01 - Exam SC-100 Microsoft Cybersecurity Architect
02 - Module introduction Design a Zero Trust strategy and architecture
03 - Learning objectives
04 - Identify cybersecutiy integration points
05 - Translate business goals to security
06 - Translate security requirements
07 - Design security with resiliency
08 - Hybrid security strategies
09 - Traffic filtering and segmentation
10 - Learning objectives
11 - Designing a logging and auditing strategy
12 - Security operation considerations
13 - Design a SIEM and SOAR strategy
14 - Evaluate security workflows
15 - Evaluate incident management
16 - Evaluate technical threat intelligence
17 - Learning objectives
18 - Design a resource access strategy
19 - Recommend an identity store
20 - Recommend an authentication strategy
21 - Recommend an authorization strategy
22 - Design for conditional access
23 - Design role assignments
24 - Design privilege activity strategy
25 - Module introduction Evaluate governance risk compliance (GRC) technical strategies and secur
26 - Learning objectives
27 - Interpret compliance requirements
28 - Interpret compliance scores
29 - Evaluate infrastructure compliance
30 - Design an Azure Policy configuration
31 - Design for data residency
32 - Translate privacy into security
33 - Learning objectives
34 - Evaluate security using benchmarks
35 - Evaluate security using Defender
36 - Evaluate security using Secure Score
37 - Evaluate security of cloud workloads
38 - Design security with landing zones
39 - Interpret threat intelligence
40 - Mitigate identified risks
41 - Module introduction Design security for infrastructure
42 - Learning objectives
43 - Specify security baselines for endpoints
44 - Specify security requirements for servers
45 - Specify security requirements for mobile devices
46 - Specify requirements to secure AD DS
47 - Design a strategy to manage secrets
48 - Design a strategy for secure remote access
49 - Learning objectives
50 - Specify security baselines for IaaS
51 - Specify security baselines for PaaS
52 - Specify security baselines for SaaS
53 - Specify security baselines for IoT
54 - Specify security requirements for data workloads
55 - Specify security requirements for web workloads
56 - Specify security requirements for storage
57 - Specify security requirements for containers
58 - Specify security requirements for container orchestration
59 - Module introduction Design a strategy for data and application
60 - Learning objectives
61 - Specify priorities for mitigating threats to apps
62 - Specify a security standard for onboarding new apps
63 - Specify a security strategy for apps and APIs
64 - Learning objectives
65 - Specify priorities for mitigating threats to data
66 - Design a strategy to identify and protect sensitive data
67 - Specify an encryption standard for data
68 - Exam SC-100 Microsoft Cybersecurity Architect