Description
Price: 10.00 USD | Size: 11.0 GB GB | Duration : 9+ Hours | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND: Expert TRAINING | ENGLISH | Bonus : SC-100 PDF Guides | INSTANT DOWNLOAD
Microsoft Certified Cybersecurity Architect Expert (SC-100) Course & PDF Guides
This intermediate SC-100 training prepares learners to design a large network’s security architecture that protects its infrastructure, app, and data components, and is grounded in the Zero Trust strategy.
According to Microsoft, an expert cybersecurity architect isn’t just a technical master of the individual components, technology, and protocols involved. They’re also a master of the soft skills involved with planning a network security posture. In order to earn Microsoft’s certification for expert cybersecurity architects, you’ll need to show you have the ability to design an enterprise network’s security that doesn’t just protect a business’ network but also advances their business needs in the digital space.
That’s a big expectation, but this course is designed to help you practice the skills you’re expected to know for the SC-100, the exam that stands between you and the Cybersecurity Architect Expert.
After completing this SC-100 training, you’ll know how to design a large network’s security architecture that protects its infrastructure, app, and data components, and is grounded in the Zero Trust strategy.
For anyone who manages cybersecurity architecture training, this Azure training can be used to onboard new cybersecurity associates, curated into individual or team training plans, or as a Azure reference resource.
SC-100: What You Need to Know
This Cybersecurity Architect Expert training covers cybersecurity architecture topics including:
- Designing security strategies and architecture grounded in the Zero-Trust strategy
- Incorporating governance risk compliance strategies into network security
- Recognizing the key differences between infrastructure and app security
Who Should Take SC-100 Training?
This Cybersecurity Architect Expert training is considered expert-level Azure training, which means it was designed for cybersecurity architects. This cybersecurity architecture skills course is designed for cybersecurity associates with three to five years of experience with cybersecurity architecture.
New or aspiring cybersecurity associates. If you’re a brand new cybersecurity employee, aiming to earn the Microsoft Certified: Cybersecurity Architect Expert is probably too steep a goal right now. But you can take this course and get the 30,000-foot view of what you need to think about when planning an enterprise network security posture and prepare your career around the skills necessary for that.
Experienced cybersecurity associates. If you’ve been working in cybersecurity for several years already, this course and the Cybersecurity Architect Expert certification are good choices for leapfrogging ahead in the security world. You’ll learn top-level skills that mesh with your technical expertise and prepare you for taking on leadership and management jobs.
Examining the Microsoft Cybersecurity Reference Architecture (MCRA)
1. Intro to the Microsoft Cybersecurity Reference Architecture (MCRA)
4 mins
2. Security Operations
11 mins
3. SaaS & Identity Protection
6 mins
4. Endpoints and Devices
4 mins
5. Hybrid Infrastructure
16 mins
6. Information Protection
5 mins
7. IoT and Operational Technology (OT)
3 mins
8. People Security
3 mins
9. Other Resources
9 mins
Translating Security Requirements
1. Guiding Principals of Zero Trust
7 mins
2. Translating Requirements
12 mins
3. Translating Business Goals into Security Requirements
10 mins
4. Technical Solutions Basics
4 mins
5. Azure Security Top 10
8 mins
6. Azure Security Benchmark
8 mins
7. Securing Privileged Access Using RaMP
4 mins
Designing Security Strategies
1. Designing Security for a Resiliency Strategy
10 mins
2. Hybrid Environmental Security Strategies
12 mins
3. Multi-tenant Environmental Security Strategies
5 mins
4. Traffic Filtering and Segmentation Strategies
9 mins
5. Azure Best Practices for Network Security
13 mins
Designing a Security Operations Strategy
1. Security Operations Strategy Overview
8 mins
2. Frameworks, Processes, and Procedures
9 mins
3. Logging and Auditing Strategy
8 mins
4. SecOps for a Hybrid or Multi-cloud Environment
2 mins
5. SIEM/SOAR Strategy
9 mins
6. Evaluating Security Workflows
7 mins
7. Incident Management
4 mins
8. Strategy for Sharing Technical Threat Intelligence
4 mins
Designing an Identity Security Strategy
1. Strategy for Access to Cloud Resources
11 mins
2. Identity Store Strategy
5 mins
3. Authentication and Authorization Strategy
6 mins
4. Strategy for Conditional Access
7 mins
5. Role Assignment and Delegation
7 mins
6. Privileged Role Access to Infrastructure
7 mins
7. Strategy for Privileged Activities
7 mins
Designing a Regulatory Compliance Strategy
1. Translating Compliance Requirements
10 mins
2. Compliance and Defender for Cloud
6 mins
3. Compliance Scores and Recommendations
6 mins
4. Implementing Azure Policy
10 mins
5. Data Residency Requirements
5 mins
6. Translating Privacy Requirements
10 mins
Evaluating and Managing Security Postures
1. Evaluating Security Postures by Using Benchmarks
6 mins
2. Evaluating Security Postures by Using Defender for Cloud
5 mins
3. Evaluate Security Posture of Cloud Workloads
5 mins
4. Designing Security for an Azure Landing Zone
10 mins
5. Interpret Technical Threat Intelligence
8 mins
6. Mitigating Identified Risks
12 mins
Designing a Strategy for Securing Server and Client Endpoints
1. Security Baselines for Servers and Client Endpoints
9 mins
2. Security Requirements for Servers
9 mins
3. Security Requirements for Mobile Devices and Clients
9 mins
4. Requirements to Secure Active Directory Domain Services
9 mins
5. Strategy to Manage Secrets, Keys, and Certificates
10 mins
6. Strategy for Securing Remote Access
6 mins
Designing a Strategy for Securing SaaS, PaaS, and IaaS Services
1. Security Baselines for SaaS, PaaS, and IaaS services
8 mins
2. Security Requirements for IoT Workloads
7 mins
3. Security Requirements for Data Workloads
9 mins
4. Security Requirements for Web Workloads
5 mins
5. Security Requirements for Storage Workloads
8 mins
6. Security Requirements for Containers and Orchestration
8 mins
Design a security strategy for data and applications
1. Specify Priorities for Mitigating Threats to Apps
13 mins
2. Onboarding New Applications
10 mins
3. Security Strategy for Applications and APIs
10 mins
4. Priorities For Mitigating Threats To Data
11 mins
5. Identify and Protect Sensitive Data
8 mins
6. Encryption Standards for Data at Rest and In Motion
10 mins
7. Azure Data Security and Encryption Best Practices
5 mins
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.