Home Search Profile
00:00
00:00

Master SC-100: Ultimate Microsoft Cybersecurity Architect Prep

Focused View

1:43:50

  • 01 - Exam SC-100 Microsoft Cybersecurity Architect.mp4
    01:57
  • 02 - Module introduction Design a Zero Trust strategy and architecture.mp4
    00:55
  • 03 - Learning objectives.mp4
    01:01
  • 04 - Identify cybersecutiy integration points.mp4
    04:19
  • 05 - Translate business goals to security.mp4
    01:37
  • 06 - Translate security requirements.mp4
    02:36
  • 07 - Design security with resiliency.mp4
    01:50
  • 08 - Hybrid security strategies.mp4
    00:55
  • 09 - Traffic filtering and segmentation.mp4
    01:04
  • 10 - Learning objectives.mp4
    00:42
  • 11 - Designing a logging and auditing strategy.mp4
    01:15
  • 12 - Security operation considerations.mp4
    01:51
  • 13 - Design a SIEM and SOAR strategy.mp4
    01:30
  • 14 - Evaluate security workflows.mp4
    01:08
  • 15 - Evaluate incident management.mp4
    01:22
  • 16 - Evaluate technical threat intelligence.mp4
    00:54
  • 17 - Learning objectives.mp4
    00:39
  • 18 - Design a resource access strategy.mp4
    01:27
  • 19 - Recommend an identity store.mp4
    00:59
  • 20 - Recommend an authentication strategy.mp4
    01:21
  • 21 - Recommend an authorization strategy.mp4
    00:52
  • 22 - Design for conditional access.mp4
    01:19
  • 23 - Design role assignments.mp4
    01:49
  • 24 - Design privilege activity strategy.mp4
    01:05
  • 25 - Module introduction Evaluate governance risk compliance (GRC) technical strategies and secur.mp4
    00:49
  • 26 - Learning objectives.mp4
    01:00
  • 27 - Interpret compliance requirements.mp4
    01:05
  • 28 - Interpret compliance scores.mp4
    02:50
  • 29 - Evaluate infrastructure compliance.mp4
    04:35
  • 30 - Design an Azure Policy configuration.mp4
    05:21
  • 31 - Design for data residency.mp4
    00:53
  • 32 - Translate privacy into security.mp4
    02:55
  • 33 - Learning objectives.mp4
    00:43
  • 34 - Evaluate security using benchmarks.mp4
    01:01
  • 35 - Evaluate security using Defender.mp4
    02:36
  • 36 - Evaluate security using Secure Score.mp4
    00:41
  • 37 - Evaluate security of cloud workloads.mp4
    00:57
  • 38 - Design security with landing zones.mp4
    01:53
  • 39 - Interpret threat intelligence.mp4
    00:35
  • 40 - Mitigate identified risks.mp4
    01:08
  • 41 - Module introduction Design security for infrastructure.mp4
    00:50
  • 42 - Learning objectives.mp4
    00:46
  • 43 - Specify security baselines for endpoints.mp4
    03:27
  • 44 - Specify security requirements for servers.mp4
    01:12
  • 45 - Specify security requirements for mobile devices.mp4
    04:50
  • 46 - Specify requirements to secure AD DS.mp4
    01:03
  • 47 - Design a strategy to manage secrets.mp4
    04:48
  • 48 - Design a strategy for secure remote access.mp4
    01:17
  • 49 - Learning objectives.mp4
    00:33
  • 50 - Specify security baselines for IaaS.mp4
    00:57
  • 51 - Specify security baselines for PaaS.mp4
    00:45
  • 52 - Specify security baselines for SaaS.mp4
    00:34
  • 53 - Specify security baselines for IoT.mp4
    01:05
  • 54 - Specify security requirements for data workloads.mp4
    04:22
  • 55 - Specify security requirements for web workloads.mp4
    00:54
  • 56 - Specify security requirements for storage.mp4
    02:42
  • 57 - Specify security requirements for containers.mp4
    00:40
  • 58 - Specify security requirements for container orchestration.mp4
    00:32
  • 59 - Module introduction Design a strategy for data and application.mp4
    00:37
  • 60 - Learning objectives.mp4
    00:28
  • 61 - Specify priorities for mitigating threats to apps.mp4
    00:46
  • 62 - Specify a security standard for onboarding new apps.mp4
    01:38
  • 63 - Specify a security strategy for apps and APIs.mp4
    01:21
  • 64 - Learning objectives.mp4
    00:32
  • 65 - Specify priorities for mitigating threats to data.mp4
    00:56
  • 66 - Design a strategy to identify and protect sensitive data.mp4
    00:49
  • 67 - Specify an encryption standard for data.mp4
    00:40
  • 68 - Exam SC-100 Microsoft Cybersecurity Architect.mp4
    01:17
  • More details


    Course Overview

    Prepare for the Microsoft SC-100 certification and master cybersecurity architecture with this expert-led course. Learn to design Zero Trust security solutions, protect organizational assets, and align strategies with industry best practices.

    What You'll Learn

    • Design security solutions for infrastructure, applications, and data
    • Implement Zero Trust principles across identity, devices, and networks
    • Translate cybersecurity strategies into actionable capabilities

    Who This Is For

    • Aspiring Microsoft Cybersecurity Architects
    • IT professionals preparing for SC-100 certification
    • Security experts expanding their Zero Trust knowledge

    Key Benefits

    • Official Microsoft Press curriculum
    • Hands-on guidance from certified experts
    • Comprehensive coverage of exam objectives

    Curriculum Highlights

    1. Designing security operations and compliance capabilities
    2. Implementing identity and infrastructure security
    3. Securing applications, data, and AI solutions
    Focused display
    • language english
    • Training sessions 68
    • duration 1:43:50
    • English subtitles has
    • Release Date 2025/05/22