1. Chapter 1: The role of a security Architect Play Video
1:29
2. Zero Trust Overview Play Video
1:39
3. Guiding principles of zero trust Play Video
2:53
4. Pillars of Zero Trust Play Video
6:39
5. MCRA - Identity Play Video
3:50
6. MCRA - SOC Tools Play Video
3:05
7. MCRA - Endpoint Security Play Video
5:08
8. MCRA - Hybrid Computing Play Video
7:21
9. MCRA - Information Protection Play Video
4:06
10. MCRA - People Security Play Video
6:54
11. MCRA - IoT and IT Security - II Play Video
7:39
12. CAF - Introduction Play Video
2:20
13. CAF - strategy Play Video
5:57
14. CAF - Planning Play Video
4:58
15. CAF - Readyness - Azure setup guide Play Video
11:01
16. CAF - Readyness - Azure Landing Zone Play Video
9:17
17. CAF Landing Zone Deployment - Lab Step By Step-I Play Video
5:29
18. CAF Landing Zone Deployment - Lab Step By Step-II Play Video
26:54
19. CAF - Adopt Phase Play Video
2:17
20. CAF - Governance Play Video
13:16
21. IT Transformations - Gap analysis Play Video
3:43
22. Security transformations Play Video
7:51
23. Design Security for resiliency strategy Play Video
4:05
24. The reliability Pillar Play Video
4:06
25. SC 100 Case study overview Play Video
2:25
26. SC 100 Case Study Play Video
12:04
27. Chapter 2: Design a security options strategy - overview Play Video
1:26
28. Security operations strategy overview Play Video
3:03
29. Security operations frameworks, processes and procedures Play Video
3:32
30. SecOps and the Leadership Play Video
3:58
31. People and Processes Play Video
4:42
32. Metrics and Its importance in SOC Play Video
3:31
33. Recommendations for Designing a logging and auditing security strategy Play Video
6:24
34. Cyber Kill Chain - An overview Play Video
3:49
35. Focus areas for SOC in hybrid computing Play Video
1:51
36. Unified operations in Hybrid clouds Play Video
5:06
37. Tiers in SecOps Play Video
3:47
38. Azure Tools for SecOps Play Video
6:10
39. SecOps - Best practices for SIEM _ SOAR Play Video
9:22
40. SecOPs- Best Practices for Network and Azure AD Monitoring Play Video
4:04
41. Incident Response - Best Practices Play Video
2:27
42. Recovery - Best Practices Play Video
3:03
43. Workflow Automation Play Video
3:03
44. Workflow Automation - Lab Play Video
4:28
45. Workflow Automation - Logic apps integration - Lab Play Video
7:22
46. Incident Management process- Overview Play Video
5:51
47. Incident Management process - Preparation Play Video
2:46
48. Incident Management Process - Detection and Analysis Play Video
1:37
49. Incident Management Process - Containment Eradication and recovery Play Video
3:31
50. Incident Management Process - Post - Incident Activity Play Video
2:27
51. Threat Intelligence and SOC Play Video
3:48
52. Threat intelligence in Sentinel Play Video
1:52
53. Threat intelligence in Defender for Endpoint Play Video
5:08
54. Threat Intelligence for IOT Play Video
2:13
55. Threat Intelligence in Defender for Cloud Play Video
2:07
56. Chapter2 Case Study Play Video
8:47
57. Chapter 3: Identity Security Strategy -Introduction Play Video
01:10
58. Identity Security Strategy Overview Play Video
2:28
59. Evolution of Identity Technology Play Video
2:51
60. Identity Challenges Play Video
1:56
61. Microsoft Identity Store - Overview Play Video
5:30
62. Identity Governance - Overview Play Video
4:20
63. Identity is the new control plane Play Video
2:45
64. Zero Trust Concepts and Principles Play Video
2:43
65. Zero Trust Components Play Video
4:26
66. Planning a Zero Trust Strategy Play Video
3:29
67. Zero Trust Model - Introduction Play Video
1:07
68. Enabling Zero Trust Model-II Play Video
10:36
69. Enabling Zero Trust Model-III Play Video
4:01
70. Zero trust Security strategy for Identities Play Video
7:08
71. Conditional Access support for Zero Trust Architecture Play Video
3:22
72. Conditional Access Personas Play Video
6:01
73. Secure Authentication Methods Play Video
1:35
74. Secure Authentication Methods - II Play Video
1:35
75. Password hash Sync - PHS Play Video
8:38
76. Pass Through Authentication - PTA Play Video
9:51
77. Azure AD Roles - Best Practices Play Video
6:17
78. Design a Security Strategy for Privileged Role Access Play Video
2:20
79. Develop a Roadmap Play Video
2:09
80. Develop a Roadmap - Explained Play Video
5:33
81. Design a security strategy for privileged activities Play Video
4:34
82. Rapid Modernization Plan - RAMP Play Video
4:21
83. Execute Critical strategic initiatives for Privileged Activity Management Play Video
2:10
84. Chapter Case Study 01 Play Video
8:04
85. Chapter Case Study 02 Play Video
5:08
Add Comment