3.95 GB | 24min 46s | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 - About course.mp4 (81.13 MB)
2 - Cybersecurity Architecture and Architect.mp4 (15.23 MB)
3 - Start with Microsoft Security Best Practices.mp4 (34.23 MB)
4 - Common security antipatterns.mp4 (165.71 MB)
74 - Section objectives.mp4 (8.78 MB)
75 - Core Microsoft 365 Services and Apps.mp4 (13.77 MB)
76 - Licensing consideration for Microsoft 365 security.mp4 (10.44 MB)
77 - Licensing consideration for Office 365 security.mp4 (21.57 MB)
78 - Design configuration and Operational Practices for M365.mp4 (66.44 MB)
79 - Importance of Microsoft Purview in M365 security.mp4 (60.01 MB)
80 - Data security and compliance controls using copilot.mp4 (12.22 MB)
81 - Evaluate and assess security posture for M365.mp4 (20.57 MB)
82 - Section objectives.mp4 (5.65 MB)
83 - DevOps security.mp4 (54.71 MB)
84 - Design standards to secure application development.mp4 (57.84 MB)
85 - Evaluate security posture of existing application portfolios.mp4 (27.52 MB)
86 - Evaluate application threats with threat modelling.mp4 (17.5 MB)
87 - Design security lifecycle strategy for applications.mp4 (8.92 MB)
88 - Secure access for workload identities.mp4 (8.46 MB)
89 - Design solution for API management and security.mp4 (12.92 MB)
90 - Design solution for secure access to applications.mp4 (36.22 MB)
91 - Section objectives.mp4 (3.44 MB)
92 - Best practices for data security.mp4 (8.27 MB)
93 - Evaluate solutions for data discovery and classification.mp4 (17.55 MB)
94 - Defense in depth in Microsoft Purview.mp4 (24.03 MB)
95 - Evaluate solutions for encryption of Azure data.mp4 (12.91 MB)
96 - Design data security for Azure SQL workloads.mp4 (22.26 MB)
97 - Design security for Azure storage.mp4 (42.28 MB)
98 - Microsoft Defender for Azure Storage and SQL.mp4 (35.45 MB)
100 - Shared responsibility model in the cloud.mp4 (13.65 MB)
101 - Security baselines for IaaS and PaaS services.mp4 (17.1 MB)
102 - Security baselines for IoT workloads.mp4 (24.17 MB)
103 - Security baselines for web workloads.mp4 (17.4 MB)
104 - Security baselines for containers and orchestration.mp4 (32.32 MB)
105 - Security baselines for AI workloads.mp4 (31.44 MB)
99 - Section objectives.mp4 (7.44 MB)
106 - Section objectives.mp4 (3.57 MB)
107 - What is Microsoft Defender for Cloud.mp4 (15.31 MB)
108 - Understand Cloud Security Posture Management CSPM.mp4 (15.39 MB)
109 - Understand Cloud Workload Protection CWP.mp4 (26.96 MB)
110 - Microsoft Defender for Cloud planning and operations.mp4 (15.87 MB)
111 - Evaluate security posture by using defender for cloud.mp4 (19.04 MB)
112 - Integrate hybrid and multicloud environments with Arc.mp4 (17.54 MB)
113 - Design solution for external attack surface management.mp4 (33.81 MB)
114 - Section objectives.mp4 (6.85 MB)
115 - Endpoint security.mp4 (13.87 MB)
116 - Server security requirements.mp4 (166.59 MB)
117 - Mobile devices security requirements.mp4 (21.54 MB)
118 - IoT security requirements.mp4 (25.84 MB)
119 - Secure OTIoT with Defender for IoT.mp4 (14.12 MB)
120 - Windows Security baselines for server and client endpoints.mp4 (10.14 MB)
121 - Design solution for secure remote access.mp4 (12.31 MB)
122 - Evaluate Windows local admin password solutions LAPS.mp4 (10.8 MB)
123 - Section objectives.mp4 (4.47 MB)
124 - Design solutions for network segmentation.mp4 (37.71 MB)
125 - Design solutions for traffic filtering with NSG.mp4 (20.4 MB)
126 - Solution for network posture management.mp4 (14.49 MB)
127 - Solutions for network monitoring.mp4 (13.17 MB)
128 - Solutions that use Microsoft Entra Internet Access.mp4 (15.64 MB)
129 - Solutions that use Microsoft Entra Private Access.mp4 (11.35 MB)
10 - Zero Trust Architecture.mp4 (12.55 MB)
11 - Zero Trust RaMP Initiatives.mp4 (93.98 MB)
12 - Zero Trust Deployment Objectives.mp4 (264.72 MB)
5 - Section objectives.mp4 (8.36 MB)
6 - What is Perimeter Security Model.mp4 (28.66 MB)
7 - What is Zero Trust Security Model.mp4 (17.49 MB)
8 - Zero Trust as a security strategy.mp4 (8.83 MB)
9 - Zero Trust components.mp4 (13.83 MB)
13 - Section objectives.mp4 (3.04 MB)
14 - Explore Microsoft Cloud Adoption Framework CAF.mp4 (66.82 MB)
15 - Cloud Adoption Framework CAF Secure Methodology.mp4 (35.78 MB)
16 - Discuss Azure Landing Zones.mp4 (34.95 MB)
17 - Security elements in Azure Landing Zones.mp4 (107.84 MB)
18 - What is WellArchitected Framework.mp4 (66.6 MB)
19 - Well Architected Framework Security Pillars.mp4 (26.26 MB)
20 - Section objectives.mp4 (4.52 MB)
21 - Overview of Microsoft Cybersecurity Reference ArchitectureMCRA.mp4 (81.93 MB)
22 - Overview of Microsoft Cloud Security Benchmark MCSB.mp4 (106.96 MB)
23 - Capabilities and controls with MCRA.mp4 (12.14 MB)
24 - Capabilities and controls with MCSB.mp4 (44.52 MB)
25 - Attack protection with MCRA.mp4 (14.53 MB)
26 - Attack protection with MCSB.mp4 (12.32 MB)
27 - Section Objectives.mp4 (4.78 MB)
28 - Discuss common cyberthreats and attack patterns.mp4 (38.32 MB)
29 - Understand attack chain modeling.mp4 (39.43 MB)
30 - How to support business resiliency.mp4 (13.09 MB)
31 - Design solutions for mitigating ransomware attacks.mp4 (21.35 MB)
32 - Design solutions for business continuity and Disaster Recovery.mp4 (27.74 MB)
33 - Explore solution for security updates.mp4 (16.06 MB)
34 - Section Objectives.mp4 (5 MB)
35 - Overview of regulatory compliance.mp4 (25.26 MB)
36 - Explore important regulatory compliance standards.mp4 (56.84 MB)
37 - Translate compliance requirements into security controls.mp4 (28.9 MB)
38 - Address compliance requirements using Microsoft Purview.mp4 (39.42 MB)
39 - Address privacy requirements with Microsoft Priva.mp4 (49.37 MB)
40 - Address security and compliance requirements using Azure Policy.mp4 (49.45 MB)
41 - Validate alignment with regulatory standards using Microsoft Defender for cloud.mp4 (62.36 MB)
42 - Section objectives.mp4 (13.53 MB)
43 - What is IAM and its function.mp4 (37.56 MB)
44 - Active Directory based services in Azure.mp4 (12.9 MB)
45 - User Management AD Vs Entra ID.mp4 (15.14 MB)
46 - IAM design recommendations.mp4 (22.82 MB)
47 - External identities and solutions.mp4 (18.59 MB)
48 - Modern authentication and authorization strategies.mp4 (24.66 MB)
49 - Microsoft Entra Identity Protection.mp4 (20.28 MB)
50 - Align conditional access and Zero Trust.mp4 (12.75 MB)
51 - Protecting Human and nonhuman identities.mp4 (19.75 MB)
52 - Harden Active Directory Domain Services.mp4 (21.67 MB)
53 - Design Cloud Key Management Plan.mp4 (57.71 MB)
54 - Section objectives.mp4 (3.97 MB)
55 - Types of access.mp4 (19.93 MB)
56 - Understand enterprise access model.mp4 (31.13 MB)
57 - Azure Privilege Identity Management.mp4 (18.66 MB)
58 - Privileged Access Management.mp4 (17.6 MB)
59 - Tenant management with Azure Lighthouse.mp4 (22.04 MB)
60 - Solution for cloud infrastructure entitlement management.mp4 (15.82 MB)
61 - Solution for privileged access workstations and bastion services.mp4 (71.52 MB)
62 - Section objectives.mp4 (9.19 MB)
63 - Define Security Operations SecOps strategy.mp4 (47.03 MB)
64 - Discuss security operations team structure.mp4 (9.56 MB)
65 - Security Operation Center Modernization.mp4 (35.19 MB)
66 - Security Operation Team composition.mp4 (19.92 MB)
67 - Design unified security operation strategy.mp4 (29.66 MB)
68 - what is EDR XDR SIEM and SOAR.mp4 (21.75 MB)
69 - Design centralized logging solution for security operation.mp4 (65.28 MB)
70 - Microsoft Defender XDR architecture.mp4 (19.34 MB)
71 - Microsoft Sentinel and defender architecture as a SIEM and SOAR.mp4 (33.94 MB)
72 - Explore key security workflows.mp4 (26.7 MB)
73 - what is MITRE ATTCK and discuss sentinel integration.mp4 (96.15 MB)]
Screenshot
Code:
https://fikper.com/cHzuyBO0Av/
https://fikper.com/Fjhs2daAyo/
https://fikper.com/JHRurq0Yhb/
Code:
https://fileaxa.com/y9xs0vktpdq6
https://fileaxa.com/3p07qrffrltb
https://fileaxa.com/yp64qfcc77cg
Code:
https://rapidgator.net/file/cea1e34c1a0ec1b0be0907d29fd3a1fe/
https://rapidgator.net/file/73102ec7df57026bce9997ec77c384e9/
https://rapidgator.net/file/b9225fb49d5694982f6171faefbef577/
Code:
https://turbobit.net/5c5ksh2d12up.html
https://turbobit.net/gotv87zxfk6i.html
https://turbobit.net/j0nqc0dtuxdz.html