وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

SC-900 Training: Microsoft Certified: Security, Compliance, and Identity Fundamentals

سرفصل های دوره

This foundational Microsoft Certified: Security, Compliance, and Identity Fundamentals training covers the objectives in the SC-900 exam, which is the one required exam to earn the Microsoft Certified: Security, Compliance, and Identity Fundamentals certification.

It's hard to overstate how important security, compliance and identity are to network stability and reliability. Those three concepts are so important that everyone who touches a network's operations – from administrators to managers to executive stakeholders – should consider training in the basic concepts around security, compliance and identity (SCI). This Microsoft Certified: Security, Compliance, and Identity Fundamentals training prepares learners for passing the SC-900 and earning an entry-level certification, but the knowledge within it is highly valuable for anyone who makes decisions that affect networks and their security.

  • 1. Zero-Trust, Foundational Elements, and Shared Responsibility
  • 2. Foundational Elements
  • 3. The Shared Responsibility Model
  • 4. Security and Compliance Pop Quiz
  • 5. Defense in Depth Pillars
  • 6. Traditional Defense in Depth
  • 7. Azure Defense in Depth
  • 8. Windows Firewall
  • 9. Phishing, Data Breaches, and Ransomware
  • 10. Passwords and Cryptojacking
  • 11. Scanning, Eavesdropping, and Man-in-the-Middle
  • 12. Describe Encryption and Cloud Adoption Framework
  • 13. Summary Quiz
  • 14. Identity as the Primary Security Perimeter
  • 15. Authentication, Authorization, and Accounting
  • 16. Active Directory Features
  • 17. Identity Providers and Federations
  • 18. Define Identity Concepts Quiz
  • 19. Describe What Azure Active Directory Is
  • 20. Create an Azure Account
  • 21. Hybrid Identity Synchronization
  • 22. Joining to Azure Active Directory
  • 23. Registering a Device to Azure Active Directory
  • 24. Hybrid Join a Device
  • 25. External Identity Types
  • 26. Intune and Microsoft Endpoint Management
  • 27. Azure Active Directory Password Protection
  • 28. Self-Service Password Reset
  • 29. Describe the Different Authentication Methods
  • 30. Configure Authenticator and PIN
  • 31. Authenticate with Picture Password
  • 32. Authenticate with Fingerprint
  • 33. Authenticate with Facial Recognition
  • 34. Authenticate with a Security Key
  • 35. Windows Hello for Business
  • 36. Understand Identity Governance
  • 37. Use Cases for Identity Governance
  • 38. Create an Access Package
  • 39. Describe the Capabilities of PIM
  • 40. Describe Azure AD Identity Protection
  • 41. Microsoft Defender For Cloud Apps
  • 42. Microsoft Defender for Endpoint
  • 43. Implementing Microsoft Defender for Identity
  • 44. Integrating Microsoft Defender With Endpoint Manager
  • 45. Configuring Endpoint Security
  • 46. Disk Encryption and Firewall Policies
  • 47. Attack Surface Reduction
  • 48. Microsoft Defender For Cloud
  • 49. Onboarding Non-Azure Servers To Defender For Cloud
  • 50. SIEM, SOAR And XDR
  • 51. Managing Identity Access In Azure
  • 52. Security Baselines
  • 53. Introduction To Azure Security Capabilities
  • 54. Azure Network Security groups.
  • 55. Azure DDoS Protection
  • 56. Azure Firewall
  • 57. Azure Bastion
  • 58. Azure Encryption And WAFs
  • 59. Planning Intune Device Enrollment.
  • 60. Auto-Device Enrollment
  • 61. Joining Devices to Azure AD
  • 62. Endpoint Security
  • 63. Conditional Access Policies
  • 64. Attack Surface Reduction
  • 65. Exploring The Microsoft 365 Defender Portal
  • 66. Advanced Threat Hunting
  • 67. Microsoft Secure Score
  • 68. Exploring Security Reports
  • 69. Working With eDiscovery
  • 70. Using eDiscovery Content Search
  • 71. Deleting Malicious Emails
  • 72. Creating Audit Retention Policies
  • 73. Usage Reports
  • 74. Insider Risk Management
  • 75. Data Classification
  • 76. Data Loss Prevention Policies
  • 77. Records Management
  • 78. Configuring Retention Policies
  • 79. Protecting Documents With Sensitivity Labels
  • 80. Using Content Search To Explore User Activity
  • 81. Planning Compliance Solutions
  • 82. Planning For Device Compliance
  • 83. Configuring Device Compliance
  • 84. Communication Compliance Policies
  • 85. Understanding Your Compliance Score
  • 86. Securing Information And Resources
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6683
    حجم: 57741 مگابایت
    مدت زمان: 798 دقیقه
    تاریخ انتشار: ۴ اسفند ۱۴۰۱
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید