وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Pathway to Microsoft Cybersecurity Architect

سرفصل های دوره

SC-100: Microsoft Cybersecurity Architect


1 - Introduction
  • 1 - About course
  • 1 - Introduction.pdf
  • 2 - Cybersecurity Architecture and Architect
  • 3 - Start with Microsoft Security Best Practices
  • 4 - Common security antipatterns

  • 2 - Discuss Perimeter and Zero Trust Security Models
  • 5 - Discuss-perimeter-and-zero-trust-security-models.pdf
  • 5 - Section objectives
  • 6 - What is Perimeter Security Model
  • 7 - What is Zero Trust Security Model
  • 8 - Zero Trust as a security strategy
  • 9 - Zero Trust components
  • 10 - Zero Trust Architecture
  • 11 - Zero Trust RaMP Initiatives
  • 12 - Zero Trust Deployment Objectives

  • 3 - Security Design that aligns with CAF and WAF
  • 13 - Section objectives
  • 13 - Security-design-that-aligns-with-CAF-and-WAF.pdf
  • 14 - Explore Microsoft Cloud Adoption Framework CAF
  • 15 - Cloud Adoption Framework CAF Secure Methodology
  • 16 - Discuss Azure Landing Zones
  • 17 - Security elements in Azure Landing Zones
  • 18 - What is WellArchitected Framework
  • 19 - Well Architected Framework Security Pillars

  • 4 - Security design that aligns with MCRA and MCSB
  • 20 - Section objectives
  • 20 - Security-design-that-aligns-with-MCRA-and-MCSB.pdf
  • 21 - Overview of Microsoft Cybersecurity Reference ArchitectureMCRA
  • 22 - Overview of Microsoft Cloud Security Benchmark MCSB
  • 23 - Capabilities and controls with MCRA
  • 24 - Capabilities and controls with MCSB
  • 25 - Attack protection with MCRA
  • 26 - Attack protection with MCSB

  • 5 - Resiliency strategy for ransomware and other attacks
  • 27 - Resiliency-strategy-for-ransomware-and-other-attacks.pdf
  • 27 - Section Objectives
  • 28 - Discuss common cyberthreats and attack patterns
  • 29 - Understand attack chain modeling
  • 30 - How to support business resiliency
  • 31 - Design solutions for mitigating ransomware attacks
  • 32 - Design solutions for business continuity and Disaster Recovery
  • 33 - Explore solution for security updates

  • 6 - Design solutions for regulatory compliance
  • 34 - Design-solutions-for-regulatory-compliance.pdf
  • 34 - Section Objectives
  • 35 - Overview of regulatory compliance
  • 36 - Explore important regulatory compliance standards
  • 37 - Translate compliance requirements into security controls
  • 38 - Address compliance requirements using Microsoft Purview
  • 39 - Address privacy requirements with Microsoft Priva
  • 40 - Address security and compliance requirements using Azure Policy
  • 41 - Validate alignment with regulatory standards using Microsoft Defender for cloud

  • 7 - Design solutions for identity and access management
  • 42 - Design-solutions-for-identity-and-access-management.pdf
  • 42 - Section objectives
  • 43 - What is IAM and its function
  • 44 - Active Directory based services in Azure
  • 45 - User Management AD Vs Entra ID
  • 46 - IAM design recommendations
  • 47 - External identities and solutions
  • 48 - Modern authentication and authorization strategies
  • 49 - Microsoft Entra Identity Protection
  • 50 - Align conditional access and Zero Trust
  • 51 - Protecting Human and nonhuman identities
  • 52 - Harden Active Directory Domain Services
  • 53 - Design Cloud Key Management Plan

  • 8 - Design solutions for securing privileged access
  • 54 - Design-solutions-for-securing-privileged-access.pdf
  • 54 - Section objectives
  • 55 - Types of access
  • 56 - Understand enterprise access model
  • 57 - Azure Privilege Identity Management
  • 58 - Privileged Access Management
  • 59 - Tenant management with Azure Lighthouse
  • 60 - Solution for cloud infrastructure entitlement management
  • 61 - Solution for privileged access workstations and bastion services

  • 9 - Design solutions for security operations
  • 62 - Design-solutions-for-security-operations.pdf
  • 62 - Section objectives
  • 63 - Define Security Operations SecOps strategy
  • 64 - Discuss security operations team structure
  • 65 - Security Operation Center Modernization
  • 66 - Security Operation Team composition
  • 67 - Design unified security operation strategy
  • 68 - what is EDR XDR SIEM and SOAR
  • 69 - Design centralized logging solution for security operation
  • 70 - Microsoft Defender XDR architecture
  • 71 - Microsoft Sentinel and defender architecture as a SIEM and SOAR
  • 72 - Explore key security workflows
  • 73 - what is MITRE ATTCK and discuss sentinel integration

  • 10 - Design security solutions for Microsoft 365
  • 74 - Design-security-solutions-for-microsoft-365.pdf
  • 74 - Section objectives
  • 75 - Core Microsoft 365 Services and Apps
  • 76 - Licensing consideration for Microsoft 365 security
  • 77 - Licensing consideration for Office 365 security
  • 78 - Design configuration and Operational Practices for M365
  • 79 - Importance of Microsoft Purview in M365 security
  • 80 - Data security and compliance controls using copilot
  • 81 - Evaluate and assess security posture for M365
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 43962
    حجم: 2957 مگابایت
    مدت زمان: 461 دقیقه
    تاریخ انتشار: ۱۹ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید