Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 1: Describe the concepts of security, compliance, and identity-Describe security and compliance concepts-Describe the shared responsibility model
Chapter 2: Describe the concepts of security, compliance, and identity-Describe security and compliance concepts-Describe defense-in-depth
Chapter 3: Describe the concepts of security, compliance, and identity-Describe security and compliance concepts-Describe the Zero Trust model
Chapter 4: Describe the concepts of security, compliance, and identity-Describe security and compliance concepts-Describe encryption and hashing
Chapter 5: Describe the concepts of security, compliance, and identity-Describe security and compliance concepts-Describe Governance, Risk, and Compliance (GRC) concepts
Chapter 6: Describe the concepts of security, compliance, and identity-Define identity concepts-Define identity as the primary security perimeter
Chapter 7: Describe the concepts of security, compliance, and identity-Define identity concepts-Define authentication
Chapter 8: Describe the concepts of security, compliance, and identity-Define identity concepts-Define authorization
Chapter 9: Describe the concepts of security, compliance, and identity-Define identity concepts-Describe identity providers
Chapter 10: Describe the concepts of security, compliance, and identity-Define identity concepts-Describe the concept of directory services and Active Directory
Chapter 11: Describe the concepts of security, compliance, and identity-Define identity concepts-Describe the concept of federation
Chapter 12: Describe the capabilities of Microsoft Entra -Describe function and identity types of Microsoft Entra ID-Describe Microsoft Entra ID
Chapter 13: Describe the capabilities of Microsoft Entra -Describe function and identity types of Microsoft Entra ID-Describe types of identities
Chapter 14: Describe the capabilities of Microsoft Entra -Describe function and identity types of Microsoft Entra ID-Describe hybrid identity
Chapter 15: Describe the capabilities of Microsoft Entra -Describe authentication capabilities of Microsoft Entra ID-Describe the authentication methods
Chapter 16: Describe the capabilities of Microsoft Entra -Describe authentication capabilities of Microsoft Entra ID-Describe multi-factor authentication (MFA)
Chapter 17: Describe the capabilities of Microsoft Entra -Describe authentication capabilities of Microsoft Entra ID-Describe password protection and management capabilities
Chapter 18: Describe the capabilities of Microsoft Entra -Describe access management capabilities of Microsoft Entra ID-Describe Conditional Access
Chapter 19: Describe the capabilities of Microsoft Entra -Describe access management capabilities of Microsoft Entra ID-Describe Microsoft Entra roles and role-based access control (RBAC)
Chapter 20: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe Microsoft Entra ID Governance
Chapter 21: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe access reviews
Chapter 22: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe the capabilities of Microsoft Entra Privileged Identity Management
Chapter 23: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe Microsoft Entra ID Protection
Chapter 24: Describe the capabilities of Microsoft Entra -Describe identity protection and governance capabilities of Microsoft Entra-Describe Microsoft Entra Permissions Management
Chapter 26: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe Azure Firewall
Chapter 28: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe network segmentation with Azure virtual networks
Chapter 29: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe network security groups (NSGs)
Chapter 30: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe Azure Bastion
Chapter 31: Describe the capabilities of Microsoft security solutions -Describe core infrastructure security services in Azure-Describe Azure Key Vault
Chapter 32: Describe the capabilities of Microsoft security solutions -Describe security management capabilities of Azure-Describe Microsoft Defender for Cloud
Chapter 33: Describe the capabilities of Microsoft security solutions -Describe security management capabilities of Azure-Describe Cloud Security Posture Management (CSPM)
Chapter 34: Describe the capabilities of Microsoft security solutions -Describe security management capabilities of Azure-Describe how security policies and initiatives improve the cloud security posture
Chapter 36: Describe the capabilities of Microsoft security solutions -Describe capabilities of Microsoft Sentinel-Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)
Chapter 37: Describe the capabilities of Microsoft security solutions -Describe capabilities of Microsoft Sentinel-Describe threat detection and mitigation capabilities in Microsoft Sentinel
Chapter 38: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender XDR services
Chapter 39: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Office 365
Chapter 40: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Endpoint
Chapter 41: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Cloud Apps
Chapter 42: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender for Identity
Chapter 43: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender Vulnerability Management
Chapter 44: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe Microsoft Defender Threat Intelligence (Defender TI)
Chapter 45: Describe the capabilities of Microsoft security solutions -Describe threat protection with Microsoft Defender XDR-Describe the Microsoft Defender portal
Chapter 46: Describe the capabilities of Microsoft compliance solutions -Describe Microsoft Service Trust Portal and privacy principles-Describe the Service Trust Portal offerings
Chapter 47: Describe the capabilities of Microsoft compliance solutions -Describe Microsoft Service Trust Portal and privacy principles-Describe the privacy principles of Microsoft
Chapter 49: Describe the capabilities of Microsoft compliance solutions -Describe compliance management capabilities of Microsoft Purview-Describe the Microsoft Purview compliance portal
Chapter 50: Describe the capabilities of Microsoft compliance solutions -Describe compliance management capabilities of Microsoft Purview-Describe Compliance Manager
Chapter 51: Describe the capabilities of Microsoft compliance solutions -Describe compliance management capabilities of Microsoft Purview-Describe the uses and benefits of compliance score
Chapter 52: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe the data classification capabilities
Chapter 53: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe the benefits of Content explorer and Activity explorer
Chapter 54: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe sensitivity labels and sensitivity label policies
Chapter 55: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe data loss prevention (DLP)
Chapter 56: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe records management
Chapter 57: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe retention policies, retention labels, and retention label policies
Chapter 58: Describe the capabilities of Microsoft compliance solutions -Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview-Describe unified data governance solutions in Microsoft Purview
Chapter 59: Describe the capabilities of Microsoft compliance solutions -Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview-Describe insider risk management
Chapter 60: Describe the capabilities of Microsoft compliance solutions -Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview-Describe eDiscovery solutions in Microsoft Purview
Chapter 61: Describe the capabilities of Microsoft compliance solutions -Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview-Describe audit solutions in Microsoft Purview

Combo Packages at a Discount: Get one that best fits your learning needs.