2 - Chapter 1 The role of a security Architect
3 - Zero Trust Overview
4 - Guiding principles of zero trust
5 - Pillars of Zero Trust
6 - MCRA Identity
7 - MCRA SOC Tools
8 - MCRA Endpoint Security
9 - MCRA Hybrid Computing
10 - MCRA Information Protection
11 - MCRA People Security
12 - MCRA IoT and IT Security II
13 - CAF Introduction
14 - CAF strategy
15 - CAF Planning
16 - CAF Readyness Azure setup guide
17 - CAF Readyness Azure Landing Zone
18 - CAF Landing Zone Deployment Lab Step By StepI
19 - CAF Landing Zone Deployment Lab Step By StepII
20 - CAF Adopt Phase
21 - CAF Governance
22 - IT Transformations Gap analysis
23 - Security transformations
24 - Design Security for resiliency strategy
25 - The reliability Pillar
26 - SC 100 Case study overview
27 - SC 100 Case Study
28 - Reviews
29 - Chapter 2 Design a security options strategy overview
30 - Security operations strategy overview
31 - Security operations frameworks processes and procedures
32 - SecOps and the Leadership
33 - People and Processes
34 - Metrics and Its importance in SOC
35 - Recommendations for Designing a logging and auditing security strategy
36 - Cyber Kill Chain An overview
37 - Focus areas for SOC in hybrid computing
38 - Unified operations in Hybrid clouds
39 - Tiers in SecOps
40 - Azure Tools for SecOps
41 - SecOps Best practices for SIEM SOAR
42 - SecOPs Best Practices for Network and Azure AD Monitoring
43 - Incident Response Best Practices
44 - Recovery Best Practices
45 - Workflow Automation
46 - Workflow Automation Lab
47 - Workflow Automation Logic apps integration Lab
48 - Incident Management process Overview
49 - Incident Management process Preparation
50 - Incident Management Process Detection and Analysis
51 - Incident Management Process Containment Eradication and recovery
52 - Incident Management Process Post Incident Activity
53 - Threat Intelligence and SOC
54 - Threat intelligence in Sentinel
55 - Threat intelligence in Defender for Endpoint
56 - Threat Intelligence for IOT
57 - Threat Intelligence in Defender for Cloud
58 - Chapter2 Case Study
59 - Chapter 3 Identity Security Strategy Introduction
60 - Identity Security Strategy Overview
61 - Evolution of Identity Technology
62 - Microsoft Identity Store Overview
63 - Identity Challenges
64 - Identity Governance Overview
65 - Identity is the new control plane
66 - Zero Trust Concepts and Principles
67 - Zero Trust Components
68 - Planning a Zero Trust Strategy
69 - Zero Trust Model Introduction
70 - Enabling Zero Trust ModelII
71 - Enabling Zero Trust ModelIII
72 - Zero trust Security strategy for Identities
73 - Conditional Access support for Zero Trust Architecture
74 - Conditional Access Personas
75 - Secure Authentication Methods
76 - Secure Authentication Methods II
77 - Password hash Sync PHS
78 - Pass Through Authentication PTA
79 - Azure AD Roles Best Practices
80 - Design a Security Strategy for Privileged Role Access
81 - Develop a Roadmap
82 - Develop a Roadmap Explained
83 - Design a security strategy for privileged activities
84 - Rapid Modernization Plan RAMP
85 - Execute Critical strategic initiatives for Privileged Activity Management
86 - Chapter Case Study 01
86 - case study url reference.zip
87 - Chapter Case Study 02
87 - case study url reference.zip