Curriculum For This Course
Video tutorials list
-
Course Introduction
Video Name Time 1. Course Introduction 4:00 -
Module 1 Describe the concepts of security, compliance, and identity
Video Name Time 1. Chapter 1 : Security concepts and methodologies - Introduction 1:00 2. Zero Trust - Guidelines 3:00 3. Zero Trust - Six Foundational Pillars 4:00 4. The Shared Responsibility Model 6:00 5. Defence in Depth Strategy 3:00 6. The CIA Triad 6:00 7. Describe Common Threats 6:00 8. Describe Encryption , hashing and Signing -I 4:00 9. Describe Encryption , hashing and Signing - II 4:00 10. Lesson Conclusion 1:00 11. Microsoft security and compliance principles - Lesson Introduction 1:00 12. Microsoft's Privacy Principles 2:00 13. What is Service Trust Portal 2:00 14. Azure Compliance Documentation 1:00 15. Module 1 : Chapter Summary 1:00 -
Module 2 Describe the concepts & capabilities of Microsoft identity and access
Video Name Time 1. Describe Identity Concepts - Introduction 1:00 2. Common Identity Attacks 5:00 3. Identity As a Security perimeter 4:00 4. Four Pillars of Identity 6:00 5. Modern Authentication and the role of Identity provider 3:00 6. SSO and the Concept of Federation 4:00 7. The concept of directory services and Active Directory 3:00 8. Describe the basic services and identity types - Introduction 1:00 9. Describe Azure Active Directory 3:00 10. Azure AD Editions 4:00 11. Describe the Azure AD identity types 8:00 12. Difference between System assigned and user assigned managed Identity 3:00 13. Describe the types external identities 5:00 14. Describe the concept of hybrid Identities 4:00 15. Describe the authentication capabilities of Azure - Introduction 1:00 16. Describe the different authentication methods 3:00 17. Security defaults and MFA 4:00 18. MFA in Azure AD - Part 1 2:00 19. MFA in Azure AD - Part 2 3:00 20. Windows Hello 3:00 21. Why is Windows Hello safer than a password 2:00 22. Self-service password reset in Azure AD 5:00 23. Password protection and management capabilities of Azure AD 5:00 24. Protecting against password spray 2:00 25. Hybrid security 2:00 26. Describe the access management capabilties of AzureAD 1:00 27. Conditional access in Azure AD 4:00 28. Conditional access in Azure AD - II 6:00 29. Conditional access in Azure AD - III 3:00 30. Azure AD Roles & Custom Roles 3:00 31. Chapter Summary 1:00 32. Describe the identity protection and governance capabilties of Azure AD 1:00 33. What is Identity Governance 1:00 34. What is Identity lifecycle 4:00 35. Access Lifecycle 2:00 36. Privileged access lifecycle 2:00 37. What is Entitlement management 3:00 38. Azure AD access reviews 3:00 39. Azure AD terms of use 2:00 40. Capabilities of Privileged identity Management 2:00 -
Module 3 : Describe the capabilties of Microsoft security solutions
Video Name Time 1. Module Introduction 2:00 2. Network security groups 3:00 3. Inbound and outbound security rules 4:00 4. What is DDOS 3:00 5. Azure DDOS protection plans and pricing 3:00 6. Azure Firewall 4:00 7. Azure Bastion Host 4:00 8. Web Application Firewall 2:00 9. Azure Encryption 3:00 10. Azure Key Vault 2:00 11. Lesson Summary 2:00 12. Cloud Security Posture management 4:00 13. Azure Security Center 4:00 14. Azure Security Center - Features 4:00 15. Azure Security Center - Security Score 2:00 16. Azure defender 6:00 17. Azure Security Benchmark 5:00 18. Azure Security Center - Pricing Tier 1:00 19. Chapter Summary 1:00 20. Describe the security capabilities of Azure Sentinel 2:00 21. Define the concepts of SIEM, SOAR and XDR 6:00 22. Azure Sentinel 2:00 23. Azure Sentinel Features 6:00 24. Azure Sentinel - Pricing 1:00 25. Chapter Summary 1:00 26. Describe the threat protection capabilities of - Introduction 2:00 27. Microsoft 365 Defender services - Introduction 3:00 28. Microsoft Defender for Identity 5:00 29. Microsoft Defender for O365 5:00 30. Microsoft Defender for Endpoint 4:00 31. What is CASB 3:00 32. The Cloud App Security framework 2:00 33. Microsoft Cloud App Security architecture 3:00 34. O365 Cloud App security And Azure AD Cloud App Discovery 1:00 35. Chapter Summary 1:00 36. Security Management Capabilties of M365 - Introduction 2:00 37. Microsoft 365 Security Center - Intro 5:00 38. How to use Microsoft Secure Score 3:00 39. Differences between the Azure and Microsoft Secure Score 1:00 40. Managing Incidents 2:00 41. Chapter Summary 1:00 42. Describe endpoint security with Microsoft Intune - Introduction 1:00 43. What is Intune 2:00 44. MDM and MAM 3:00 45. Endpoint Security with Intune 7:00 46. Lesson Summary 1:00 -
Module 4 : Describe the capabilities of Microsoft compliance solutions
Video Name Time 1. Module 4 introduction 1:00 2. Common Compliance Needs 2:00 3. Common compliance regulations 3:00 4. Compliance Center 2:00 5. What is Compliance Manager 2:00 6. What are Controls 1:00 7. What are Assesments 2:00 8. Understand Compliance score 3:00 9. Chapter Summary 1:00 10. The information protection and governance capabiliities of Microsoft 365 1:00 11. Know your data, protect your data, and govern your data 3:00 12. Data classification capabilities of compliance Center 5:00 13. Content Explorer and Activity Explorer 4:00 14. Sensitivity labels 5:00 15. Label Policies 3:00 16. Data Loss Prevention 3:00 17. Data Loss Prevention on endpoints and teams 2:00 18. Retention Polices and Retention Labels 4:00 19. Records Management 3:00 20. Chapter Summary 1:00 21. The insider risk capabilities in Microsoft - Introduction 1:00 22. Insider Risk management 2:00 23. Insider Risk management Workflow 3:00 24. Communications Compliance 5:00 25. Information barriers in Microsoft Teams 2:00 26. Privileged Access Management 4:00 27. Customer Lockbox 4:00 28. Lesson Summary 1:00 29. eDiscovery capabilities of Microsoft M365 - Introduction 1:00 30. The Purpose of eDiscovery 2:00 31. The capabilities of the content search 5:00 32. The Core eDiscovery Workflow 6:00 33. The advanced eDiscovery workflow 4:00 34. Lesson Summary 1:00 35. The audit capabilities of Microsoft 365- introduction 1:00 36. The core audit capabilities of M365 4:00 37. What are the Advance Auditing Capabilities 5:00 38. High Bandwidth for Office 365 API Activities 2:00 39. Lesson Summary 1:00 40. Describe the resource governance capabilities- introduction 1:00 41. Resource Manager - Locks 2:00 42. What is Azure Blueprints 3:00 43. What is Azure Policy 4:00 44. Difference between Azure Policy and RBAC 2:00 45. Cloud Adoption Framework 2:00
Add Comment