وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Pathway to Microsoft Cybersecurity Architect

سرفصل های دوره

SC-100: Microsoft Cybersecurity Architect


1 - Introduction
  • 1 - About course
  • 1 - Introduction.pdf
  • 2 - Cybersecurity Architecture and Architect
  • 3 - Start with Microsoft Security Best Practices
  • 4 - Common security antipatterns

  • 2 - Discuss Perimeter and Zero Trust Security Models
  • 5 - Discuss-perimeter-and-zero-trust-security-models.pdf
  • 5 - Section objectives
  • 6 - What is Perimeter Security Model
  • 7 - What is Zero Trust Security Model
  • 8 - Zero Trust as a security strategy
  • 9 - Zero Trust components
  • 10 - Zero Trust Architecture
  • 11 - Zero Trust RaMP Initiatives
  • 12 - Zero Trust Deployment Objectives

  • 3 - Security Design that aligns with CAF and WAF
  • 13 - Section objectives
  • 13 - Security-design-that-aligns-with-CAF-and-WAF.pdf
  • 14 - Explore Microsoft Cloud Adoption Framework CAF
  • 15 - Cloud Adoption Framework CAF Secure Methodology
  • 16 - Discuss Azure Landing Zones
  • 17 - Security elements in Azure Landing Zones
  • 18 - What is WellArchitected Framework
  • 19 - Well Architected Framework Security Pillars

  • 4 - Security design that aligns with MCRA and MCSB
  • 20 - Section objectives
  • 20 - Security-design-that-aligns-with-MCRA-and-MCSB.pdf
  • 21 - Overview of Microsoft Cybersecurity Reference ArchitectureMCRA
  • 22 - Overview of Microsoft Cloud Security Benchmark MCSB
  • 23 - Capabilities and controls with MCRA
  • 24 - Capabilities and controls with MCSB
  • 25 - Attack protection with MCRA
  • 26 - Attack protection with MCSB

  • 5 - Resiliency strategy for ransomware and other attacks
  • 27 - Resiliency-strategy-for-ransomware-and-other-attacks.pdf
  • 27 - Section Objectives
  • 28 - Discuss common cyberthreats and attack patterns
  • 29 - Understand attack chain modeling
  • 30 - How to support business resiliency
  • 31 - Design solutions for mitigating ransomware attacks
  • 32 - Design solutions for business continuity and Disaster Recovery
  • 33 - Explore solution for security updates

  • 6 - Design solutions for regulatory compliance
  • 34 - Design-solutions-for-regulatory-compliance.pdf
  • 34 - Section Objectives
  • 35 - Overview of regulatory compliance
  • 36 - Explore important regulatory compliance standards
  • 37 - Translate compliance requirements into security controls
  • 38 - Address compliance requirements using Microsoft Purview
  • 39 - Address privacy requirements with Microsoft Priva
  • 40 - Address security and compliance requirements using Azure Policy
  • 41 - Validate alignment with regulatory standards using Microsoft Defender for cloud

  • 7 - Design solutions for identity and access management
  • 42 - Design-solutions-for-identity-and-access-management.pdf
  • 42 - Section objectives
  • 43 - What is IAM and its function
  • 44 - Active Directory based services in Azure
  • 45 - User Management AD Vs Entra ID
  • 46 - IAM design recommendations
  • 47 - External identities and solutions
  • 48 - Modern authentication and authorization strategies
  • 49 - Microsoft Entra Identity Protection
  • 50 - Align conditional access and Zero Trust
  • 51 - Protecting Human and nonhuman identities
  • 52 - Harden Active Directory Domain Services
  • 53 - Design Cloud Key Management Plan

  • 8 - Design solutions for securing privileged access
  • 54 - Design-solutions-for-securing-privileged-access.pdf
  • 54 - Section objectives
  • 55 - Types of access
  • 56 - Understand enterprise access model
  • 57 - Azure Privilege Identity Management
  • 58 - Privileged Access Management
  • 59 - Tenant management with Azure Lighthouse
  • 60 - Solution for cloud infrastructure entitlement management
  • 61 - Solution for privileged access workstations and bastion services

  • 9 - Design solutions for security operations
  • 62 - Design-solutions-for-security-operations.pdf
  • 62 - Section objectives
  • 63 - Define Security Operations SecOps strategy
  • 64 - Discuss security operations team structure
  • 65 - Security Operation Center Modernization
  • 66 - Security Operation Team composition
  • 67 - Design unified security operation strategy
  • 68 - what is EDR XDR SIEM and SOAR
  • 69 - Design centralized logging solution for security operation
  • 70 - Microsoft Defender XDR architecture
  • 71 - Microsoft Sentinel and defender architecture as a SIEM and SOAR
  • 72 - Explore key security workflows
  • 73 - what is MITRE ATTCK and discuss sentinel integration

  • 10 - Design security solutions for Microsoft 365
  • 74 - Design-security-solutions-for-microsoft-365.pdf
  • 74 - Section objectives
  • 75 - Core Microsoft 365 Services and Apps
  • 76 - Licensing consideration for Microsoft 365 security
  • 77 - Licensing consideration for Office 365 security
  • 78 - Design configuration and Operational Practices for M365
  • 79 - Importance of Microsoft Purview in M365 security
  • 80 - Data security and compliance controls using copilot
  • 81 - Evaluate and assess security posture for M365
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 43962
    حجم: 2957 مگابایت
    مدت زمان: 461 دقیقه
    تاریخ انتشار: ۱۹ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید