 58 Information barriers 1:19
Lecture 59 Privileged access management 3:11
Lecture 60 Customer lockbox 1:15

Section 19 : Describe the eDiscovery capabilities of Microsoft 365

Lecture 61 eDiscovery 5:14

Section 20 : Describe the audit capabilities in Microsoft 365

Lecture 62 Audit Log 4:10

Section 21 : Describe resource governance capabilities in Azure

Lecture 63 Azure Resource locks, Blueprints and Policy 6:52
Lecture 64 Cloud adoption framework 3:38