From the course: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep by Microsoft Press
Module one: Introduction
From the course: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep by Microsoft Press
Module one: Introduction
- So let's get started with module one. In module one, we describe the concepts of security, compliance, and identity. Microsoft provides a range of security, compliance, and identity solutions to help protect customer data and meet regulatory requirements. Azure Security provides built-in features and partner solutions to help customers manage security responsibilities across the six functional areas. We look at operations, applications, storage, networking, compute, and identity. Microsoft also offers regulatory compliance initiatives which map controls to Azure policy definitions to assist with assessments. Microsoft identity platform provides modern authentication solutions, including multi-factor authentication, password policy enforcement, token-based authentication, and Azure role-based access control. Azure Active Directory is a comprehensive identity and access management cloud solution that helps secure access to data in applications onsite and in the cloud; it simplifies the management of users and groups. So in this module, we're going to discuss in lesson one, describing security and the compliance concepts. In lesson two, defining the identity concepts.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Learning objectives28s
-
(Locked)
Describe the shared responsibility model4m 18s
-
(Locked)
Describe defense in depth4m 25s
-
(Locked)
Describe the Zero-Trust model2m 24s
-
(Locked)
Describe encryption and hashing3m 13s
-
(Locked)
Describe governance, risk, and compliance (GRC) concepts3m 49s
-
(Locked)
Lesson one: Recap1m 33s
-
-
-
Learning objectives29s
-
(Locked)
Define identity as the primary security perimeter2m 53s
-
(Locked)
Define authentication2m 20s
-
(Locked)
Define authorization2m 36s
-
(Locked)
Describe identity providers2m 47s
-
(Locked)
Describe Active Directory2m 50s
-
(Locked)
Describe the concept of federation2m 32s
-
(Locked)
Lesson two: Recap1m 38s
-
-
-
Learning objectives29s
-
(Locked)
Describe Microsoft Entra ID governance2m 32s
-
(Locked)
Describe entitlement management and access reviews2m 52s
-
(Locked)
Describe the capabilities of privileged identity management (PIM)2m 52s
-
(Locked)
Describe Entra ID protection2m 22s
-
(Locked)
Lesson six: Recap26s
-
-
-
(Locked)
Learning objectives37s
-
(Locked)
Describe Azure distributed denial-of-service (DDoS) protection50s
-
(Locked)
Describe Azure Firewall2m 35s
-
(Locked)
Describe a web application firewall (WAF)1m 27s
-
(Locked)
Describe network segmentation with Azure virtual networks2m 9s
-
(Locked)
Describe network security groups (NSGs)45s
-
(Locked)
Describe Azure Bastion1m 5s
-
(Locked)
Describe Azure Key Vault53s
-
(Locked)
Lesson seven: Recap38s
-
(Locked)
-
-
(Locked)
Learning objectives31s
-
(Locked)
Describe Microsoft Defender for Cloud1m 9s
-
(Locked)
Describe cloud security posture management (CSPM)1m 22s
-
(Locked)
Describe how security policies and initiatives improve the cloud security posture2m 9s
-
(Locked)
Describe enhanced security features provided by cloud workload protection1m 49s
-
(Locked)
Lesson eight: Recap30s
-
(Locked)
-
-
(Locked)
Learning objectives45s
-
(Locked)
Describe Microsoft 365 Defender services2m 50s
-
(Locked)
Describe Microsoft Defender for Office 3651m 5s
-
(Locked)
Describe Microsoft Defender for Endpoint56s
-
(Locked)
Describe Microsoft Defender for Cloud Apps1m 45s
-
(Locked)
Describe Microsoft Defender for Identity1m 1s
-
(Locked)
Describe Microsoft Defender Vulnerability Management1m 19s
-
(Locked)
Describe Microsoft Defender Threat Intelligence (Defender TI)1m 30s
-
(Locked)
Describe the Microsoft 365 Defender portal2m 14s
-
(Locked)
Lesson 10: Recap40s
-
(Locked)
-
-
(Locked)
Learning objectives47s
-
(Locked)
Describe the data classification capabilities2m 15s
-
(Locked)
Describe the benefits of content explorer and activity explorer1m 54s
-
(Locked)
Describe sensitivity labels and sensitivity label policies2m
-
(Locked)
Describe data loss prevention (DLP)1m 31s
-
(Locked)
Describe records management2m 27s
-
(Locked)
Describe retention policies, retention labels, and retention label policies2m 5s
-
(Locked)
Describe unified data governance solutions in Microsoft Purview1m 45s
-
(Locked)
Lesson 13: Recap43s
-
(Locked)