FileMood

Download UD240

UD240

Name

UD240

 DOWNLOAD Copy Link

Total Size

3.4 GB

Total Files

85

Hash

3ECAD7455FD36E0D9DD6D87413BBE1F680578E3F

/01 Introduction to the course/

001 Introduction to what this course is all about.mp4

73.0 MB

002 Creating a free Microsoft 365Azure account for practice.mp4

45.5 MB

003 Using assignments in the course.mp4

45.4 MB

/02 Creating and Managing User Identities/

004 Introduction to Creating and Managing User Identities.mp4

53.1 MB

005 Demonstration of Creating and Managing User Identities.mp4

31.6 MB

006 Stepping through the hands on tutorial for User Identities.mp4

8.6 MB

/03 Group Creation in Microsoft 365/

007 Introduction to Group Creation in Microsoft 365.mp4

23.8 MB

008 Demonstration of Creating Groups in Microsoft 365.mp4

22.6 MB

009 Stepping through the hands on tutorial for Dynamic Group Creation.mp4

11.9 MB

/04 Password Expiration Management in Microsoft 365/

010 Introduction to Password Expiration Management in Microsoft 365.mp4

32.5 MB

011 Demonstration of configuring Password Expiration in Microsoft 365.mp4

10.0 MB

012 Stepping through the hands on tutorial for configuring password expiration.mp4

7.6 MB

/05 Password Lockout Management in Microsoft 365/

013 Introduction to Password Lockout Management in Microsoft 365.mp4

30.9 MB

014 Demonstration of configuring the Password Lockout settings.mp4

17.6 MB

015 Stepping through the hands on tutorial for Password Lockout in Microsoft 365.mp4

9.2 MB

/06 Role Based Access Control and Privileged Identity Management (PIM)/

016 Introduction to Assigning Roles.mp4

85.8 MB

017 Demonstration on role permissions as well as assigning roles to identities.mp4

58.6 MB

018 Stepping through the hands on tutorial for assigning roles.mp4

9.0 MB

019 Understanding Privileged Identity Management (PIM).mp4

135.7 MB

020 Configuring Privileged Identity Management (PIM).mp4

64.5 MB

021 Activating a PIM role as a user.mp4

25.3 MB

022 Stepping through the tutorial for PIM.mp4

11.8 MB

/07 Multi-Factor Authentication In Microsoft 365/

023 Introduction to Multi-Factor Authentication.mp4

58.5 MB

024 Demonstration on how to implement Multi-Factor Authentication.mp4

40.5 MB

025 Stepping through the tutorial for implementing Multi-Factor Authentication.mp4

9.5 MB

/08 Self Service Password Reset/

026 Introduction to SSPR (Self Service Password Reset).mp4

31.1 MB

027 Demonstration on how to implement and configure SSPR.mp4

30.0 MB

028 Stepping through the hands on tutorial for SSPR.mp4

7.3 MB

/09 Azure AD Identity Protection/

029 Introduction to Azure AD Identity Protection.mp4

43.2 MB

030 Demonstration of using Azure AD Identity Protection.mp4

22.7 MB

031 Stepping through the hands on tutorial for Azure AD Identity Protection Policies.mp4

12.7 MB

/10 Conditional Access and Compliance Policies/

032 Introduction to Conditional Access Policies.mp4

72.6 MB

033 Demonstration of controlling access using Conditional Access Policies.mp4

50.9 MB

034 Stepping through the hands on tutorial for Conditional Access Policies.mp4

13.2 MB

035 Understanding Device Compliance Policies.mp4

55.6 MB

036 Implementing Device Compliance Policies using Enpoint Manager.mp4

55.4 MB

/11 AIP (Azure Information Protection)/

037 Introduction to Azure Information Protection.mp4

55.7 MB

038 Demonstration on creating and managing AIP Sensitivity Labels.mp4

50.8 MB

039 Stepping through the hands on tutorial for creating AIP Sensitivity Labels.mp4

15.1 MB

040 Publishing AIP Labels in Microsoft 365.mp4

25.1 MB

041 Demonstration on publishing AIP Labels.mp4

17.1 MB

042 Stepping through the hands on tutorial for publishing AIP Labels.mp4

9.3 MB

043 Demonstration for using keyword based AIP Policies.mp4

20.4 MB

044 Stepping through the hands on tutorial for using keyword based AIP Policies.mp4

8.6 MB

045 Using AIP to block actions based upon keywords.mp4

26.1 MB

046 Stepping through the tutorial for using AIP to block actions based on keywords.mp4

14.3 MB

/12 Data Governance with DLP (Data Loss Prevention)/

047 Introduction to Data Loss Prevention.mp4

50.3 MB

048 Demonstration of implementing Data Loss Prevention.mp4

32.7 MB

049 Stepping through the first hands on tutorial for creating a DLP policy.mp4

15.0 MB

050 Demonstration for editing an existing DLP Policy to apply an exception rule.mp4

48.5 MB

051 Stepping through the tutorial for editing an existing DLP Policy.mp4

12.6 MB

052 Demonstration in editing a DLP Policy to add incident report support for a user.mp4

24.3 MB

053 Stepping through the tutorial for adding incident report support to a DLP Policy.mp4

12.9 MB

054 Data Governance and Retention using Security and Compliance.mp4

17.8 MB

/13 ATP (Advance Threat Protection)/

055 Introduction to ATP (Advanced Threat Protection).mp4

57.9 MB

056 Demonstration on configuring and creating ATP Safe Attachments and Safe Links.mp4

51.0 MB

057 Stepping through the hands on tutorial for creating an ATP Safe Links Policy.mp4

10.9 MB

058 Windows Defender ATP Guard Technologies.mp4

63.3 MB

/14 eDiscovery Reporting Auditing and Alerts/

059 Introduction to eDiscovery in Microsoft 365.mp4

47.6 MB

060 Demonstration for adding privileges to a user to manage eDiscovery.mp4

11.6 MB

061 Stepping through the hands on tutorial for assigning eDiscovery Manager rights.mp4

8.0 MB

062 Demonstration using eDiscovery and placing a hold on a user.mp4

19.3 MB

063 Stepping through the hands on tutorial for placing an eDiscovery Hold.mp4

12.1 MB

064 Working with Security Reports in Microsoft 365.mp4

50.7 MB

065 Working with Auditing Alerts and Content Searches in Microsoft 365.mp4

35.0 MB

/15 Microsoft Intune with Endpoint Manager/

066 Introduction to Microsoft Intune.mp4

96.5 MB

067 Using Intune with the Endpoint Manager Portal.mp4

104.4 MB

068 Understanding how Device Configuration Profiles can help secure devices.mp4

43.6 MB

069 Implementing a Device Configuration Profile with Intune.mp4

42.2 MB

070 Using App Protection Policies to help protect Office 365 Apps.mp4

54.4 MB

/16 Securing Microsoft 365 Hybrid Environments/

071 Foundation of Active Directory Domains.mp4

32.8 MB

072 A foundation for Remote Access DMZs and Virtualization.mp4

33.2 MB

073 A foundation of the Microsoft Cloud Services.mp4

65.5 MB

074 Setting up custom domain settings to prepare for Azure AD Connect.mp4

60.9 MB

075 Setting up custom domain name setting in AzureAD.mp4

28.1 MB

076 Performing cleanup to prepare for Azure AD connect.mp4

54.5 MB

077 Setting up a Hybrid environment using AzureAD Connect.mp4

139.0 MB

078 Verifying Azure AD Connect Health.mp4

28.9 MB

/17 Cloud App Security/

079 Understanding Cloud App Security.mp4

99.8 MB

080 Utilizing Cloud App Security.mp4

90.8 MB

081 Stepping through the simulation for Cloud App Security.mp4

14.2 MB

/18 Azure Sentinel/

082 Understanding Azure Sentinel.mp4

104.7 MB

083 Connecting to Azure Sentinel.mp4

45.1 MB

084 Using Azure Sentinel.mp4

114.5 MB

085 Stepping through the Azure Sentinel Tutorial.mp4

9.7 MB

 

Total files 85


Copyright © 2024 FileMood.com