Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft Cybersecurity Architect - SC-100 Exam Preparation
Training Overview
Description of Training
Introduction to SC-100 Microsoft Cybersecurity Architect
Become a Microsoft Cyber security Architect (0:59)
Instructor Introduction - Know Your Trainer (4:37)
Module 1 - Design a Zero Trust Strategy and Architecture
Introduction
Module 1 - Chapter 1 - The Role of a Security Architect
The Role of a Security Architect (1:31)
Zero Trust Overview (1:44)
Guiding Principles of Zero Trust (2:54)
Pillars of Zero Trust (6:39)
MCRA - Identity (3:52)
MCRA - SOC Tools (3:06)
MCRA - Endpoint Security (5:08)
MCRA - Hybrid Computing (7:21)
MCRA - Information Protection (4:06)
MCRA - People Security (6:58)
MCRA - IoT and IT Security - 2 (7:39)
CAF - Introduction (2:21)
CAF - Strategy (5:57)
CAF - Planning (4:59)
CAF - Readyness - Azure Setup Guide (11:11)
CAF - Readyness - Azure Landing Zone (9:17)
CAF Landing Zone Deployment - Lab Step By Step 1 (5:31)
CAF Landing Zone Deployment - Lab Step By Step 2 (26:55)
CAF - Adopt Phase (2:17)
CAF - Governance (13:19)
IT Transformations - Gap Analysis (3:47)
Security Transformations (7:52)
Design Security for Resiliency Strategy (4:05)
The Reliability Pillar (4:06)
Sc 100 Case Study Overview (2:26)
SC 100 Case Study (12:05)
Reviews (0:53)
Module 1 - Chapter 2 - Design a Security Options Strategy
Design a Security Options Strategy (1:26)
Security Operations Strategy (3:03)
Security Operations Frameworks, Processes And Procedures (3:32)
SecOps and the Leadership (3:58)
People and Processes (4:42)
Metrics and Its importance in SOC. (3:32)
Recommendations for Designing a Logging and Auditing Security Strategy (6:26)
Cyber Kill Chain - An Overview (3:49)
Focus Areas for SOC in Hybrid Computing (1:52)
Unified Operations in Hybrid Clouds (5:06)
Tiers in SecOps (3:48)
Azure Tools for SecOps (6:10)
SecOps - Best Practices for SIEM - SOAR (9:22)
SecOPs- Best Practices for Network and Azure (4:04)
Incident Response - Best Practices (2:27)
Recovery - Best Practices (3:03)
Workflow Automation (3:03)
Workflow Automation - Lab (4:29)
Workflow Automation - Logic Apps Integration - Lab (7:22)
Incident Mangement Process (5:52)
Incident Management Process - Preparation (2:46)
Incident Management Process - Detection and Analysis (1:37)
Incident Management Process - Containmentm Eradication and Recovery (3:32)
Incident Management Process - Post - Incident Activity (2:27)
Threat Intelligence and SOC (3:49)
Threat Intelligence in Sentinel (1:52)
Threat Intelligence in Defender for Endpoint (5:08)
Threat Intelligence for IOT (2:13)
Threat Intelligence in Defender for Cloud (2:07)
Chapter 2 Case Study (8:47)
Module 1 - Chapter 3 - Identity Security Strategy
Identity Security Strategy - Chapter Introduction (1:10)
Identity Security Strategy Overview (2:29)
Evolution of Identity Technology (2:51)
Identity Challenges (1:56)
Microsoft Identity Store - Overview (5:31)
Identity Governance - Overview (4:21)
Identity is the New Control Plane (2:45)
Zero Trust Concepts and Principles (2:44)
Zero Trust Components (4:27)
Planning a Zero Trust Strategy (3:28)
Zero Trust Model - Introduction (1:07)
Enabling Zero Trust Model - 2 (10:36)
Enabling Zero Trust Model - 3 (4:01)
Zero Trust Security Strategy for Identities (7:09)
Conditional Access Supports Zero Trust Architecture (3:23)
Conditional Access Personas (6:01)
Secure Authentication Methods - 1 (1:36)
Secure Authentication Methods - 2 (1:35)
Password Hash Sync - PHS (8:39)
Pass Throgh Authentication - PTA (9:53)
Azure AD Roles - Best Practices (6:18)
Design a Security Strategy for Privileged Role Access (2:21)
Develop a Roadmap (2:09)
Develop a Roadmap - Explained (5:33)
Design a Security Strategy for Privileged Activities (4:35)
Rapid Modernization Plan - RAMP (4:21)
Execute Critical Strategy Initiatives For Privileged Activity Management (2:10)
Case Study 01 (8:05)
Case Study 02 (5:09)
Module 2 - Evaluate Governance Risk Complience (GRC) Strategies
Introduction
Module 2 - Chapter 1 - Evaluate Regulatory Compliance
Chapter Intro (1:18)
Interpret Compliance Requirements (2:54)
Compliance Offerings (6:11)
Evaluate Infra Compliance Using Defender gor Cloud (3:45)
Design for Data Residency Requirements (5:02)
Encryption Support for Various Services (6:25)
Case Study (7:29)
Module 2 - Chapter 2 - Evaluate Security Posture
Evaluate Security postures - Chapter Introduction (1:00)
What is Security Posture (3:04)
Azure Security Benchmark (2:21)
Miter Attack and Microsoft Defender for Cloud (3:44)
Security Hygiene for Cloud Workloads (5:57)
Security and Policy Options in Azure Landing zone (2:37)
Case Study (11:35)
Module 3 - Design Security for Infrastructure
Introduction
Module 3 - Chapter 1
Module 3 Introduction (1:14)
Plan And Implement a Security Strategy Across Teams (7:22)
Security Role and Responsibilities (4:59)
Building the Cloud Security Strategy Document - Considerations (5:41)
Security Strategy Document - Deliverables (2:41)
Security Strategy Document - Best Practices (4:28)
Continuous Evolution of Security Strategy - Deliverables (3:13)
Best Practices for Security Planning (3:55)
Establishing Essential Security Practices (2:29)
Security Management Strategy (1:53)
Continuous Assesment (3:08)
Chapter Case Study (4:07)
Module 3 - Chapter 2
Chapter Introduction (0:54)
What Is a Security Baseline (2:02)
Security Baseline Principles (4:31)
Security Requirement for Servers (3:11)
Securing Member Serversd (5:43)
Azure Security Benchmarks (6:17)
Securing Mobile Devices (2:41)
Application Control (2:11)
Device Settings Using Intune (3:07)
Other Requirements for Clients and Endpoints (1:46)
Securing Domain Controllers (5:54)
Securing DCs From Attacks (4:14)
Key Vault - Fundamentals (3:34)
Managing Access to Secrets (3:56)
Securing Remote Access (3:50)
Security Ops - Best Practices (2:58)
Importance Of Interactions With Business Leaders (3:39)
Hiring Right People With Right Mindset (2:18)
Metrics Linked to Soc Team (3:13)
Forensic Procedures and Endpoint Forensics (4:32)
Chapter 2 Case Study (4:34)
Module 3 - Chapter 3
Chapter 3 - Intro (0:48)
Security Baselines for PaaS Services (6:49)
Security Baselines for IaaS Services (5:28)
Security Baselines for SaaS Services (4:43)
Security Requirements for IOT Based Workloads (6:31)
IOT Devices - Security Posture and Threat Management (4:09)
Specify Security Requirements for Data Work Loads (4:53)
Security Posture Mangement for Data Related Workloads (6:00)
Security Requirements for Web Based Workloads (7:30)
Security Posture Management for App Services (2:33)
Security Requirements for Azure Storage Accounts (9:02)
Azure Defender for Storage (2:22)
Security Recommendations for Containers (8:26)
Defender for Containers (2:49)
Chapter 3 Case Study (3:33)
Module 4 - Design a Strategy for Data and Applications
Introduction
Module 4 - Chapter 1 - Security Requirments for Applications
Threat Modelling - Introduction (8:24)
Threat Modelling - Banking App (10:50)
Understanding the Application Threat Modelling (2:39)
STRIDE Methodology (3:58)
Mitigating the Idenified Threats (2:04)
Shift from Waterfall to DevOps (1:54)
DevOps and It's Phases (4:20)
DevSecOps and its Importance (3:00)
Onboarding Applications to Azure AD (6:31)
Module 4 - Chapter 1 Case study (5:11)
Module 4 - Chapter 2 - Designing a Strategy for Securing the Data
Chapter 2 Introduction (1:26)
Mitigating Threats to Data (4:26)
Ransomware Protection (1:52)
Ransomware Protection - Phases (6:27)
Strategy to Identify and Protect Sensitive Data (4:58)
Know Your Data With Microsoft Purview - 1 (5:42)
Govern Your Data With Defender For Cloud Apps - 2 (6:34)
Govern Your Data - Retention (5:05)
Govern Your Data - Records Management (7:33)
Chapter 2 Case Study (5:43)
Audio Version of the Training
Audio Download
Chapter Intro
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock