وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Microsoft Certified: Cybersecurity Architect Expert (SC-100) Online Training

سرفصل های دوره

This intermediate SC-100 training prepares learners to design a large network's security architecture that protects its infrastructure, app, and data components, and is grounded in the Zero Trust strategy.

According to Microsoft, an expert cybersecurity architect isn't just a technical master of the individual components, technology, and protocols involved. They're also a master of the soft skills involved with planning a network security posture. In order to earn Microsoft's certification for expert cybersecurity architects, you'll need to show you have the ability to design an enterprise network's security that doesn't just protect a business' network but also advances their business needs in the digital space.


1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)
  • 1. Examining the Microsoft Cybersecurity Reference Architecture-1
  • 2. Security Operations - Microsoft Certified Cybersecurity Arch-1
  • 3. SaaS & Identity Protection - Microsoft Certified Cybersecuri
  • 4. Endpoints and Devices - Microsoft Certified Cybersecurity Ar-1
  • 5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1
  • 6. Information Protection - Microsoft Certified Cybersecurity A
  • 7. IoT and Operational Technology (OT) - Microsoft Certified Cy-1
  • 8. People Security - Microsoft Certified Cybersecurity Architec
  • 9. Other Resources - Microsoft Certified Cybersecurity Architec

  • 2. Translating Security Requirements
  • 1. Guiding Principals of Zero Trust - Microsoft Certified Cyber
  • 2. Translating Requirements - Microsoft Certified Cybersecurity
  • 3. Translating Business Goals into Security Requirements - Micr
  • 4. Technical Solutions Basics - Microsoft Certified Cybersecuri
  • 5. Azure Security Top 10 - Microsoft Certified Cybersecurity Ar
  • 6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1
  • 7. Securing Privileged Access Using RaMP - Microsoft Certified -1

  • 3. Designing Security Strategies
  • 1. Designing Security for a Resiliency Strategy - Microsoft Cer
  • 2. Hybrid Environmental Security Strategies - Microsoft Certifi
  • 3. Multi-tenant Environmental Security Strategies - Microsoft C
  • 4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1
  • 5. Azure Best Practices for Network Security - Microsoft Certif-1

  • 4. Designing a Security Operations Strategy
  • 1. Security Operations Strategy Overview - Microsoft Certified
  • 2. Frameworks, Processes, and Procedures - Microsoft Certified
  • 3. Logging and Auditing Strategy - Microsoft Certified Cybersec
  • 4. SecOps for a Hybrid or Multi-cloud Environment - Microsoft C-1
  • 5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit
  • 6. Evaluating Security Workflows - Microsoft Certified Cybersec-1
  • 7. Incident Management - Microsoft Certified Cybersecurity Arch
  • 8. Strategy for Sharing Technical Threat Intelligence - Microso

  • 5. Designing an Identity Security Strategy
  • 1. Strategy for Access to Cloud Resources - Microsoft Certified
  • 2. Identity Store Strategy - Microsoft Certified Cybersecurity
  • 3. Authentication and Authorization Strategy - Microsoft Certif-1
  • 4. Strategy for Conditional Access - Microsoft Certified Cybers
  • 5. Role Assignment and Delegation - Microsoft Certified Cyberse-1
  • 6. Privileged Role Access to Infrastructure - Microsoft Certifi-1
  • 7. Strategy for Privileged Activities - Microsoft Certified Cyb

  • 6. Designing a Regulatory Compliance Strategy
  • 1. Translating Compliance Requirements - Microsoft Certified Cy-1
  • 2. Compliance and Defender for Cloud - Microsoft Certified Cybe-1
  • 3. Compliance Scores and Recommendations - Microsoft Certified -1
  • 4. Implementing Azure Policy - Microsoft Certified Cybersecurit
  • 5. Data Residency Requirements - Microsoft Certified Cybersecur
  • 6. Translating Privacy Requirements - Microsoft Certified Cyber

  • 7. Evaluating and Managing Security Postures
  • 1. Evaluating Security Postures by Using Benchmarks - Microsoft-1
  • 2. Evaluating Security Postures by Using Defender for Cloud - M-1
  • 3. Evaluate Security Posture of Cloud Workloads - Microsoft Cer-1
  • 4. Designing Security for an Azure Landing Zone - Microsoft Cer
  • 5. Interpret Technical Threat Intelligence - Microsoft Certifie-1
  • 6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1

  • 8. Designing a Strategy for Securing Server and Client Endpoints
  • 1. Security Baselines for Servers and Client Endpoints - Micros-1
  • 2. Security Requirements for Servers - Microsoft Certified Cybe
  • 3. Security Requirements for Mobile Devices and Clients - Micro
  • 4. Requirements to Secure Active Directory Domain Services - Mi-1
  • 5. Strategy to Manage Secrets, Keys, and Certificates - Microso-1
  • 6. Strategy for Securing Remote Access - Microsoft Certified Cy

  • 9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services
  • 1. Security Baselines for SaaS, PaaS, and IaaS services - Micro
  • 2. Security Requirements for IoT Workloads - Microsoft Certifie
  • 3. Security Requirements for Data Workloads - Microsoft Certifi-1
  • 4. Security Requirements for Web Workloads - Microsoft Certifie
  • 5. Security Requirements for Storage Workloads - Microsoft Cert-1
  • 6. Security Requirements for Containers and Orchestration - Mic-1

  • 10. Design a security strategy for data and applications
  • 1. Specify Priorities for Mitigating Threats to Apps - Microsof-1
  • 2. Onboarding New Applications - Microsoft Certified Cybersecur-1
  • 3. Security Strategy for Applications and APIs - Microsoft Cert-1
  • 4. Priorities For Mitigating Threats To Data - Microsoft Certif-1
  • 5. Identify and Protect Sensitive Data - Microsoft Certified Cy
  • 6. Encryption Standards for Data at Rest and In Motion - Micros-1
  • 7. Azure Data Security and Encryption Best Practices - Microsof
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 8322
    حجم: 2349 مگابایت
    مدت زمان: 552 دقیقه
    تاریخ انتشار: 8 فروردین 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید