وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Security Administrator Associate Online Training

سرفصل های دوره

This intermediate Microsoft Security Administrator Associate training prepares security professionals to take the MS-500 exam, which is the one required exam to earn the Microsoft 365 Certified: Security Administrator Associate certification.

Plenty of professions and industries depend on certifications to measure the abilities and competence of the people who work in the field. But few industries have as many different technologies, providers and authorities as the IT field. Within IT as a whole, systems administration in particular has many different certifications. A sysadmin who wants to advance in their career needs to demonstrate technological competence in different softwares, hardwares, concepts and capabilities. With this training, you’ll be prepared to certify as a security administrator associate for Microsoft 365, a certification that can prepare you for future roles in security or systems administration.

  • 1. Intro - Microsoft 365 Certified Security Administrator Associate (MS-500) CBT Nuggets
  • 2. Azure AD Authentication Options
  • 3. Monitoring Azure AD Connect
  • 4. Troubleshooting Azure AD Connect
  • 5. Implementing Azure AD Group Membership
  • 6. Implementing Password Management
  • 7. Implementing MFA Using Conditional Access Policies
  • 8. Managing And Monitoring MFA
  • 9. Passwordless Authentication
  • 10. Conditional Access Policies
  • 11. Application Based Conditional Access Policies
  • 12. Configuring Access Management
  • 13. Configuring Cloud Application Security
  • 14. What Is Role Based Access
  • 15. Configuring Roles And Role Groups
  • 16. Implement Azure AD Group Membership
  • 17. Auditing Roles For Least Privileged Access
  • 18. Introduction To Azure AD Identity Protection
  • 19. User Risk Policies
  • 20. Implementing Sign-in Risk Policies - Microsoft 365 Certified Security Administrator Associate (MS-500) CBT Nuggets
  • 21. Risk Alerts And Detection
  • 22. Configuring Identity Synchronization
  • 23. Microsoft Defender For EndPoint
  • 24. Microsoft Defender For Identity Solutions
  • 25. Integrating Microsoft Defender With Endpoint Manager
  • 26. Attack Surface Reduction
  • 27. EndPoint Security Controls
  • 28. Disk Encryption And Firewall Policies
  • 29. Creating Security Baselines
  • 30. Introduction To Device And Application Protection
  • 31. Configuring Microsoft Defender Application Guard
  • 32. Managing Exploit Protection
  • 33. Device Encryption
  • 34. Windows Information Protection
  • 35. Verifying WIP Policy
  • 36. Configuring Microsoft Sentinel And Defender For Office 365
  • 37. Getting Started With Microsoft Sentinel
  • 38. Managing And Monitoring With Microsoft Sentinel
  • 39. Creating Office 365 Security Policies
  • 40. Using KQL to Analyze Sign in Activities
  • 41. Conducting Simulated Attacks
  • 42. What Is A Sensitivity Label
  • 43. Managing Sensitive Information Types
  • 44. Configuring Sensitivity Label Policies
  • 45. Sensitivity Labels Teams, SharePoint ,OneDrive and Office Apps.
  • 46. Using The Activity Explorer
  • 47. Working With DLP
  • 48. Creating DLP Policies In Microsoft 365
  • 49. DLP Full Functionality Test
  • 50. Implementing Endpoint DLP
  • 51. Microsoft Defender For Cloud Apps
  • 52. Configuring Mass Download Monitoring Policy
  • 53. Review And Interpret Cloud App Alerts
  • 54. Connecting Cloud Apps to Microsoft Defender.
  • 55. Log and Snapshot Reports
  • 56. Configuring Data Retention Labels
  • 57. Data Classification
  • 58. Creating Retention Policies
  • 59. Setting Up A Litigation Hold
  • 60. Records Management
  • 61. Microsoft 365 Retention Policies
  • 62. Planning Compliance Solutions
  • 63. Creating Compliance Assessments
  • 64. Communication Compliance Policies
  • 65. Creating Data Loss Prevention Policies
  • 66. Creating DSR Cases for GDPR Compliance
  • 67. Service Assurance
  • 68. Introduction to Insider Risk Solutions In Microsoft 365
  • 69. Managing Customer Lockbox
  • 70. Implementing Customer Lockbox
  • 71. Managing Communication Compliance
  • 72. Verifying Communication Compliance
  • 73. Implementing Insider Risk Management Policies
  • 74. Creating An Insider Risk Policy
  • 75. Implementing Information Barrier Policies
  • 76. Working With eDiscovery
  • 77. Using eDiscovery Content Search
  • 78. Deleting Malicious Emails
  • 79. Creating Audit Retention Policies
  • 80. Usage Reports
  • 81. Insider Risk Management
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6705
    حجم: 29277 مگابایت
    مدت زمان: 730 دقیقه
    تاریخ انتشار: 8 اسفند 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید