Home Search Profile

Master SC-100: Microsoft Cybersecurity Architect Expert 2024

Focused View

7:40:24

  • 1 - About course.mp4
    10:12
  • 1 - Introduction.pdf
  • 2 - Cybersecurity Architecture and Architect.mp4
    03:34
  • 3 - Start with Microsoft Security Best Practices.mp4
    05:52
  • 4 - Common security antipatterns.mp4
    10:15
  • 5 - Discuss-perimeter-and-zero-trust-security-models.pdf
  • 5 - Section objectives.mp4
    01:40
  • 6 - What is Perimeter Security Model.mp4
    04:58
  • 7 - What is Zero Trust Security Model.mp4
    03:18
  • 8 - Zero Trust as a security strategy.mp4
    02:03
  • 9 - Zero Trust components.mp4
    03:28
  • 10 - Zero Trust Architecture.mp4
    02:41
  • 11 - Zero Trust RaMP Initiatives.mp4
    07:45
  • 12 - Zero Trust Deployment Objectives.mp4
    24:46
  • 13 - Section objectives.mp4
    00:36
  • 13 - Security-design-that-aligns-with-CAF-and-WAF.pdf
  • 14 - Explore Microsoft Cloud Adoption Framework CAF.mp4
    10:23
  • 15 - Cloud Adoption Framework CAF Secure Methodology.mp4
    07:07
  • 16 - Discuss Azure Landing Zones.mp4
    05:26
  • 17 - Security elements in Azure Landing Zones.mp4
    15:13
  • 18 - What is WellArchitected Framework.mp4
    10:45
  • 19 - Well Architected Framework Security Pillars.mp4
    05:16
  • 20 - Section objectives.mp4
    00:55
  • 20 - Security-design-that-aligns-with-MCRA-and-MCSB.pdf
  • 21 - Overview of Microsoft Cybersecurity Reference ArchitectureMCRA.mp4
    07:21
  • 22 - Overview of Microsoft Cloud Security Benchmark MCSB.mp4
    07:36
  • 23 - Capabilities and controls with MCRA.mp4
    02:22
  • 24 - Capabilities and controls with MCSB.mp4
    06:17
  • 25 - Attack protection with MCRA.mp4
    02:41
  • 26 - Attack protection with MCSB.mp4
    02:14
  • 27 - Resiliency-strategy-for-ransomware-and-other-attacks.pdf
  • 27 - Section Objectives.mp4
    00:57
  • 28 - Discuss common cyberthreats and attack patterns.mp4
    08:17
  • 29 - Understand attack chain modeling.mp4
    05:48
  • 30 - How to support business resiliency.mp4
    03:11
  • 31 - Design solutions for mitigating ransomware attacks.mp4
    03:48
  • 32 - Design solutions for business continuity and Disaster Recovery.mp4
    05:26
  • 33 - Explore solution for security updates.mp4
    03:22
  • 34 - Design-solutions-for-regulatory-compliance.pdf
  • 34 - Section Objectives.mp4
    00:43
  • 35 - Overview of regulatory compliance.mp4
    03:54
  • 36 - Explore important regulatory compliance standards.mp4
    08:03
  • 37 - Translate compliance requirements into security controls.mp4
    06:08
  • 38 - Address compliance requirements using Microsoft Purview.mp4
    07:50
  • 39 - Address privacy requirements with Microsoft Priva.mp4
    09:55
  • 40 - Address security and compliance requirements using Azure Policy.mp4
    10:23
  • 41 - Validate alignment with regulatory standards using Microsoft Defender for cloud.mp4
    13:18
  • 42 - Design-solutions-for-identity-and-access-management.pdf
  • 42 - Section objectives.mp4
    01:52
  • 43 - What is IAM and its function.mp4
    06:58
  • 44 - Active Directory based services in Azure.mp4
    03:18
  • 45 - User Management AD Vs Entra ID.mp4
    03:13
  • 46 - IAM design recommendations.mp4
    05:01
  • 47 - External identities and solutions.mp4
    04:27
  • 48 - Modern authentication and authorization strategies.mp4
    05:16
  • 49 - Microsoft Entra Identity Protection.mp4
    04:07
  • 50 - Align conditional access and Zero Trust.mp4
    02:26
  • 51 - Protecting Human and nonhuman identities.mp4
    04:42
  • 52 - Harden Active Directory Domain Services.mp4
    04:23
  • 53 - Design Cloud Key Management Plan.mp4
    12:07
  • 54 - Design-solutions-for-securing-privileged-access.pdf
  • 54 - Section objectives.mp4
    00:46
  • 55 - Types of access.mp4
    04:11
  • 56 - Understand enterprise access model.mp4
    06:10
  • 57 - Azure Privilege Identity Management.mp4
    03:51
  • 58 - Privileged Access Management.mp4
    03:38
  • 59 - Tenant management with Azure Lighthouse.mp4
    04:39
  • 60 - Solution for cloud infrastructure entitlement management.mp4
    03:11
  • 61 - Solution for privileged access workstations and bastion services.mp4
    09:12
  • 62 - Design-solutions-for-security-operations.pdf
  • 62 - Section objectives.mp4
    01:15
  • 63 - Define Security Operations SecOps strategy.mp4
    09:40
  • 64 - Discuss security operations team structure.mp4
    01:48
  • 65 - Security Operation Center Modernization.mp4
    04:45
  • 66 - Security Operation Team composition.mp4
    03:56
  • 67 - Design unified security operation strategy.mp4
    06:13
  • 68 - what is EDR XDR SIEM and SOAR.mp4
    04:15
  • 69 - Design centralized logging solution for security operation.mp4
    10:36
  • 70 - Microsoft Defender XDR architecture.mp4
    03:54
  • 71 - Microsoft Sentinel and defender architecture as a SIEM and SOAR.mp4
    07:12
  • 72 - Explore key security workflows.mp4
    05:23
  • 73 - what is MITRE ATTCK and discuss sentinel integration.mp4
    11:46
  • 74 - Design-security-solutions-for-microsoft-365.pdf
  • 74 - Section objectives.mp4
    01:41
  • 75 - Core Microsoft 365 Services and Apps.mp4
    02:53
  • 76 - Licensing consideration for Microsoft 365 security.mp4
    02:26
  • 77 - Licensing consideration for Office 365 security.mp4
    04:38
  • 78 - Design configuration and Operational Practices for M365.mp4
    10:15
  • 79 - Importance of Microsoft Purview in M365 security.mp4
    11:30
  • 80 - Data security and compliance controls using copilot.mp4
    02:33
  • 81 - Evaluate and assess security posture for M365.mp4
    04:30
  • More details


    Course Overview

    This expert-level training prepares you for the SC-100 certification while teaching how to design comprehensive security solutions using Microsoft's Zero Trust framework, cloud security benchmarks, and enterprise architecture tools.

    What You'll Learn

    • Implement Zero Trust security models and Microsoft Cybersecurity Reference Architecture
    • Design ransomware protection strategies and regulatory compliance solutions
    • Architect identity management and privileged access systems for hybrid cloud

    Who This Is For

    • Cybersecurity architects designing Microsoft cloud solutions
    • Security engineers implementing enterprise protection frameworks
    • Cloud architects specializing in Azure security infrastructure

    Key Benefits

    • Aligns with official SC-100 exam objectives and Microsoft security best practices
    • Covers cutting-edge tools like Microsoft Sentinel, Defender XDR, and Purview
    • Includes real-world design scenarios for regulatory compliance and threat protection

    Curriculum Highlights

    1. Zero Trust architecture and Microsoft security frameworks
    2. Ransomware resiliency and compliance solution design
    3. Advanced identity protection and security operations
    Focused display
    Category
    • language english
    • Training sessions 81
    • duration 7:40:24
    • Release Date 2025/04/19