Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Microsoft Cybersecurity Architect - SC-100 Exam Prep
Microsoft Cybersecurity Architect - SC-100 Exam Prep

Microsoft Cybersecurity Architect - SC-100 Exam Prep: Exactly What You Need to Become Microsoft Certified Cybersecurity Architect - Clear and Concise

Arrow left icon
Profile Icon Anand Rao Nednur
Arrow right icon
Can$12.99 Can$139.99
Video Apr 2023 13hrs 2mins 1st Edition
Video
Can$12.99 Can$139.99
Subscription
Free Trial
Arrow left icon
Profile Icon Anand Rao Nednur
Arrow right icon
Can$12.99 Can$139.99
Video Apr 2023 13hrs 2mins 1st Edition
Video
Can$12.99 Can$139.99
Subscription
Free Trial
Video
Can$12.99 Can$139.99
Subscription
Free Trial

What do you get with a video?

Product feature icon Download this video in MP4 format
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Key benefits

  • Designed to help you prepare for the SC-100 exam with targeted content and exam-specific guidance
  • Utilizes real-world scenarios, case studies, and interactive exercises for practical skill development
  • Covers best practices and strategies for building cybersecurity solutions using Microsoft products

Description

In this comprehensive course, you will learn how to design and implement a robust strategy for securing data and applications in Azure, Microsoft’s cloud computing platform. The course begins with an in-depth exploration of threat modeling, covering the basics of threat modeling, understanding application threat modeling, and applying the STRIDE methodology to identify and mitigate threats. You will also learn best practices for shifting from a traditional waterfall development approach to a DevOps approach and understand the phases of DevOps and the importance of DevSecOps in ensuring security throughout the development process. The course then delves into strategies for mitigating threats to data, including ransomware protection, identifying and protecting sensitive data, and governing data using Microsoft Purview and Defender for cloud apps. You will learn how to implement encryption, access controls, data classification, and data retention policies to safeguard data from unauthorized access and prevent data breaches. Real-world case studies will be used to illustrate best practices and provide practical insights into securing data and applications in Azure. By the end of this course, you will be well-equipped with the knowledge and skills needed to safeguard your organization’s data and applications in Azure effectively.

Who is this book for?

This course is designed for individuals who are preparing for the SC-100 Microsoft Cybersecurity Architect exam and seeking to expand their knowledge of building and designing cybersecurity solutions using Microsoft products. Whether you are a cybersecurity professional looking to enhance your skills, an IT practitioner interested in Microsoft products, or an aspiring cybersecurity architect, this course provides comprehensive insights and practical guidance to help you achieve your goals.

What you will learn

  • Understand the Microsoft cloud security ecosystem and its components
  • Manage risks using Microsoft security tools and technologies
  • Explore the relationship between processes, technologies, and business
  • Design a comprehensive security strategy for IaaS, PaaS, and SaaS
  • Create a robust Zero Trust strategy for enhanced security
  • Evaluate GRC strategies for effective cybersecurity management

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Apr 25, 2023
Length: 13hrs 2mins
Edition : 1st
Language : English
ISBN-13 : 9781805128816
Category :
Concepts :

What do you get with a video?

Product feature icon Download this video in MP4 format
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Apr 25, 2023
Length: 13hrs 2mins
Edition : 1st
Language : English
ISBN-13 : 9781805128816
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just Can$6 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just Can$6 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total Can$ 127.97 254.97 127.00 saved
Microsoft Cybersecurity Architect - SC-100 Exam Prep
Can$12.99 Can$139.99
Mastering Microsoft 365 Defender
Can$63.99
Azure Security Cookbook
Can$50.99
Total Can$ 127.97 254.97 127.00 saved Stars icon
Banner background image

Table of Contents

5 Chapters
SC - 100 Microsoft Cybersecurity Architect - Introduction Chevron down icon Chevron up icon
Design a Zero Trust Strategy and Architecture Chevron down icon Chevron up icon
Chapter 1 - The Role of a Security Architect
Zero Trust Overview
Guiding Principles of Zero Trust
Pillars of Zero Trust
MCRA - Identity
MCRA - SOC Tools
MCRA - Endpoint Security
MCRA - Hybrid Computing
MCRA - Information Protection
MCRA - People Security
MCRA - IoT and OT
CAF - Introduction
CAF - Strategy
CAF - Planning
CAF - Readiness - Azure Setup Guide
CAF - Readiness - Azure Landing Zone
CAF Landing Zone Deployment - Lab Step-by-Step-I
CAF Landing Zone Deployment - Lab Step-by-Step-II
CAF - Adopt Phase
CAF - Governance
IT Transformations - Gap Analysis
Security Transformations
Design Security for Resiliency Strategy
The Reliability Pillar
SC 100 Case Study Overview
SC 100 Case Study
Chapter 2: Design a Security Options Strategy - Overview
Security Operations Strategy Overview
Security Operations Frameworks, Processes, and Procedures
SecOps and the Leadership
People and Processes
Metrics and Its Importance in SOC
Recommendations for Designing a Logging and Auditing Security Strategy
Cyber Kill Chain - An Overview
Focus Areas for SOC in Hybrid Computing
Unified Operations in Hybrid Clouds
Tiers in SecOps
Azure Tools for SecOps
SecOps - Best Practices for SIEM and SOAR
SecOps - Best Practices for Network and Azure AD Monitoring
Incident Response - Best Practices
Recovery - Best Practices
Workflow Automation
Workflow Automation - Lab
Workflow Automation - Logic Apps Integration - Lab
Incident Management Process - Overview
Incident Management Process - Preparation
Incident Management Process - Detection and Analysis
Incident Management Process - Containment, Eradication, and Recovery
Incident Management Process - Post-Incident Activity
Threat Intelligence and SOC
Threat Intelligence in Sentinel
Threat Intelligence in Defender for Endpoint
Threat Intelligence for IoT
Threat Intelligence in Defender for Cloud
Chapter 2 Case Study
Chapter 3: Identity Security Strategy - Introduction
Identity Security Strategy Overview
Evolution of Identity Technology
Identity Challenges
Microsoft Identity Store - Overview
Identity Governance - Overview
Identity Is the New Control Plane
Zero Trust Concepts and Principles
Zero Trust Components
Planning a Zero Trust Strategy
Zero Trust Model – Introduction
Enabling Zero Trust Model - I
Enabling Zero Trust Model-II
Zero Trust Security Strategy for Identities
Conditional Access Support for Zero Trust Architecture
Conditional Access Personas
Secure Authentication Methods
Secure Authentication Methods - II
Password Hash Sync - PHS
Pass Through Authentication - PTA
Azure AD Roles - Best Practices
Design a Security Strategy for Privileged Role Access
Develop a Roadmap
Develop a Roadmap - Explained
Design a Security Strategy for Privileged Activities
Rapid Modernization Plan - RAMP
Execute Critical Strategic Initiatives for Privileged Activity Management
Chapter Case Study 01
Chapter Case Study 02
Evaluate Governance Risk Compliance (GRC) Strategies Chevron down icon Chevron up icon
Advanced Security Best Practices in Azure Infrastructure Chevron down icon Chevron up icon
Chapter 1: Introduction
Plan and Implement a Security Strategy across Teams
Security Roles and Responsibilities
Building the Cloud Security Strategy Document - Considerations
Security Strategy Document - Deliverables
Security Strategy Document - Best Practices
Continuous Evolution of Security Strategy - Deliverables
Best Practices for Security Planning
Establishing Essential Security Practices
Security Management Strategy
Continuous Assessment
Chapter 1: Case Study
Chapter 2: Introduction
What Is a Security Baseline?
Security Baseline Principles
Security Requirements for Servers
Securing Member Servers
Azure Security Benchmarks
Securing Mobile Devices
Application Control
Device Settings Using Intune
Other Requirements for Clients and Endpoints
Securing Domain Controllers
Securing DCs from Attacks
Key Vault - Fundamentals
Managing Access to Secrets
Securing Remote Access
Security Ops - Best Practices
Importance of Interactions with Business Leaders
Hiring the Right People with the Right Mindset
Metrics Linked to SOC Team
Forensic Procedures and Endpoint Forensics
Chapter 2 Case Study
Chapter 3 Introduction
Security Baselines for PaaS Services
Security Baselines for IaaS Services
Security Baselines for SaaS Services
Security Requirements for IoT-Based Workloads
IoT Devices - Security Posture and Threat Management
Specify Security Requirements for Data Workloads
Security Posture Management for Data-Related Workloads
Security Requirements for Web-Based Workloads
Security Posture Management for App Services
Security Requirements for Azure Storage Accounts
Azure Defender for Storage
Security Recommendations for Containers
Defender for Containers
Chapter 3 Case Study
Designing a Strategy for Data and Applications Chevron down icon Chevron up icon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How can I download a video package for offline viewing? Chevron down icon Chevron up icon
  1. Login to your account at Packtpub.com.
  2. Click on "My Account" and then click on the "My Videos" tab to access your videos.
  3. Click on the "Download Now" link to start your video download.
How can I extract my video file? Chevron down icon Chevron up icon

All modern operating systems ship with ZIP file extraction built in. If you'd prefer to use a dedicated compression application, we've tested WinRAR / 7-Zip for Windows, Zipeg / iZip / UnRarX for Mac and 7-Zip / PeaZip for Linux. These applications support all extension files.

How can I get help and support around my video package? Chevron down icon Chevron up icon

If your video course doesn't give you what you were expecting, either because of functionality problems or because the content isn't up to scratch, please mail customercare@packt.com with details of the problem. In addition, so that we can best provide the support you need, please include the following information for our support team.

  1. Video
  2. Format watched (HTML, MP4, streaming)
  3. Chapter or section that issue relates to (if relevant)
  4. System being played on
  5. Browser used (if relevant)
  6. Details of support
Why can’t I download my video package? Chevron down icon Chevron up icon

In the even that you are having issues downloading your video package then please follow these instructions:

  1. Disable all your browser plugins and extensions: Some security and download manager extensions can cause issues during the download.
  2. Download the video course using a different browser: We've tested downloads operate correctly in current versions of Chrome, Firefox, Internet Explorer, and Safari.