
SC-100: Microsoft Cybersecurity Architect Certification Video Training Course
The complete solution to prepare for for your exam with SC-100: Microsoft Cybersecurity Architect certification video training course. The SC-100: Microsoft Cybersecurity Architect certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including Microsoft SC-100 exam dumps, study guide & practice test questions and answers.
SC-100: Microsoft Cybersecurity Architect Certification Video Training Course Exam Curriculum
SC-100 Microsoft Cybersecurity Architect-Introduction
-
1. SC - 100 Microsoft Cybersecurity Architect - Course trailer
Design a Zero Trust strategy and architecture
-
1. Chapter 1: The role of a security Architect
-
2. Zero Trust Overview
-
3. Guiding principles of zero trust
-
4. Pillars of Zero Trust
-
5. MCRA - Identity
-
6. MCRA - SOC Tools
-
7. MCRA - Endpoint Security
-
8. MCRA - Hybrid Computing
-
9. MCRA - Information Protection
-
10. MCRA - People Security
-
11. MCRA - IoT and IT Security - II
-
12. CAF - Introduction
-
13. CAF - strategy
-
14. CAF - Planning
-
15. CAF - Readyness - Azure setup guide
-
16. CAF - Readyness - Azure Landing Zone
-
17. CAF Landing Zone Deployment - Lab Step By Step-I
-
18. CAF Landing Zone Deployment - Lab Step By Step-II
-
19. CAF - Adopt Phase
-
20. CAF - Governance
-
21. IT Transformations - Gap analysis
-
22. Security transformations
-
23. Design Security for resiliency strategy
-
24. The reliability Pillar
-
25. SC 100 Case study overview
-
26. SC 100 Case Study
-
27. Chapter 2: Design a security options strategy - overview
-
28. Security operations strategy overview
-
29. Security operations frameworks, processes and procedures
-
30. SecOps and the Leadership
-
31. People and Processes
-
32. Metrics and Its importance in SOC
-
33. Recommendations for Designing a logging and auditing security strategy
-
34. Cyber Kill Chain - An overview
-
35. Focus areas for SOC in hybrid computing
-
36. Unified operations in Hybrid clouds
-
37. Tiers in SecOps
-
38. Azure Tools for SecOps
-
39. SecOps - Best practices for SIEM _ SOAR
-
40. SecOPs- Best Practices for Network and Azure AD Monitoring
-
41. Incident Response - Best Practices
-
42. Recovery - Best Practices
-
43. Workflow Automation
-
44. Workflow Automation - Lab
-
45. Workflow Automation - Logic apps integration - Lab
-
46. Incident Management process- Overview
-
47. Incident Management process - Preparation
-
48. Incident Management Process - Detection and Analysis
-
49. Incident Management Process - Containment Eradication and recovery
-
50. Incident Management Process - Post - Incident Activity
-
51. Threat Intelligence and SOC
-
52. Threat intelligence in Sentinel
-
53. Threat intelligence in Defender for Endpoint
-
54. Threat Intelligence for IOT
-
55. Threat Intelligence in Defender for Cloud
-
56. Chapter2 Case Study
-
57. Chapter 3: Identity Security Strategy -Introduction
-
58. Identity Security Strategy Overview
-
59. Evolution of Identity Technology
-
60. Identity Challenges
-
61. Microsoft Identity Store - Overview
-
62. Identity Governance - Overview
-
63. Identity is the new control plane
-
64. Zero Trust Concepts and Principles
-
65. Zero Trust Components
-
66. Planning a Zero Trust Strategy
-
67. Zero Trust Model - Introduction
-
68. Enabling Zero Trust Model-II
-
69. Enabling Zero Trust Model-III
-
70. Zero trust Security strategy for Identities
-
71. Conditional Access support for Zero Trust Architecture
-
72. Conditional Access Personas
-
73. Secure Authentication Methods
-
74. Secure Authentication Methods - II
-
75. Password hash Sync - PHS
-
76. Pass Through Authentication - PTA
-
77. Azure AD Roles - Best Practices
-
78. Design a Security Strategy for Privileged Role Access
-
79. Develop a Roadmap
-
80. Develop a Roadmap - Explained
-
81. Design a security strategy for privileged activities
-
82. Rapid Modernization Plan - RAMP
-
83. Execute Critical strategic initiatives for Privileged Activity Management
-
84. Chapter Case Study 01
-
85. Chapter Case Study 02
Evaluate Governance Risk Compliance (GRC) strategies
-
1. Evaluate Regulatory Compliance - Introduction
-
2. Interpret Compliance Requirements
-
3. Compliance Offerings
-
4. Evaluate infra compliance using defender for cloud
-
5. Design for data residency requirements
-
6. Encryption Support for various services
-
7. Chapter 1: Case Study
-
8. Chapter 2: Evaluate Security postures - Chapter Introduction
-
9. what is security posture
-
10. Azure Security Benchmark
-
11. Miter attack and Microsoft Defender for cloud
-
12. Security Hygiene for Cloud workloads
-
13. Security and policy options in Azure Landing zone
-
14. Chapter 2: Case Study
Design Security for Infrastructure
-
1. Chapter 1 : Introduction
-
2. Plan and Implement a security strategy across teams
-
3. Security Role and Responsibilities
-
4. Building the cloud security strategy document - considerations
-
5. Security strategy document - deliverables
-
6. Security Strategy document - Best Practices
-
7. Continuous evolution of security strategy - Deliverables
-
8. Best Practices for Security Planning
-
9. Establishing Essential security practices
-
10. Security Management strategy
-
11. Continuous Assessment
-
12. Chapter 1 case study
-
13. Chapter 2 : Introduction
-
14. What is a Security Baseline
-
15. Security Baseline Principles
-
16. Security Requirement for servers
-
17. Securing Member Servers
-
18. Azure Security Benchmarks
-
19. Securing Mobile devices
-
20. Application Control
-
21. Device Settings using Intune
-
22. Other requirements for clients and endpoints
-
23. Securing Domain Controllers
-
24. Securing DCs from Attacks
-
25. Key Vault - Fundamentals
-
26. Managing access to secrets
-
27. Securing remote access
-
28. Security Ops - Best Practices
-
29. Importance of Interactions with Business leaders
-
30. Hiring right people with right mindset
-
31. Metrics linked to SOC team
-
32. Forensic Procedures and Endpoint Forensics
-
33. Chapter 2 Case Study
-
34. Chapter 3 Introduction
-
35. Security baselines for PaaS services
-
36. Security baselines for IaaS services
-
37. Security Baselines for SaaS Services
-
38. Security requirements for IOT based workloads
-
39. IOT Devices - Security Posture and Threat Management
-
40. Specify security requirements for data work loads
-
41. Security posture management for data related workloads
-
42. Security requirements for Web Based Workloads
-
43. Security posture management for App services
-
44. Security requirements for Azure Storage Accounts
-
45. Azure Defender for Storage
-
46. Security recommendations for Containers
-
47. Defender for Containers
-
48. Chapter 3 Case Study
Design a Strategy for Data and Applications
-
1. Threat Modelling - Introduction
-
2. Threat Modelling - Use Case
-
3. Understanding the application threat modelling
-
4. STRIDE Methodology
-
5. Mitigating the Identified threats
-
6. Shift from Waterfall to DevOps
-
7. DevOps & Its Phases
-
8. DevSecOps and its importance
-
9. Onboarding applications to Azure AD
-
10. Chapter 1 Case study
-
11. Chapter 2 Introduction
-
12. Mitigating threats to data
-
13. Ransomware protection
-
14. Ransomware protection - Phases
-
15. Strategy to identify and protect sensitive Data
-
16. Know your data with Microsoft Purview -I
-
17. Govern your data with Defender for cloud apps - II
-
18. Govern your data - Data Retention
-
19. Govern your data - Records Management
-
20. Chapter 2 case study
About SC-100: Microsoft Cybersecurity Architect Certification Video Training Course
SC-100: Microsoft Cybersecurity Architect certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's SC-100: Microsoft Cybersecurity Architect video training course for passing certification exams is the only solution which you need.
Pass Microsoft SC-100 Exam in First Attempt Guaranteed!
Get 100% Latest Exam Questions, Accurate & Verified Answers As Seen in the Actual Exam!
30 Days Free Updates, Instant Download!

SC-100 Premium Bundle
- Premium File 247 Questions & Answers. Last update: Feb 27, 2025
- Training Course 168 Video Lectures
- Study Guide 436 Pages
Free SC-100 Exam Questions & Microsoft SC-100 Dumps | ||
---|---|---|
Microsoft.selftesttraining.sc-100.v2024-12-28.by.cooper.7q.ete |
Views: 0
Downloads: 386
|
Size: 182.33 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register