TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - Microsoft Purview Data Protection for SOC and Security Teams

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction/1. Introduction.mp4
17 MB
~Get Your Files Here !/1 - Introduction/2. Welcome & Course Orientation.mp4
21 MB
~Get Your Files Here !/1 - Introduction/3. Instructor Introduction and Why This Course Exists.mp4
12 MB
~Get Your Files Here !/1 - Introduction/4. Why Most Purview Deployments Fail.mp4
10 MB
~Get Your Files Here !/1 - Introduction/5. Who This Course Is (and Is Not) For.mp4
9.7 MB
~Get Your Files Here !/1 - Introduction/6. What You Will Be Able to Do After This Course.mp4
9.8 MB
~Get Your Files Here !/1 - Introduction/7. How This Course Is Structured.mp4
7.0 MB
~Get Your Files Here !/1 - Introduction/8. Labs, Tenant Safety & Expectations.mp4
7.7 MB
~Get Your Files Here !/1 - Introduction/9. Learning Paths & Career Alignment.mp4
7.4 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/10. Objectives.mp4
21 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/11. Microsoft Purview is a Security Control.mp4
20 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/12. Where Purview Fits in the Microsoft Security Stack.mp4
33 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/13. Data as an Attack Surface.mp4
21 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/14. Real Incident Walkthrough (No Tools Yet).mp4
18 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/15. What Purview Can and Cannot Do.mp4
24 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/16. Common Enterprise Design Failure.mp4
18 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/17. How We Will Build Purview in this Course.mp4
14 MB
~Get Your Files Here !/2 - Microsoft Purview from a Security Architecture View/18. Summary.mp4
11 MB
~Get Your Files Here !/3 - Designing a Real Data Classification Strategy/19. Objectives.mp4
21 MB
~Get Your Files Here !/3 - Designing a Real Data Classification Strategy/20. Why Data Classification Fails in Enterprises.mp4
29 MB
~Get Your Files Here !/3 - Designing a Real Data Classification Strategy/21. Mapping Business Data to Risk Levels.mp4
26 MB
~Get Your Files Here !/3 - Designing a Real Data Classification Strategy/22. Sensitive Info Types vs EDM vs Trainable Classifiers.mp4
23 MB
~Get Your Files Here !/3 - Designing a Real Data Classification Strategy/23. When Auto-Labeling is a Bad Idea.mp4
21 MB
~Get Your Files Here !/3 - Designing a Real Data Classification Strategy/24. Building a Minimal, Effective Classification Model.mp4
17 MB
~Get Your Files Here !/3 - Designing a Real Data Classification Strategy/25. Lab 3.1 Minimal & Defensible Classification Model.mp4
226 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/26. Objectives.mp4
23 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/27. Sensitivity Labels as Access Control.mp4
23 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/28. Encryption vs Rights vs Markings.mp4
42 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/29. Label Inheritance & Collaboration Pitfalls.mp4
25 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/30. Label Across Emails, Files and Containers.mp4
24 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/31. Common Label Breakage Scenarios.mp4
18 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/32. Lab 4.1 Create & Validate DLP (Audit Mode).mp4
179 MB
~Get Your Files Here !/4 - Sensitivity Labels That Actually Enforce Security/33. Lab 4.2 Create & Publish Sensitivity Label.mp4
210 MB
~Get Your Files Here !/5 - Data Loss Prevention That Doesn't Get Disabled/34. Objectives.mp4
22 MB
~Get Your Files Here !/5 - Data Loss Prevention That Doesn't Get Disabled/35. Why DLP Gets Turned Off.mp4
20 MB
~Get Your Files Here !/5 - Data Loss Prevention That Doesn't Get Disabled/36. Endpoint DLP vs M365 DLP.mp4
26 MB
~Get Your Files Here !/5 - Data Loss Prevention That Doesn't Get Disabled/37. Audit vs Block vs Justify.mp4
23 MB
~Get Your Files Here !/5 - Data Loss Prevention That Doesn't Get Disabled/38. Policy Precedence & Conflict Handling.mp4
27 MB
~Get Your Files Here !/5 - Data Loss Prevention That Doesn't Get Disabled/39. Executive & Power-User Exceptions (Reality Check).mp4
23 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/41. Objectives.mp4
30 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/42. Insider risk ≠ Surveillance.mp4
29 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/43. Signal Sources That Actually Matter.mp4
34 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/44. Adaptive Protection Explained Simply.mp4
27 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/45. Evidence Handling & Forensics Settings.mp4
34 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/46. Legal & Ethical Guardrails.mp4
21 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/47. Lab 6.1 Insider Risk Policy Configuration.mp4
114 MB
~Get Your Files Here !/6 - Insider Risk Management for Incident Response/48. Lab 6.2 Insider Risk Alert Investigation Workflow.mp4
132 MB
~Get Your Files Here !/7 - Investigation Purview Alerts in a SOC Workflow/49. Objectives.mp4
27 MB
~Get Your Files Here !/7 - Investigation Purview Alerts in a SOC Workflow/50. Purview Alerts vs Defender XDR Alerts.mp4
27 MB
~Get Your Files Here !/7 - Investigation Purview Alerts in a SOC Workflow/51. Which Alerts Matter to SOC.mp4
22 MB
~Get Your Files Here !/7 - Investigation Purview Alerts in a SOC Workflow/52. Correlating Data, Identity & Endpoint Signals.mp4
26 MB
~Get Your Files Here !/7 - Investigation Purview Alerts in a SOC Workflow/53. Investigating Workflow & Documentation.mp4
27 MB
~Get Your Files Here !/7 - Investigation Purview Alerts in a SOC Workflow/54. Lab 7.1 Identity & Content Validation of Insider Risk Alert.mp4
194 MB
~Get Your Files Here !/8 - Purview + Intune + Zero Trust for Data/55. Objectives.mp4
23 MB
~Get Your Files Here !/8 - Purview + Intune + Zero Trust for Data/56. Device Trust Meets Data Trust.mp4
26 MB
~Get Your Files Here !/8 - Purview + Intune + Zero Trust for Data/57. Managed vs Unmanaged Device Enforcement.mp4
27 MB
~Get Your Files Here !/8 - Purview + Intune + Zero Trust for Data/58. Conditional Access for Data.mp4
32 MB
~Get Your Files Here !/8 - Purview + Intune + Zero Trust for Data/59. Real Zero Trust Data Scenarios.mp4
29 MB
~Get Your Files Here !/8 - Purview + Intune + Zero Trust for Data/60. Lab 8.1 Enforcing Zero Trust Data Access.mp4
252 MB
~Get Your Files Here !/9 - Real-World Design Patterns & Anti-Patterns/61. Objectives.mp4
24 MB
~Get Your Files Here !/9 - Real-World Design Patterns & Anti-Patterns/62. What Breaks Purview Deployments.mp4
23 MB
~Get Your Files Here !/9 - Real-World Design Patterns & Anti-Patterns/63. Why Users Bypass Controls.mp4
22 MB
~Get Your Files Here !/9 - Real-World Design Patterns & Anti-Patterns/64. Executive Pushbacks & How to Handle It.mp4
25 MB
~Get Your Files Here !/9 - Real-World Design Patterns & Anti-Patterns/65. Safe Rollout Strategies.mp4
23 MB
~Get Your Files Here !/9 - Real-World Design Patterns & Anti-Patterns/66. Lesson Learned from Real Environments.mp4
32 MB
~Get Your Files Here !/Bonus Resources.txt
70 B