Curriculum For This Course
Video tutorials list
-
Basics- Data Security
Video Name Time 1. What is Data Security? 7:42 2. Data Security Threats 7:00 -
Basics-SOC
Video Name Time 1. Complexity and Cyber Security Challenges 9:22 2. What is a SOC? 3:51 3. SOC Tier Model 3:10 4. Cyber Security Incident Response Process 2:58 5. EDR, XDR, SIEM & SOAR 4:50 6. Blue, Red & Purple Teaming 4:31 -
Basics- Cyber Threat Intelligence
Video Name Time 1. What is a Threat? 1:32 2. Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI) 2:45 3. What is CTI? 2:06 4. Threat, Vulnerability & Risk 1:44 5. Threat-Informed Defense 3:13 6. Tactics, Techniques & Procedures (TTPs) 2:59 7. IOCs & IOAs 2:33 8. Pyramid of Pain 3:10 9. CTI Sources 1:52 -
Basics-Microsoft Security
Video Name Time 1. Zero Trust 3:39 2. The Microsoft Security Cosmos 4:34 3. Defending Across Attack Chains 3:08 -
Basics-Azure
Video Name Time 1. Cloud Computing Properties 3:00 2. Azure Global Backbone 1:53 3. Shared Responsibility Model 4:29 4. Azure Resource Hierarchy 3:11 5. Azure Subscription Types 2:02 6. Entra ID Tenants and Azure Subscriptions 1:37 7. Get an Azure Subscription 0:51 -
Microsoft Preview
Video Name Time 1. What is Microsoft Purview? 6:21 2. The New Purview Portal 0:52 -
Setup Preview
Video Name Time 1. Demo: Activate and Assign Microsoft 365 E5 1:33 2. Demo: Access the Purview Portal 0:51 3. Demo: RBAC for Purview 7:24 -
Create and manage sensitive info types
Video Name Time 1. Identify sensitive information requirements for an organization's data 11:10 2. Demo: Translate sensitive information requirements into sensitive info types 4:21 3. Demo: Create and manage custom sensitive info types 8:49 4. Demo: Create and manage exact data match (EDM) classifiers 2:30 -
Create and manage trainable classifiers
Video Name Time 1. Identify when to use trainable classifiers 4:45 2. Demo: Design and create a trainable classifier 3:17 -
Implement and manage sensitivity labels
Video Name Time 1. Sensitivity Labels 9:54 2. Demo: Define and create sensitivity labels 8:46 3. Demo: Configure and manage sensitivity label policies 4:03 4. Demo: Configure auto-labeling policies for sensitivity labels 4:42 -
Design and implement encryption for email messages
Video Name Time 1. Design an email encryption solution based on methods available in Microsoft 365 4:50 2. Demo: Implement Microsoft Purview (Advanced) Message Encryption 3:15 -
Create and configure DLP policies
Video Name Time 1. Design DLP policies based on an organization’s requirements 4:14 2. Demo: Create and manage DLP policies 14:48 3. Demo: Interpret policy and rule precedence in DLP 2:09 4. What is Defender XDR? 1:36 5. Demo: Purview & Defender XDR 2:27 6. What is Defender for Cloud Apps? 2:37 7. Demo: Cloud App Catalog 5:42 8. Demo: Cloud App Policies 4:43 9. Configure a Microsoft Defender for Cloud Apps file policy to use DLP policies 4:55 -
Implement and monitor Endpoint DLP
Video Name Time 1. Endpoint DLP 2:42 2. Demo: Configure Endpoint DLP settings 7:47 3. Recommend a deployment method for device onboarding 5:41 4. What is Defender for Endpoint (MDE)? 2:09 5. Demo: MDE Management and Administration 15:48 -
Monitor and manage DLP
Video Name Time 1. Analyze DLP activities by using Activity explorer 1:29 2. Remediate DLP alerts in the Microsoft Purview compliance portal 2:08 -
Retain and delete data by using retention labels
Video Name Time 1. Plan for information retention and disposition by using retention labels 8:35 2. Demo: Create retention labels for data lifecycle management 7:58 3. Administrative Units 4:40 4. Demo: Configure and manage adaptive scopes 5:10 5. Demo: Configure a label policy to publish labels 3:54 6. Demo: Configure a label policy to auto-apply labels 5:40 -
Manage data retention in Microsoft 365 workloads
Video Name Time 1. Demo: Create and apply retention policies for M365 6:00 2. Demo: Apply mailbox holds in Exchange Online 5:00 3. Demo: Implement Exchange Online archiving policies 1:00 -
Implement Microsoft Purview records management
Video Name Time 1. Records Management 2:13 2. Demo: Create and configure retention labels for records management 4:58 3. Demo: Manage retention labels by using a file plan and file plan descriptors 2:15 -
Plan and manage regulatory requirements by using Purview Compliance Manager
Video Name Time 1. Plan for regulatory compliance in Microsoft 365 1:55 2. Demo: Create and manage assessments 3:22 3. Demo: Interpret and manage improvement actions 3:34 4. Demo: Create and manage alert policies for assessments 1:31 -
Plan and manage eDiscovery and Content search
Video Name Time 1. Demo: Manage eDiscovery cases 3:51 -
Manage and analyze audit logs and reports in Microsoft Purview
Video Name Time 1. Choose between Audit (Standard) and Audit (Premium) 5:48 2. Demo: Investigate activities by using the unified audit log 2:12 3. Demo: Configure audit retention policies 2:08 -
Implement and manage Microsoft Purview Communication Compliance
Video Name Time 1. Plan for communication compliance 2:57 2. Demo: Create and manage communication compliance policies 8:05 -
Implement and manage Microsoft Purview Insider Risk Management
Video Name Time 1. Plan for insider risk management 2:31 2. Demo: Create and manage insider risk management policies 7:51 -
Implement and manage Microsoft Purview Information Barriers (IBs)
Video Name Time 1. Plan for IBs 1:48 2. Demo: Create and manage IB segments and policies 4:37 -
Implement and manage privacy requirements by using Microsoft Priva
Video Name Time 1. Microsoft Priva 2:39 -
Security Copilot for Purview
Video Name Time 1. What is Security Copilot? 5:19 2. From Prompt to Reponse 2:04 3. Architecture 5:41 4. Extending Copilot with Plugins & more 3:39 5. Privacy Implications 2:10 6. Authentication & RBAC 6:08 7. Standalone vs. Embedded Experience 1:19 8. Pricing 2:23 9. Onboarding Requirements 1:28 10. Demo: Create Compute Capacities 3:45 11. Demo: Setup Copilot for Security 14:57 12. Creating Effective Prompts 12:04 13. Demo: Prompt Usage Monitoring 0:45 14. Demo: Purview in Security Copilot 2:34
Add Comment