Microsoft Cybersecurity Stack - Securing Enterprise Information\Exercise Files\Ex_Files_Microsoft_Cybersecurity_Stack_SEI.zip |
4,615 |
FD55269D |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\03.Lab requirements.mp4
[a6c41bf891c19bcd]
|
1,188,090 |
D5CBC693 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\01.Welcome.en.srt |
2,271 |
66059483 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\02.What you should know.mp4
[94bfc92dbda3f613]
|
773,538 |
D389E9FB |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\03.Lab requirements.en.srt |
937 |
4228B986 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\02.What you should know.en.srt |
571 |
A18653AD |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\01.Welcome.mp4
[13e4f6db333203aa]
|
4,706,149 |
084FADED |
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion\28.Next steps.mp4
[ed5c476d93013bb]
|
2,651,998 |
B6ABC42D |
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion\28.Next steps.en.srt |
1,481 |
AE61B4FE |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\20.Using SharePoint security policies.en.srt |
6,439 |
2B335EC7 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\21.Audit sharing activity in SharePoint.mp4
[33bb0d8c7134bc74]
|
8,040,054 |
16B01C18 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\20.Using SharePoint security policies.mp4
[6854864c87ac3aaa]
|
9,558,572 |
126661C3 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\19.Configure built-in IRM options.mp4
[4b193fe0b5d1a5dc]
|
20,093,860 |
17441343 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\18.Information Rights Management (IRM) in SharePoint.mp4
[87e51e34979c3965]
|
7,046,171 |
F0656D2F |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\22.Secure email sharing with anyone, anywhere.mp4
[b5c8353a33970e4b]
|
11,788,855 |
856D56B4 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\22.Secure email sharing with anyone, anywhere.en.srt |
7,435 |
EDE2EE8F |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\18.Information Rights Management (IRM) in SharePoint.en.srt |
4,289 |
EDD128CE |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\21.Audit sharing activity in SharePoint.en.srt |
5,293 |
B5AC24A1 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\19.Configure built-in IRM options.en.srt |
10,816 |
06E4477A |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\10.Data loss prevention (DLP) on mobile devices.en.srt |
9,170 |
97058969 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\12.Implement DLP for unmanaged mobile devices.mp4
[d34410a8415de255]
|
14,488,871 |
F1EDB91C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\11.Secure sharing from mobile devices.en.srt |
2,706 |
FBBE2D21 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\10.Data loss prevention (DLP) on mobile devices.mp4
[b7130dfca28699c1]
|
14,997,263 |
E90019A3 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\09.Challenges of securing data on mobile devices.en.srt |
5,416 |
CC37B59E |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\12.Implement DLP for unmanaged mobile devices.en.srt |
10,045 |
DBB201C5 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\11.Secure sharing from mobile devices.mp4
[5f885e85b6c674c7]
|
4,413,007 |
531DB49D |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\09.Challenges of securing data on mobile devices.mp4
[a7c851ac9eb5dc0b]
|
8,837,604 |
01E3628A |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\07.Work with the AIP client.en.srt |
11,947 |
40814A3B |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\07.Work with the AIP client.mp4
[fd8dc651037db0a2]
|
17,481,786 |
82C891E8 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\05.Configure classification and labeling.en.srt |
9,145 |
ECA1DE50 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\04.What is Azure Information Protection (AIP).en.srt |
8,413 |
89B82476 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\06.Create RMS templates.en.srt |
12,126 |
50DB7405 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\04.What is Azure Information Protection (AIP).mp4
[ca315e4a45a7ae1e]
|
12,617,779 |
44A11D61 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\08.Classify and protect data in bulk.mp4
[20a58412cdb28aa0]
|
6,207,627 |
DA7015FC |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\06.Create RMS templates.mp4
[dab83087b282fed1]
|
18,990,382 |
8763C43C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\08.Classify and protect data in bulk.en.srt |
4,336 |
8573E28E |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\05.Configure classification and labeling.mp4
[679f6929f85efbeb]
|
13,657,143 |
A12425FC |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\24.What is SQL 'Always Encrypted'.en.srt |
8,646 |
3CC8CB40 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\23.Secure structured data at rest.mp4
[6d5c4490c90bb843]
|
13,589,559 |
CF9BF6B0 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\27.Protect Azure SQL with SQL Threat Detection.en.srt |
5,626 |
47BB4914 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\25.Using row-level security.mp4
[c462a758064f6c18]
|
15,063,471 |
BB78733C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\24.What is SQL 'Always Encrypted'.mp4
[56a287486130d8be]
|
12,549,603 |
D5A1EE06 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\26.Configure dynamic data masking.en.srt |
4,572 |
6D8F81AA |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\26.Configure dynamic data masking.mp4
[3ad35fe680c63257]
|
9,325,536 |
75B4E2CD |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\25.Using row-level security.en.srt |
7,296 |
19AA2061 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\23.Secure structured data at rest.en.srt |
8,408 |
662F3728 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\27.Protect Azure SQL with SQL Threat Detection.mp4
[1e0cd1f71a39ed7a]
|
7,825,106 |
230A1B94 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\16.Configure automatic log upload.mp4
[df6b4acad5cd3d34]
|
10,505,686 |
808ED203 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\16.Configure automatic log upload.en.srt |
6,195 |
EB2A48F9 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\13.What is Cloud App Security (CAS).mp4
[45b3c7be5ee4a050]
|
13,846,982 |
E76CC485 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\13.What is Cloud App Security (CAS).en.srt |
8,127 |
30E85F0A |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\15.Customize discovery and anonymize discovery data.en.srt |
4,691 |
03842D00 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\14.Deploy Cloud Discovery.mp4
[ff34a3c15fe3d0e4]
|
9,851,275 |
786F4C89 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\15.Customize discovery and anonymize discovery data.mp4
[b19aaefb6c2ae5c3]
|
7,607,599 |
31172F5C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\17.Connect apps to CAS.en.srt |
7,262 |
953199BB |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\17.Connect apps to CAS.mp4
[b667136c3e64d881]
|
12,911,411 |
013DDD13 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\14.Deploy Cloud Discovery.en.srt |
6,183 |
B83B4501 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\Exercise Files |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information |
0 |
00000000 |
|
Total size: |
290,799,434 |
|