Completed
Defender for Indentity
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam
Automatically move to the next video in the Classroom when playback concludes
- 1 Meet Your Instructor
- 2 What is the SC 900
- 3 Exam Guide
- 4 Zero Trust Model
- 5 Zero Trust Principles
- 6 Zero Trust Pillars
- 7 Zero Trust Assessment Tool
- 8 Follow Along Zero Trust Assessment Tool
- 9 Shared Responsibility Model
- 10 Defense In Depth
- 11 CIA Triad
- 12 Common Threats
- 13 Vulnerabilities
- 14 Encryption
- 15 Cyphers
- 16 Cryptographic Keys
- 17 Hashing and Salting
- 18 Digital Signatures
- 19 In Transit vs At Rest
- 20 MFA
- 21 SIEM
- 22 SOAR
- 23 XDR
- 24 EDR
- 25 CASB
- 26 Security Posture
- 27 CSPM
- 28 JIT & JEP
- 29 Ingress vs Egress
- 30 Shadow It
- 31 AIR
- 32 Threat Modeling
- 33 STRIDE
- 34 Follow Along Microsoft Threat Modeling
- 35 IDS IPS
- 36 MITRE Attack Framework
- 37 Follow Along Mitre Attack Framework
- 38 Microsoft Privacy Principles
- 39 Microsoft Privacy
- 40 Primary Security Perimeter
- 41 Identity Providers
- 42 Introduction to Auzre AD
- 43 Active Directory vs Azure AD
- 44 App Registrations
- 45 External Identities
- 46 Service Principle
- 47 Managed Identity
- 48 Device Management
- 49 MDM & MAM
- 50 Windows Hello
- 51 Azure AD Connect
- 52 SSPR
- 53 Password Protection
- 54 Identity Management Best Practices
- 55 Emergency Access Accounts
- 56 Authentication Methods
- 57 Microsoft Authenticator
- 58 Follow Along Microsoft Authenticator
- 59 Biometrics
- 60 FIDO and Security Keys
- 61 Open Authentication
- 62 Passwordless Authentication
- 63 Conditional Access
- 64 Azure AD Roles
- 65 RBAC
- 66 Identity Governance
- 67 HCM
- 68 Identity Lifecycle
- 69 Access Lifecycle
- 70 Privilege Access Lifecycle
- 71 Entitlement Management
- 72 PIM
- 73 Identity Protection
- 74 Detection and Remediation
- 75 Investigation
- 76 NSG Rules
- 77 Default Security Rules
- 78 Security Rules Logic
- 79 NSG Combinations
- 80 NSG CheatSheet
- 81 Azure Firewall
- 82 Azure Ddos Protection
- 83 Azure Bastion
- 84 Azure WAF
- 85 Encryption Overview
- 86 Azure Disk Encryption
- 87 TDE
- 88 Key Vault
- 89 Azure Security Benchmark
- 90 Azuire Security Center
- 91 Azure Security Benchmark Detailed
- 92 Azure Defender
- 93 Azure Sentinel
- 94 Data Sources
- 95 Workbooks
- 96 Sentinel Features
- 97 Sentinel Pricing
- 98 M365
- 99 M365 Defender
- 100 Secure Score
- 101 Defender for Endpoint
- 102 Security Reports
- 103 Defender for Indentity
- 104 Defender for Office 365
- 105 MCAS
- 106 Microsoft Endpoint Manager
- 107 Regulatory Compliance
- 108 M365 Compliance Center
- 109 Azure Trust Center
- 110 Compliance Manager
- 111 Follow Along Compliance Manager
- 112 Compliance Programs
- 113 MIP
- 114 Know Protect Prevent
- 115 GIP
- 116 Sensitive Information Types
- 117 Trainable Classifiers
- 118 Content Explorer
- 119 Activity Explorer
- 120 Sensitivity Labels
- 121 Label Policies
- 122 Retention Labels and Policies
- 123 Records Management
- 124 DLP
- 125 Insider Risk Management
- 126 Communication Compliance
- 127 Information Barriers
- 128 Privilege Access Management
- 129 Customer Lockbox
- 130 eDiscovery
- 131 Core eDiscovery Workflow
- 132 Content Search and Holds
- 133 Advanced eDiscovery Workflow
- 134 M365 Audit
- 135 Resource Locks
- 136 Resource Tags
- 137 Azure Blueprints
- 138 Azure Policy
- 139 Cloud Adoption Framework
- 140 Well Architected Framework
- 141 Microsoft Security Best Practices
- 142 Follow Along Microsoft Security Best Practices
- 143 SAS
- 144 CORS
- 145 SDL