وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press

سرفصل های دوره

Prepare for the Microsoft Cybersecurity Architect (SC-100) certification exam, which tests your mastery of designing and evolving cybersecurity strategy. In this course designed by Microsoft Press, instructor Charles Pluta demonstrates how to design solutions that align with security best practices and priorities; design security operations, identity, and compliance capabilities; design security solutions for infrastructure; and design security solutions for applications and data. As a Microsoft-certified Cybersecurity Architect, you’ll also be required to translate a cybersecurity strategy into capabilities that protect the assets, business, and operations of an organization. Learn how to design, guide the implementation of, and maintain security solutions that follow Zero Trust principles and practices, including for identity, devices, data, AI, applications, network, infrastructure, DevOps, governance and risk compliance (GRC), security posture management, and more.

Note: This course was created by Microsoft Press. We are pleased to host this training in our library.

  • 01 - Exam SC-100 Microsoft Cybersecurity Architect
  • 02 - Module introduction Design a Zero Trust strategy and architecture
  • 03 - Learning objectives
  • 04 - Identify cybersecutiy integration points
  • 05 - Translate business goals to security
  • 06 - Translate security requirements
  • 07 - Design security with resiliency
  • 08 - Hybrid security strategies
  • 09 - Traffic filtering and segmentation
  • 10 - Learning objectives
  • 11 - Designing a logging and auditing strategy
  • 12 - Security operation considerations
  • 13 - Design a SIEM and SOAR strategy
  • 14 - Evaluate security workflows
  • 15 - Evaluate incident management
  • 16 - Evaluate technical threat intelligence
  • 17 - Learning objectives
  • 18 - Design a resource access strategy
  • 19 - Recommend an identity store
  • 20 - Recommend an authentication strategy
  • 21 - Recommend an authorization strategy
  • 22 - Design for conditional access
  • 23 - Design role assignments
  • 24 - Design privilege activity strategy
  • 25 - Module introduction Evaluate governance risk compliance (GRC) technical strategies and secur
  • 26 - Learning objectives
  • 27 - Interpret compliance requirements
  • 28 - Interpret compliance scores
  • 29 - Evaluate infrastructure compliance
  • 30 - Design an Azure Policy configuration
  • 31 - Design for data residency
  • 32 - Translate privacy into security
  • 33 - Learning objectives
  • 34 - Evaluate security using benchmarks
  • 35 - Evaluate security using Defender
  • 36 - Evaluate security using Secure Score
  • 37 - Evaluate security of cloud workloads
  • 38 - Design security with landing zones
  • 39 - Interpret threat intelligence
  • 40 - Mitigate identified risks
  • 41 - Module introduction Design security for infrastructure
  • 42 - Learning objectives
  • 43 - Specify security baselines for endpoints
  • 44 - Specify security requirements for servers
  • 45 - Specify security requirements for mobile devices
  • 46 - Specify requirements to secure AD DS
  • 47 - Design a strategy to manage secrets
  • 48 - Design a strategy for secure remote access
  • 49 - Learning objectives
  • 50 - Specify security baselines for IaaS
  • 51 - Specify security baselines for PaaS
  • 52 - Specify security baselines for SaaS
  • 53 - Specify security baselines for IoT
  • 54 - Specify security requirements for data workloads
  • 55 - Specify security requirements for web workloads
  • 56 - Specify security requirements for storage
  • 57 - Specify security requirements for containers
  • 58 - Specify security requirements for container orchestration
  • 59 - Module introduction Design a strategy for data and application
  • 60 - Learning objectives
  • 61 - Specify priorities for mitigating threats to apps
  • 62 - Specify a security standard for onboarding new apps
  • 63 - Specify a security strategy for apps and APIs
  • 64 - Learning objectives
  • 65 - Specify priorities for mitigating threats to data
  • 66 - Design a strategy to identify and protect sensitive data
  • 67 - Specify an encryption standard for data
  • 68 - Exam SC-100 Microsoft Cybersecurity Architect
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42140
    حجم: 1641 مگابایت
    مدت زمان: 104 دقیقه
    تاریخ انتشار: ۷ دی ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید