وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

SC-900 Training: Microsoft Certified: Security, Compliance, and Identity Fundamentals

سرفصل های دوره

This foundational Microsoft Certified: Security, Compliance, and Identity Fundamentals training covers the objectives in the SC-900 exam, which is the one required exam to earn the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

It's hard to overstate how important security, compliance and identity are to network stability and reliability. Those three concepts are so important that everyone who touches a network's operations – from administrators to managers to executive stakeholders – should consider training in the basic concepts around security, compliance and identity (SCI). This Microsoft Certified: Security, Compliance, and Identity Fundamentals training prepares learners for passing the SC-900 and earning an entry-level certification, but the knowledge within it is highly valuable for anyone who makes decisions that affect networks and their security.

  • 1. Zero-Trust, Foundational Elements, and Shared Responsibility
  • 2. Foundational Elements
  • 3. The Shared Responsibility Model
  • 4. Security and Compliance Pop Quiz
  • 5. Defense in Depth Pillars
  • 6. Traditional Defense in Depth
  • 7. Azure Defense in Depth
  • 8. Windows Firewall
  • 9. Phishing, Data Breaches, and Ransomware
  • 10. Passwords and Cryptojacking
  • 11. Scanning, Eavesdropping, and Man-in-the-Middle
  • 12. Describe Encryption and Cloud Adoption Framework
  • 13. Summary Quiz
  • 14. Identity as the Primary Security Perimeter
  • 15. Authentication, Authorization, and Accounting
  • 16. Active Directory Features
  • 17. Identity Providers and Federations
  • 18. Define Identity Concepts Quiz
  • 19. Describe What Azure Active Directory Is
  • 20. Create an Azure Account
  • 21. Hybrid Identity Synchronization
  • 22. Joining to Azure Active Directory
  • 23. Registering a Device to Azure Active Directory
  • 24. Hybrid Join a Device
  • 25. External Identity Types
  • 26. Intune and Microsoft Endpoint Management
  • 27. Azure Active Directory Password Protection
  • 28. Self-Service Password Reset
  • 29. Describe the Different Authentication Methods
  • 30. Configure Authenticator and PIN
  • 31. Authenticate with Picture Password
  • 32. Authenticate with Fingerprint
  • 33. Authenticate with Facial Recognition
  • 34. Authenticate with a Security Key
  • 35. Windows Hello for Business
  • 36. Understand Identity Governance
  • 37. Use Cases for Identity Governance
  • 38. Create an Access Package
  • 39. Describe the Capabilities of PIM
  • 40. Describe Azure AD Identity Protection
  • 41. Microsoft Defender For Cloud Apps
  • 42. Microsoft Defender for Endpoint
  • 43. Implementing Microsoft Defender for Identity
  • 44. Integrating Microsoft Defender With Endpoint Manager
  • 45. Configuring Endpoint Security
  • 46. Disk Encryption and Firewall Policies
  • 47. Attack Surface Reduction
  • 48. Microsoft Defender For Cloud
  • 49. Onboarding Non-Azure Servers To Defender For Cloud
  • 50. SIEM, SOAR And XDR
  • 51. Managing Identity Access In Azure
  • 52. Security Baselines
  • 53. Introduction To Azure Security Capabilities
  • 54. Azure Network Security groups.
  • 55. Azure DDoS Protection
  • 56. Azure Firewall
  • 57. Azure Bastion
  • 58. Azure Encryption And WAFs
  • 59. Planning Intune Device Enrollment.
  • 60. Auto-Device Enrollment
  • 61. Joining Devices to Azure AD
  • 62. Endpoint Security
  • 63. Conditional Access Policies
  • 64. Attack Surface Reduction
  • 65. Exploring The Microsoft 365 Defender Portal
  • 66. Advanced Threat Hunting
  • 67. Microsoft Secure Score
  • 68. Exploring Security Reports
  • 69. Working With eDiscovery
  • 70. Using eDiscovery Content Search
  • 71. Deleting Malicious Emails
  • 72. Creating Audit Retention Policies
  • 73. Usage Reports
  • 74. Insider Risk Management
  • 75. Data Classification
  • 76. Data Loss Prevention Policies
  • 77. Records Management
  • 78. Configuring Retention Policies
  • 79. Protecting Documents With Sensitivity Labels
  • 80. Using Content Search To Explore User Activity
  • 81. Planning Compliance Solutions
  • 82. Planning For Device Compliance
  • 83. Configuring Device Compliance
  • 84. Communication Compliance Policies
  • 85. Understanding Your Compliance Score
  • 86. Securing Information And Resources
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6683
    حجم: 57741 مگابایت
    مدت زمان: 798 دقیقه
    تاریخ انتشار: 4 اسفند 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید