TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Microsoft Information Security Administrator Associate (SC-401) Cert Prep by Microsoft Press

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01. Introduction/01. Exam SC-401 administering information security in Microsoft 365 Introduction.mp4
13 MB
~Get Your Files Here !/01. Introduction/01. Exam SC-401 administering information security in Microsoft 365 Introduction.srt
6.3 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/01. Module introduction.mp4
3.8 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/01. Module introduction.srt
1.9 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/02. Learning objectives.mp4
3.7 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/02. Learning objectives.srt
1.8 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/03. Identify sensitive information requirements for an organization’s data.mp4
21 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/03. Identify sensitive information requirements for an organization’s data.srt
12 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/04. Translate requirements into built-in or custom sensitive info types.mp4
7.5 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/04. Translate requirements into built-in or custom sensitive info types.srt
5.0 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/05. Create and manage custom sensitive info types.mp4
15 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/05. Create and manage custom sensitive info types.srt
9.5 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/06. Implement document fingerprinting.mp4
16 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/06. Implement document fingerprinting.srt
8.1 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/07. Create and manage exact data match (EDM) classifiers.mp4
12 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/07. Create and manage exact data match (EDM) classifiers.srt
9.1 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/08. Create and manage trainable classifiers.mp4
17 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/08. Create and manage trainable classifiers.srt
10 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/09. Monitor classification with data explorer and content explorer.mp4
14 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/09. Monitor classification with data explorer and content explorer.srt
8.5 kB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/10. Configure optical character recognition (OCR) support for sensitive info types.mp4
10 MB
~Get Your Files Here !/02. 1. Implement and Manage Data Classification/10. Configure optical character recognition (OCR) support for sensitive info types.srt
7.2 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/01. Learning objectives.mp4
3.6 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/01. Learning objectives.srt
1.7 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/02. Implement roles and permissions for sensitivity labels.mp4
15 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/02. Implement roles and permissions for sensitivity labels.srt
10 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/03. Define and create sensitivity labels for items and containers.mp4
14 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/03. Define and create sensitivity labels for items and containers.srt
9.9 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/04. Configure protection settings and content marking for sensitivity labels.mp4
9.0 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/04. Configure protection settings and content marking for sensitivity labels.srt
7.6 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/05. Configure and manage publishing policies for sensitivity labels.mp4
17 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/05. Configure and manage publishing policies for sensitivity labels.srt
12 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/06. Configure and manage autolabeling policies for sensitivity labels.mp4
20 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/06. Configure and manage autolabeling policies for sensitivity labels.srt
14 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/07. Apply sensitivity labels to containers, such as Microsoft Teams, Microsoft 365 Groups, Microsoft Power BI, and Microsoft SharePoint.mp4
14 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/07. Apply sensitivity labels to containers, such as Microsoft Teams, Microsoft 365 Groups, Microsoft Power BI, and Microsoft SharePoint.srt
8.0 kB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/08. Apply sensitivity labels by using Defender for Cloud Apps.mp4
18 MB
~Get Your Files Here !/03. 2. Implement and Manage Sensitivity Labels in Microsoft Purview/08. Apply sensitivity labels by using Defender for Cloud Apps.srt
14 kB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/01. Learning objectives.mp4
3.4 MB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/01. Learning objectives.srt
1.6 kB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/02. Implement protection for Windows, file shares, and Exchange.mp4
24 MB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/02. Implement protection for Windows, file shares, and Exchange.srt
16 kB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/03. Plan and implement the Purview Information Protection client.mp4
16 MB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/03. Plan and implement the Purview Information Protection client.srt
10 kB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/04. Manage files using the Purview client.mp4
17 MB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/04. Manage files using the Purview client.srt
13 kB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/05. Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner.mp4
26 MB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/05. Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner.srt
18 kB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/06. Design and implement Microsoft Purview Message Encryption.mp4
15 MB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/06. Design and implement Microsoft Purview Message Encryption.srt
11 kB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/07. Design and implement Microsoft Purview Advanced Message Encryption.mp4
3.8 MB
~Get Your Files Here !/04. 3. Implement Information Protection for Windows, File Shares, and Exchange/07. Design and implement Microsoft Purview Advanced Message Encryption.srt
2.8 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/01. Module introduction.mp4
3.6 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/01. Module introduction.srt
1.5 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/02. Learning objectives.mp4
3.9 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/02. Learning objectives.srt
1.5 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/03. Design DLP policies based on an organization’s requirements.mp4
8.5 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/03. Design DLP policies based on an organization’s requirements.srt
5.7 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/04. Implement roles and permissions for DLP.mp4
5.9 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/04. Implement roles and permissions for DLP.srt
4.5 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/05. Create and manage DLP policies.mp4
10 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/05. Create and manage DLP policies.srt
8.3 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/06. Configure DLP policies for Adaptive Protection.mp4
12 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/06. Configure DLP policies for Adaptive Protection.srt
9.0 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/07. Interpret policy and rule precedence in DLP.mp4
10 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/07. Interpret policy and rule precedence in DLP.srt
8.7 kB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/08. Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy.mp4
10 MB
~Get Your Files Here !/05. 4. Create and Configure Data Loss Prevention (DLP) Policies/08. Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy.srt
7.6 kB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/01. Learning objectives.mp4
3.8 MB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/01. Learning objectives.srt
1.3 kB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/02. Specify device requirements for Endpoint DLP, including extensions.mp4
6.6 MB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/02. Specify device requirements for Endpoint DLP, including extensions.srt
4.2 kB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/03. Configure advanced DLP rules for devices in DLP policies.mp4
12 MB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/03. Configure advanced DLP rules for devices in DLP policies.srt
8.1 kB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/04. Configure Endpoint DLP settings.mp4
15 MB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/04. Configure Endpoint DLP settings.srt
10 kB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/05. Configure just-in-time protection.mp4
17 MB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/05. Configure just-in-time protection.srt
12 kB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/06. Monitor endpoint activities.mp4
11 MB
~Get Your Files Here !/06. 5. Implement and Monitor Microsoft Purview Endpoint DLP/06. Monitor endpoint activities.srt
7.2 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/01. Learning objectives.mp4
3.5 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/01. Learning objectives.srt
1.8 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/02. Plan for information retention and disposition by using retention labels.mp4
17 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/02. Plan for information retention and disposition by using retention labels.srt
12 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/03. Create, configure, and manage adaptive scopes.mp4
9.0 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/03. Create, configure, and manage adaptive scopes.srt
7.1 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/04. Create retention labels for data lifecycle management.mp4
8.6 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/04. Create retention labels for data lifecycle management.srt
7.8 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/05. Configure retention label policies (publishautoapply).mp4
15 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/05. Configure retention label policies (publishautoapply).srt
11 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/06. Interpret the results of policy precedence, including using policy lookup.mp4
15 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/06. Interpret the results of policy precedence, including using policy lookup.srt
9.7 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/07. Create and configure retention policies.mp4
11 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/07. Create and configure retention policies.srt
8.6 kB
~Get Your Files Here !/07. 6. Implement and Manage Retention/08. Recover retained content in Microsoft 365.mp4
18 MB
~Get Your Files Here !/07. 6. Implement and Manage Retention/08. Recover retained content in Microsoft 365.srt
12 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/01. Module introduction.mp4
4.7 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/01. Module introduction.srt
2.1 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/02. Learning objectives.mp4
3.6 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/02. Learning objectives.srt
2.1 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/03. Implement roles and permissions for Insider Risk Management.mp4
11 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/03. Implement roles and permissions for Insider Risk Management.srt
7.6 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/04. Plan and implement Insider Risk Management connectors.mp4
18 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/04. Plan and implement Insider Risk Management connectors.srt
12 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/05. Plan and implement integration with Microsoft Defender for Endpoint.mp4
6.9 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/05. Plan and implement integration with Microsoft Defender for Endpoint.srt
4.8 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/06. Configure and manage Insider Risk Management settings.mp4
7.6 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/06. Configure and manage Insider Risk Management settings.srt
6.3 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/07. Configure policy indicators.mp4
14 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/07. Configure policy indicators.srt
9.2 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/08. Select an appropriate policy template.mp4
8.6 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/08. Select an appropriate policy template.srt
6.6 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/09. Create and manage Insider Risk Management policies.mp4
12 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/09. Create and manage Insider Risk Management policies.srt
9.2 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/10. Manage forensic evidence settings.mp4
11 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/10. Manage forensic evidence settings.srt
8.1 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/11. Enable and configure insider risk levels for Adaptive Protection.mp4
9.2 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/11. Enable and configure insider risk levels for Adaptive Protection.srt
6.3 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/12. Manage insider risk alerts and cases.mp4
19 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/12. Manage insider risk alerts and cases.srt
13 kB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/13. Manage Insider Risk Management workflow, including notice templates.mp4
23 MB
~Get Your Files Here !/08. 7. Implement and Manage Microsoft Purview Insider Risk Management/13. Manage Insider Risk Management workflow, including notice templates.srt
16 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/01. Learning objectives.mp4
3.5 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/01. Learning objectives.srt
1.8 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/02. Assign Microsoft Purview Audit (Premium) user licenses.mp4
5.7 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/02. Assign Microsoft Purview Audit (Premium) user licenses.srt
3.1 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/03. Investigate activities by using Microsoft Purview Audit.mp4
4.1 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/03. Investigate activities by using Microsoft Purview Audit.srt
2.6 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/04. Configure audit retention policies.mp4
8.3 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/04. Configure audit retention policies.srt
5.8 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/05. Analyze Purview activities by using activity explorer.mp4
8.6 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/05. Analyze Purview activities by using activity explorer.srt
6.1 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/06. Respond to data loss prevention alerts in the Microsoft Purview portal.mp4
9.6 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/06. Respond to data loss prevention alerts in the Microsoft Purview portal.srt
7.0 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/07. Investigate insider risk activities by using the Microsoft Purview portal.mp4
14 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/07. Investigate insider risk activities by using the Microsoft Purview portal.srt
8.5 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/08. Respond to Purview alerts in Microsoft Defender XDR.mp4
8.1 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/08. Respond to Purview alerts in Microsoft Defender XDR.srt
5.5 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/09. Respond to Defender for Cloud Apps file policy alerts.mp4
8.0 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/09. Respond to Defender for Cloud Apps file policy alerts.srt
4.6 kB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/10. Perform searches by using Content search.mp4
6.9 MB
~Get Your Files Here !/09. 8. Manage Information Security Alerts and Activities/10. Perform searches by using Content search.srt
5.2 kB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/01. Learning objectives.mp4
3.8 MB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/01. Learning objectives.srt
2.0 kB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/02. Implement controls in Microsoft Purview to protect content in an environment that uses AI services.mp4
12 MB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/02. Implement controls in Microsoft Purview to protect content in an environment that uses AI services.srt
8.4 kB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/03. Implement controls in Microsoft 365 workloads to protect content in an environment that uses AI services.mp4
5.5 MB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/03. Implement controls in Microsoft 365 workloads to protect content in an environment that uses AI services.srt
3.7 kB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/04. Implement prerequisites for Data Security Posture Management (DSPM) for AI.mp4
12 MB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/04. Implement prerequisites for Data Security Posture Management (DSPM) for AI.srt
7.5 kB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/05. Manage roles and permissions for DSPM for AI.mp4
4.2 MB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/05. Manage roles and permissions for DSPM for AI.srt
2.6 kB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/06. Configure DSPM for AI policies.mp4
6.0 MB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/06. Configure DSPM for AI policies.srt
4.9 kB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/07. Monitor activities in DSPM for AI.mp4
10 MB
~Get Your Files Here !/10. 9. Protect Data Used by AI Services/07. Monitor activities in DSPM for AI.srt
7.9 kB
~Get Your Files Here !/11. Conclusion/01. Course summary.mp4
9.7 MB
~Get Your Files Here !/11. Conclusion/01. Course summary.srt
4.2 kB
~Get Your Files Here !/Bonus Resources.txt
70 B