1. Zero-Trust, Foundational Elements, and Shared Responsibility
2. Foundational Elements
3. The Shared Responsibility Model
4. Security and Compliance Pop Quiz
5. Defense in Depth Pillars
6. Traditional Defense in Depth
7. Azure Defense in Depth
8. Windows Firewall
9. Phishing, Data Breaches, and Ransomware
10. Passwords and Cryptojacking
11. Scanning, Eavesdropping, and Man-in-the-Middle
12. Describe Encryption and Cloud Adoption Framework
13. Summary Quiz
14. Identity as the Primary Security Perimeter
15. Authentication, Authorization, and Accounting
16. Active Directory Features
17. Identity Providers and Federations
18. Define Identity Concepts Quiz
19. Describe What Azure Active Directory Is
20. Create an Azure Account
21. Hybrid Identity Synchronization
22. Joining to Azure Active Directory
23. Registering a Device to Azure Active Directory
24. Hybrid Join a Device
25. External Identity Types
26. Intune and Microsoft Endpoint Management
27. Azure Active Directory Password Protection
28. Self-Service Password Reset
29. Describe the Different Authentication Methods
30. Configure Authenticator and PIN
31. Authenticate with Picture Password
32. Authenticate with Fingerprint
33. Authenticate with Facial Recognition
34. Authenticate with a Security Key
35. Windows Hello for Business
36. Understand Identity Governance
37. Use Cases for Identity Governance
38. Create an Access Package
39. Describe the Capabilities of PIM
40. Describe Azure AD Identity Protection
41. Microsoft Defender For Cloud Apps
42. Microsoft Defender for Endpoint
43. Implementing Microsoft Defender for Identity
44. Integrating Microsoft Defender With Endpoint Manager
45. Configuring Endpoint Security
46. Disk Encryption and Firewall Policies
47. Attack Surface Reduction
48. Microsoft Defender For Cloud
49. Onboarding Non-Azure Servers To Defender For Cloud
50. SIEM, SOAR And XDR
51. Managing Identity Access In Azure
52. Security Baselines
53. Introduction To Azure Security Capabilities
54. Azure Network Security groups.
55. Azure DDoS Protection
56. Azure Firewall
57. Azure Bastion
58. Azure Encryption And WAFs
59. Planning Intune Device Enrollment.
60. Auto-Device Enrollment
61. Joining Devices to Azure AD
62. Endpoint Security
63. Conditional Access Policies
64. Attack Surface Reduction
65. Exploring The Microsoft 365 Defender Portal
66. Advanced Threat Hunting
67. Microsoft Secure Score
68. Exploring Security Reports
69. Working With eDiscovery
70. Using eDiscovery Content Search
71. Deleting Malicious Emails
72. Creating Audit Retention Policies
73. Usage Reports
74. Insider Risk Management
75. Data Classification
76. Data Loss Prevention Policies
77. Records Management
78. Configuring Retention Policies
79. Protecting Documents With Sensitivity Labels
80. Using Content Search To Explore User Activity
81. Planning Compliance Solutions
82. Planning For Device Compliance
83. Configuring Device Compliance
84. Communication Compliance Policies
85. Understanding Your Compliance Score
86. Securing Information And Resources