وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

SC-100: Microsoft Cybersecurity Architect

سرفصل های دوره

SC-100: Microsoft Cybersecurity Architect Preparation Course


1. Design a Zero Trust strategy and architecture
  • 1.1 Diagrams.pdf
  • 1.2 PPT's.pdf
  • 1. Slides and Diagrams download.html
  • 2. How are we approaching this course
  • 3. About this section
  • 4. Zero Trust
  • 5. Security - Integration endpoints
  • 6. Cloud Adoption Framework
  • 7. Security Strategy
  • 8. Security Strategy - Hybrid environments
  • 9. Security logging - tools
  • 10. Let's start using the tools
  • 11. Security logging - Our next steps
  • 12. Security logging - Building a simple infrastructure
  • 13. About Microsoft Sentinel
  • 14. Lab - Microsoft Sentinel - Setup
  • 15. Lab - Microsoft Sentinel - Data connectors
  • 16. Lab - Microsoft Sentinel - Azure Activity
  • 17. Lab - Microsoft Sentinel - Generating Incidents
  • 18. Lab - Microsoft Sentinel - Generating Incidents - Resources.html
  • 19. Incidents
  • 20. Lab - Microsoft Sentinel - Virtual Machines - Incidents
  • 21. Lab - Microsoft Sentinel - Virtual Machines - Incidents - Resources.html
  • 22. Microsoft Sentinel - Workbooks
  • 23. Microsoft Sentinel - Automation
  • 24.1 Microsoft Sentinel - Threat Intelligence.html
  • 24. Microsoft Sentinel - Note on threat protection
  • 25.1 NSG Flow Logs.html
  • 25. NSG Flow logs
  • 26. Our next focus - Azure Active Directory
  • 27.1 RBAC in-built roles.html
  • 27. Review on Role-based access control
  • 28. Identity Governance - Entitlement Management
  • 29. Review of Application Objects
  • 30. Example on using Application Objects
  • 31. Installing the Postman tool.html
  • 32.1 AuthApp.zip
  • 32. Another example on Application Objects
  • 33. Installing Visual Studio 2022.html
  • 34. Enterprise Applications
  • 35. Example on Enterprise Applications
  • 36. Review - Azure AD Identity Protection
  • 37. Review - Conditional Access Policies
  • 38. Hybrid Identities - Azure AD Connect
  • 39. Review - Azure AD Privileged Identity Management
  • 40. Azure B2B
  • 41. Azure B2C
  • 42. Which service to choose
  • 43. Azure AD Logs
  • 44. Quick note before moving along
  • 45. Section Quiz.html

  • 2. Evaluate Governance Risk Compliance
  • 1. Compliance of your resources
  • 2. Review of Azure Policy service
  • 3. Introduction to Microsoft Defender for Cloud
  • 4. Microsoft Defender for Cloud - Initial Look
  • 5. Azure Security Benchmark
  • 6. Microsoft Defender for Cloud - Servers
  • 7. Microsoft Defender for Cloud - Secure Management Ports
  • 8. Microsoft Defender for Cloud - Workload Protection features
  • 9. Microsoft Defender for Cloud - Workflow Automation
  • 10. Microsoft Defender for Cloud - Vulnerability assessment
  • 11. Management Ports update
  • 12. Microsoft Defender for Cloud - Regulatory compliance
  • 13. Microsoft Defender for Cloud - Remediations.html
  • 14. Microsoft Defender for Cloud - AWS resources
  • 15.1 Azure and AWS Security.html
  • 15. Quick note on other AWS aspects
  • 16. Azure Landing zones
  • 17. Azure Blueprints
  • 18. Example on using Azure Blueprints
  • 19. Example on using Azure Blueprints - Resources.html
  • 20. Section Quiz.html

  • 3. Design security for infrastructure
  • 1. What are we going to cover
  • 2. Quick overview of the services
  • 3. Azure Storage Accounts - Authorization
  • 4. Azure Storage Accounts Authorization - Access keys
  • 5. Azure Storage Account Authorization - Shared Access Signature
  • 6. Azure Storage Accounts - Azure AD Authentication
  • 7. Azure Storage Accounts - Firewalls
  • 8. Azure Storage Account - Service Endpoint
  • 9. Azure Storage Accounts - Deny use of Access keys
  • 10. Azure Storage accounts - Azure Policy use case
  • 11. Creating an Azure SQL database
  • 12. Azure SQL Database - Auditing
  • 13. Azure SQL Database - Log output
  • 14. Azure Web Apps - Enabling Diagnostics
  • 15. Azure Web Apps - Diagnostics results
  • 16. Azure Web Apps - Virtual Network Integration
  • 17. Using the Azure Bastion Service
  • 18. Azure Bastion - Creating the environment
  • 19. Lab - Using the Azure Bastion Service
  • 20. Lab - Creating an Azure Cosmos DB Account
  • 21. Lab - Creating an Azure Cosmos DB Account - Resources.html
  • 22. Example of an application connecting to Azure Cosmos DB
  • 23.1 sqlapp.zip
  • 23. Example of an application connecting to Azure Cosmos DB - Resources.html
  • 24. Storing Azure Cosmos DB keys
  • 25.1 keyvault.zip
  • 25. Storing Azure Cosmos DB keys - Resources.html
  • 26. Azure Cosmos DB logs.html
  • 27. Microsoft Defender for Containers
  • 28. Containers - What are we going to implement
  • 29. Building a Docker Image
  • 30.1 commands.zip
  • 30.2 dockerfile.zip
  • 30. Building a Docker Image - Resources.html
  • 31. Deploying the container
  • 32.1 deployment.zip
  • 32.2 service.zip
  • 32. Deploying the container - Resources.html
  • 33. Quick Note on protecting domain controllers
  • 34. Network Security Groups - Quick Review
  • 35. Introduction to Microsoft Defender
  • 36. Microsoft 365 Admin Center
  • 37. Quick look at Microsoft Defender for Endpoint
  • 38. Section Quiz.html

  • 4. Design a strategy for data and applications
  • 1. What are we going to cover
  • 2. Protecting your data
  • 3. Lab - Azure SQL database - Dynamic data masking
  • 4. Lab - Azure SQL database - Dynamic data masking - Resources.html
  • 5. Azure SQL database - Classification of data
  • 6. Encryption of data
  • 7. Azure Storage Service Encryption
  • 8. Azure SQL Database Encryption
  • 9. Azure SQL Database - Always Encrypted feature
  • 10. Managed Disks Encryption
  • 11. Note on Azure Backups
  • 12. Protecting your workloads
  • 13. Note on your DevOps pipeline
  • 14.1 Developing secure applications.html
  • 14. Quick Note on securing applications
  • 15. Review of the Azure Firewall service
  • 16. Quick Note on Azure Web App - Azure Firewall
  • 17.1 Restricting access to Front Door.html
  • 17. Simple implementation of Azure Front Door
  • 18. Azure Front Door - Web Application Firewall
  • 19. Azure Front Door Log details.html
  • 20. Quick Note - Microsoft 365 Defender - Web Content Filtering

  • 5. Practice Section
  • 1. Practice Test 1.html
  • 2. Practice Test 2.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 422
    حجم: 4323 مگابایت
    مدت زمان: 579 دقیقه
    تاریخ انتشار: ۲۲ دی ۱۴۰۱
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید