SC-100: Microsoft Cybersecurity Architect Certification Video Training Course
The complete solution to prepare for for your exam with SC-100: Microsoft Cybersecurity Architect certification video training course. The SC-100: Microsoft Cybersecurity Architect certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including Microsoft SC-100 exam dumps, study guide & practice test questions and answers.
SC-100: Microsoft Cybersecurity Architect Certification Video Training Course Exam Curriculum
SC-100 Microsoft Cybersecurity Architect-Introduction
-
1. SC - 100 Microsoft Cybersecurity Architect - Course trailer0:42
Design a Zero Trust strategy and architecture
-
1. Chapter 1: The role of a security Architect1:29
-
2. Zero Trust Overview1:39
-
3. Guiding principles of zero trust2:53
-
4. Pillars of Zero Trust6:39
-
5. MCRA - Identity3:50
-
6. MCRA - SOC Tools3:05
-
7. MCRA - Endpoint Security5:08
-
8. MCRA - Hybrid Computing7:21
-
9. MCRA - Information Protection4:06
-
10. MCRA - People Security6:54
-
11. MCRA - IoT and IT Security - II7:39
-
12. CAF - Introduction2:20
-
13. CAF - strategy5:57
-
14. CAF - Planning4:58
-
15. CAF - Readyness - Azure setup guide11:01
-
16. CAF - Readyness - Azure Landing Zone9:17
-
17. CAF Landing Zone Deployment - Lab Step By Step-I5:29
-
18. CAF Landing Zone Deployment - Lab Step By Step-II26:54
-
19. CAF - Adopt Phase2:17
-
20. CAF - Governance13:16
-
21. IT Transformations - Gap analysis3:43
-
22. Security transformations7:51
-
23. Design Security for resiliency strategy4:05
-
24. The reliability Pillar4:06
-
25. SC 100 Case study overview2:25
-
26. SC 100 Case Study12:04
-
27. Chapter 2: Design a security options strategy - overview1:26
-
28. Security operations strategy overview3:03
-
29. Security operations frameworks, processes and procedures3:32
-
30. SecOps and the Leadership3:58
-
31. People and Processes4:42
-
32. Metrics and Its importance in SOC3:31
-
33. Recommendations for Designing a logging and auditing security strategy6:24
-
34. Cyber Kill Chain - An overview3:49
-
35. Focus areas for SOC in hybrid computing1:51
-
36. Unified operations in Hybrid clouds5:06
-
37. Tiers in SecOps3:47
-
38. Azure Tools for SecOps6:10
-
39. SecOps - Best practices for SIEM _ SOAR9:22
-
40. SecOPs- Best Practices for Network and Azure AD Monitoring4:04
-
41. Incident Response - Best Practices2:27
-
42. Recovery - Best Practices3:03
-
43. Workflow Automation3:03
-
44. Workflow Automation - Lab4:28
-
45. Workflow Automation - Logic apps integration - Lab7:22
-
46. Incident Management process- Overview5:51
-
47. Incident Management process - Preparation2:46
-
48. Incident Management Process - Detection and Analysis1:37
-
49. Incident Management Process - Containment Eradication and recovery3:31
-
50. Incident Management Process - Post - Incident Activity2:27
-
51. Threat Intelligence and SOC3:48
-
52. Threat intelligence in Sentinel1:52
-
53. Threat intelligence in Defender for Endpoint5:08
-
54. Threat Intelligence for IOT2:13
-
55. Threat Intelligence in Defender for Cloud2:07
-
56. Chapter2 Case Study8:47
-
57. Chapter 3: Identity Security Strategy -Introduction01:10
-
58. Identity Security Strategy Overview2:28
-
59. Evolution of Identity Technology2:51
-
60. Identity Challenges1:56
-
61. Microsoft Identity Store - Overview5:30
-
62. Identity Governance - Overview4:20
-
63. Identity is the new control plane2:45
-
64. Zero Trust Concepts and Principles2:43
-
65. Zero Trust Components4:26
-
66. Planning a Zero Trust Strategy3:29
-
67. Zero Trust Model - Introduction1:07
-
68. Enabling Zero Trust Model-II10:36
-
69. Enabling Zero Trust Model-III4:01
-
70. Zero trust Security strategy for Identities7:08
-
71. Conditional Access support for Zero Trust Architecture3:22
-
72. Conditional Access Personas6:01
-
73. Secure Authentication Methods1:35
-
74. Secure Authentication Methods - II1:35
-
75. Password hash Sync - PHS8:38
-
76. Pass Through Authentication - PTA9:51
-
77. Azure AD Roles - Best Practices6:17
-
78. Design a Security Strategy for Privileged Role Access2:20
-
79. Develop a Roadmap2:09
-
80. Develop a Roadmap - Explained5:33
-
81. Design a security strategy for privileged activities4:34
-
82. Rapid Modernization Plan - RAMP4:21
-
83. Execute Critical strategic initiatives for Privileged Activity Management2:10
-
84. Chapter Case Study 018:04
-
85. Chapter Case Study 025:08
Evaluate Governance Risk Compliance (GRC) strategies
-
1. Evaluate Regulatory Compliance - Introduction1:17
-
2. Interpret Compliance Requirements2:53
-
3. Compliance Offerings6:10
-
4. Evaluate infra compliance using defender for cloud3:44
-
5. Design for data residency requirements5:01
-
6. Encryption Support for various services6:25
-
7. Chapter 1: Case Study7:29
-
8. Chapter 2: Evaluate Security postures - Chapter Introduction1:00
-
9. what is security posture3:04
-
10. Azure Security Benchmark2:21
-
11. Miter attack and Microsoft Defender for cloud3:44
-
12. Security Hygiene for Cloud workloads5:57
-
13. Security and policy options in Azure Landing zone2:37
-
14. Chapter 2: Case Study11:32
Design Security for Infrastructure
-
1. Chapter 1 : Introduction1:13
-
2. Plan and Implement a security strategy across teams7:19
-
3. Security Role and Responsibilities4:59
-
4. Building the cloud security strategy document - considerations5:41
-
5. Security strategy document - deliverables2:41
-
6. Security Strategy document - Best Practices4:28
-
7. Continuous evolution of security strategy - Deliverables3:12
-
8. Best Practices for Security Planning3:54
-
9. Establishing Essential security practices2:28
-
10. Security Management strategy1:53
-
11. Continuous Assessment3:08
-
12. Chapter 1 case study4:07
-
13. Chapter 2 : Introduction0:54
-
14. What is a Security Baseline2:02
-
15. Security Baseline Principles4:31
-
16. Security Requirement for servers3:11
-
17. Securing Member Servers5:43
-
18. Azure Security Benchmarks6:17
-
19. Securing Mobile devices2:40
-
20. Application Control2:11
-
21. Device Settings using Intune3:07
-
22. Other requirements for clients and endpoints1:46
-
23. Securing Domain Controllers5:55
-
24. Securing DCs from Attacks4:14
-
25. Key Vault - Fundamentals3:19
-
26. Managing access to secrets3:56
-
27. Securing remote access3:50
-
28. Security Ops - Best Practices2:58
-
29. Importance of Interactions with Business leaders3:39
-
30. Hiring right people with right mindset2:18
-
31. Metrics linked to SOC team3:13
-
32. Forensic Procedures and Endpoint Forensics4:32
-
33. Chapter 2 Case Study4:34
-
34. Chapter 3 Introduction0:48
-
35. Security baselines for PaaS services6:48
-
36. Security baselines for IaaS services5:27
-
37. Security Baselines for SaaS Services4:42
-
38. Security requirements for IOT based workloads6:31
-
39. IOT Devices - Security Posture and Threat Management4:08
-
40. Specify security requirements for data work loads4:52
-
41. Security posture management for data related workloads5:59
-
42. Security requirements for Web Based Workloads7:29
-
43. Security posture management for App services2:33
-
44. Security requirements for Azure Storage Accounts9:01
-
45. Azure Defender for Storage2:21
-
46. Security recommendations for Containers8:26
-
47. Defender for Containers2:49
-
48. Chapter 3 Case Study3:32
Design a Strategy for Data and Applications
-
1. Threat Modelling - Introduction8:24
-
2. Threat Modelling - Use Case10:49
-
3. Understanding the application threat modelling2:38
-
4. STRIDE Methodology3:58
-
5. Mitigating the Identified threats2:04
-
6. Shift from Waterfall to DevOps1:54
-
7. DevOps & Its Phases4:20
-
8. DevSecOps and its importance3:00
-
9. Onboarding applications to Azure AD6:31
-
10. Chapter 1 Case study5:11
-
11. Chapter 2 Introduction1:26
-
12. Mitigating threats to data4:25
-
13. Ransomware protection1:52
-
14. Ransomware protection - Phases6:26
-
15. Strategy to identify and protect sensitive Data4:58
-
16. Know your data with Microsoft Purview -I5:42
-
17. Govern your data with Defender for cloud apps - II6:33
-
18. Govern your data - Data Retention5:05
-
19. Govern your data - Records Management7:33
-
20. Chapter 2 case study5:43
About SC-100: Microsoft Cybersecurity Architect Certification Video Training Course
SC-100: Microsoft Cybersecurity Architect certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's SC-100: Microsoft Cybersecurity Architect video training course for passing certification exams is the only solution which you need.
Pass Microsoft SC-100 Exam in First Attempt Guaranteed!
Get 100% Latest Exam Questions, Accurate & Verified Answers As Seen in the Actual Exam!
30 Days Free Updates, Instant Download!
SC-100 Premium Bundle
- Premium File 197 Questions & Answers. Last update: Sep 16, 2024
- Training Course 168 Video Lectures
- Study Guide 436 Pages
Free SC-100 Exam Questions & Microsoft SC-100 Dumps | ||
---|---|---|
Microsoft.selftesttraining.sc-100.v2024-07-21.by.cooper.7q.ete |
Views: 0
Downloads: 333
|
Size: 182.33 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register