Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam

Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam

freeCodeCamp.org via freeCodeCamp Direct link

Retention Labels and Policies

122 of 145

122 of 145

Retention Labels and Policies

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Microsoft Security Compliance and Identity (SC-900) - Full Course PASS the Exam

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Meet Your Instructor
  2. 2 What is the SC 900
  3. 3 Exam Guide
  4. 4 Zero Trust Model
  5. 5 Zero Trust Principles
  6. 6 Zero Trust Pillars
  7. 7 Zero Trust Assessment Tool
  8. 8 Follow Along Zero Trust Assessment Tool
  9. 9 Shared Responsibility Model
  10. 10 Defense In Depth
  11. 11 CIA Triad
  12. 12 Common Threats
  13. 13 Vulnerabilities
  14. 14 Encryption
  15. 15 Cyphers
  16. 16 Cryptographic Keys
  17. 17 Hashing and Salting
  18. 18 Digital Signatures
  19. 19 In Transit vs At Rest
  20. 20 MFA
  21. 21 SIEM
  22. 22 SOAR
  23. 23 XDR
  24. 24 EDR
  25. 25 CASB
  26. 26 Security Posture
  27. 27 CSPM
  28. 28 JIT & JEP
  29. 29 Ingress vs Egress
  30. 30 Shadow It
  31. 31 AIR
  32. 32 Threat Modeling
  33. 33 STRIDE
  34. 34 Follow Along Microsoft Threat Modeling
  35. 35 IDS IPS
  36. 36 MITRE Attack Framework
  37. 37 Follow Along Mitre Attack Framework
  38. 38 Microsoft Privacy Principles
  39. 39 Microsoft Privacy
  40. 40 Primary Security Perimeter
  41. 41 Identity Providers
  42. 42 Introduction to Auzre AD
  43. 43 Active Directory vs Azure AD
  44. 44 App Registrations
  45. 45 External Identities
  46. 46 Service Principle
  47. 47 Managed Identity
  48. 48 Device Management
  49. 49 MDM & MAM
  50. 50 Windows Hello
  51. 51 Azure AD Connect
  52. 52 SSPR
  53. 53 Password Protection
  54. 54 Identity Management Best Practices
  55. 55 Emergency Access Accounts
  56. 56 Authentication Methods
  57. 57 Microsoft Authenticator
  58. 58 Follow Along Microsoft Authenticator
  59. 59 Biometrics
  60. 60 FIDO and Security Keys
  61. 61 Open Authentication
  62. 62 Passwordless Authentication
  63. 63 Conditional Access
  64. 64 Azure AD Roles
  65. 65 RBAC
  66. 66 Identity Governance
  67. 67 HCM
  68. 68 Identity Lifecycle
  69. 69 Access Lifecycle
  70. 70 Privilege Access Lifecycle
  71. 71 Entitlement Management
  72. 72 PIM
  73. 73 Identity Protection
  74. 74 Detection and Remediation
  75. 75 Investigation
  76. 76 NSG Rules
  77. 77 Default Security Rules
  78. 78 Security Rules Logic
  79. 79 NSG Combinations
  80. 80 NSG CheatSheet
  81. 81 Azure Firewall
  82. 82 Azure Ddos Protection
  83. 83 Azure Bastion
  84. 84 Azure WAF
  85. 85 Encryption Overview
  86. 86 Azure Disk Encryption
  87. 87 TDE
  88. 88 Key Vault
  89. 89 Azure Security Benchmark
  90. 90 Azuire Security Center
  91. 91 Azure Security Benchmark Detailed
  92. 92 Azure Defender
  93. 93 Azure Sentinel
  94. 94 Data Sources
  95. 95 Workbooks
  96. 96 Sentinel Features
  97. 97 Sentinel Pricing
  98. 98 M365
  99. 99 M365 Defender
  100. 100 Secure Score
  101. 101 Defender for Endpoint
  102. 102 Security Reports
  103. 103 Defender for Indentity
  104. 104 Defender for Office 365
  105. 105 MCAS
  106. 106 Microsoft Endpoint Manager
  107. 107 Regulatory Compliance
  108. 108 M365 Compliance Center
  109. 109 Azure Trust Center
  110. 110 Compliance Manager
  111. 111 Follow Along Compliance Manager
  112. 112 Compliance Programs
  113. 113 MIP
  114. 114 Know Protect Prevent
  115. 115 GIP
  116. 116 Sensitive Information Types
  117. 117 Trainable Classifiers
  118. 118 Content Explorer
  119. 119 Activity Explorer
  120. 120 Sensitivity Labels
  121. 121 Label Policies
  122. 122 Retention Labels and Policies
  123. 123 Records Management
  124. 124 DLP
  125. 125 Insider Risk Management
  126. 126 Communication Compliance
  127. 127 Information Barriers
  128. 128 Privilege Access Management
  129. 129 Customer Lockbox
  130. 130 eDiscovery
  131. 131 Core eDiscovery Workflow
  132. 132 Content Search and Holds
  133. 133 Advanced eDiscovery Workflow
  134. 134 M365 Audit
  135. 135 Resource Locks
  136. 136 Resource Tags
  137. 137 Azure Blueprints
  138. 138 Azure Policy
  139. 139 Cloud Adoption Framework
  140. 140 Well Architected Framework
  141. 141 Microsoft Security Best Practices
  142. 142 Follow Along Microsoft Security Best Practices
  143. 143 SAS
  144. 144 CORS
  145. 145 SDL

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.