SC-100: Microsoft Cybersecurity Architect
Your Microsoft SC-100 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SC-100 certification test. Ace your Microsoft SC-100 at the first attempt and obtain the Microsoft Cybersecurity Architect credential with ease.
Curriculum for SC-100 Video Course
SC-100 Microsoft Cybersecurity Architect-Introduction
Video Name | Time | |
---|---|---|
1. SC - 100 Microsoft Cybersecurity Architect - Course trailer | 0:42 |
Video Name | Time | |
---|---|---|
1. Chapter 1: The role of a security Architect | 1:29 | |
2. Zero Trust Overview | 1:39 | |
3. Guiding principles of zero trust | 2:53 | |
4. Pillars of Zero Trust | 6:39 | |
5. MCRA - Identity | 3:50 | |
6. MCRA - SOC Tools | 3:05 | |
7. MCRA - Endpoint Security | 5:08 | |
8. MCRA - Hybrid Computing | 7:21 | |
9. MCRA - Information Protection | 4:06 | |
10. MCRA - People Security | 6:54 | |
11. MCRA - IoT and IT Security - II | 7:39 | |
12. CAF - Introduction | 2:20 | |
13. CAF - strategy | 5:57 | |
14. CAF - Planning | 4:58 | |
15. CAF - Readyness - Azure setup guide | 11:01 | |
16. CAF - Readyness - Azure Landing Zone | 9:17 | |
17. CAF Landing Zone Deployment - Lab Step By Step-I | 5:29 | |
18. CAF Landing Zone Deployment - Lab Step By Step-II | 26:54 | |
19. CAF - Adopt Phase | 2:17 | |
20. CAF - Governance | 13:16 | |
21. IT Transformations - Gap analysis | 3:43 | |
22. Security transformations | 7:51 | |
23. Design Security for resiliency strategy | 4:05 | |
24. The reliability Pillar | 4:06 | |
25. SC 100 Case study overview | 2:25 | |
26. SC 100 Case Study | 12:04 | |
27. Chapter 2: Design a security options strategy - overview | 1:26 | |
28. Security operations strategy overview | 3:03 | |
29. Security operations frameworks, processes and procedures | 3:32 | |
30. SecOps and the Leadership | 3:58 | |
31. People and Processes | 4:42 | |
32. Metrics and Its importance in SOC | 3:31 | |
33. Recommendations for Designing a logging and auditing security strategy | 6:24 | |
34. Cyber Kill Chain - An overview | 3:49 | |
35. Focus areas for SOC in hybrid computing | 1:51 | |
36. Unified operations in Hybrid clouds | 5:06 | |
37. Tiers in SecOps | 3:47 | |
38. Azure Tools for SecOps | 6:10 | |
39. SecOps - Best practices for SIEM _ SOAR | 9:22 | |
40. SecOPs- Best Practices for Network and Azure AD Monitoring | 4:04 | |
41. Incident Response - Best Practices | 2:27 | |
42. Recovery - Best Practices | 3:03 | |
43. Workflow Automation | 3:03 | |
44. Workflow Automation - Lab | 4:28 | |
45. Workflow Automation - Logic apps integration - Lab | 7:22 | |
46. Incident Management process- Overview | 5:51 | |
47. Incident Management process - Preparation | 2:46 | |
48. Incident Management Process - Detection and Analysis | 1:37 | |
49. Incident Management Process - Containment Eradication and recovery | 3:31 | |
50. Incident Management Process - Post - Incident Activity | 2:27 | |
51. Threat Intelligence and SOC | 3:48 | |
52. Threat intelligence in Sentinel | 1:52 | |
53. Threat intelligence in Defender for Endpoint | 5:08 | |
54. Threat Intelligence for IOT | 2:13 | |
55. Threat Intelligence in Defender for Cloud | 2:07 | |
56. Chapter2 Case Study | 8:47 | |
57. Chapter 3: Identity Security Strategy -Introduction | 01:10 | |
58. Identity Security Strategy Overview | 2:28 | |
59. Evolution of Identity Technology | 2:51 | |
60. Identity Challenges | 1:56 | |
61. Microsoft Identity Store - Overview | 5:30 | |
62. Identity Governance - Overview | 4:20 | |
63. Identity is the new control plane | 2:45 | |
64. Zero Trust Concepts and Principles | 2:43 | |
65. Zero Trust Components | 4:26 | |
66. Planning a Zero Trust Strategy | 3:29 | |
67. Zero Trust Model - Introduction | 1:07 | |
68. Enabling Zero Trust Model-II | 10:36 | |
69. Enabling Zero Trust Model-III | 4:01 | |
70. Zero trust Security strategy for Identities | 7:08 | |
71. Conditional Access support for Zero Trust Architecture | 3:22 | |
72. Conditional Access Personas | 6:01 | |
73. Secure Authentication Methods | 1:35 | |
74. Secure Authentication Methods - II | 1:35 | |
75. Password hash Sync - PHS | 8:38 | |
76. Pass Through Authentication - PTA | 9:51 | |
77. Azure AD Roles - Best Practices | 6:17 | |
78. Design a Security Strategy for Privileged Role Access | 2:20 | |
79. Develop a Roadmap | 2:09 | |
80. Develop a Roadmap - Explained | 5:33 | |
81. Design a security strategy for privileged activities | 4:34 | |
82. Rapid Modernization Plan - RAMP | 4:21 | |
83. Execute Critical strategic initiatives for Privileged Activity Management | 2:10 | |
84. Chapter Case Study 01 | 8:04 | |
85. Chapter Case Study 02 | 5:08 |
Video Name | Time | |
---|---|---|
1. Evaluate Regulatory Compliance - Introduction | 1:17 | |
2. Interpret Compliance Requirements | 2:53 | |
3. Compliance Offerings | 6:10 | |
4. Evaluate infra compliance using defender for cloud | 3:44 | |
5. Design for data residency requirements | 5:01 | |
6. Encryption Support for various services | 6:25 | |
7. Chapter 1: Case Study | 7:29 | |
8. Chapter 2: Evaluate Security postures - Chapter Introduction | 1:00 | |
9. what is security posture | 3:04 | |
10. Azure Security Benchmark | 2:21 | |
11. Miter attack and Microsoft Defender for cloud | 3:44 | |
12. Security Hygiene for Cloud workloads | 5:57 | |
13. Security and policy options in Azure Landing zone | 2:37 | |
14. Chapter 2: Case Study | 11:32 |
Video Name | Time | |
---|---|---|
1. Chapter 1 : Introduction | 1:13 | |
2. Plan and Implement a security strategy across teams | 7:19 | |
3. Security Role and Responsibilities | 4:59 | |
4. Building the cloud security strategy document - considerations | 5:41 | |
5. Security strategy document - deliverables | 2:41 | |
6. Security Strategy document - Best Practices | 4:28 | |
7. Continuous evolution of security strategy - Deliverables | 3:12 | |
8. Best Practices for Security Planning | 3:54 | |
9. Establishing Essential security practices | 2:28 | |
10. Security Management strategy | 1:53 | |
11. Continuous Assessment | 3:08 | |
12. Chapter 1 case study | 4:07 | |
13. Chapter 2 : Introduction | 0:54 | |
14. What is a Security Baseline | 2:02 | |
15. Security Baseline Principles | 4:31 | |
16. Security Requirement for servers | 3:11 | |
17. Securing Member Servers | 5:43 | |
18. Azure Security Benchmarks | 6:17 | |
19. Securing Mobile devices | 2:40 | |
20. Application Control | 2:11 | |
21. Device Settings using Intune | 3:07 | |
22. Other requirements for clients and endpoints | 1:46 | |
23. Securing Domain Controllers | 5:55 | |
24. Securing DCs from Attacks | 4:14 | |
25. Key Vault - Fundamentals | 3:19 | |
26. Managing access to secrets | 3:56 | |
27. Securing remote access | 3:50 | |
28. Security Ops - Best Practices | 2:58 | |
29. Importance of Interactions with Business leaders | 3:39 | |
30. Hiring right people with right mindset | 2:18 | |
31. Metrics linked to SOC team | 3:13 | |
32. Forensic Procedures and Endpoint Forensics | 4:32 | |
33. Chapter 2 Case Study | 4:34 | |
34. Chapter 3 Introduction | 0:48 | |
35. Security baselines for PaaS services | 6:48 | |
36. Security baselines for IaaS services | 5:27 | |
37. Security Baselines for SaaS Services | 4:42 | |
38. Security requirements for IOT based workloads | 6:31 | |
39. IOT Devices - Security Posture and Threat Management | 4:08 | |
40. Specify security requirements for data work loads | 4:52 | |
41. Security posture management for data related workloads | 5:59 | |
42. Security requirements for Web Based Workloads | 7:29 | |
43. Security posture management for App services | 2:33 | |
44. Security requirements for Azure Storage Accounts | 9:01 | |
45. Azure Defender for Storage | 2:21 | |
46. Security recommendations for Containers | 8:26 | |
47. Defender for Containers | 2:49 | |
48. Chapter 3 Case Study | 3:32 |
Video Name | Time | |
---|---|---|
1. Threat Modelling - Introduction | 8:24 | |
2. Threat Modelling - Use Case | 10:49 | |
3. Understanding the application threat modelling | 2:38 | |
4. STRIDE Methodology | 3:58 | |
5. Mitigating the Identified threats | 2:04 | |
6. Shift from Waterfall to DevOps | 1:54 | |
7. DevOps & Its Phases | 4:20 | |
8. DevSecOps and its importance | 3:00 | |
9. Onboarding applications to Azure AD | 6:31 | |
10. Chapter 1 Case study | 5:11 | |
11. Chapter 2 Introduction | 1:26 | |
12. Mitigating threats to data | 4:25 | |
13. Ransomware protection | 1:52 | |
14. Ransomware protection - Phases | 6:26 | |
15. Strategy to identify and protect sensitive Data | 4:58 | |
16. Know your data with Microsoft Purview -I | 5:42 | |
17. Govern your data with Defender for cloud apps - II | 6:33 | |
18. Govern your data - Data Retention | 5:05 | |
19. Govern your data - Records Management | 7:33 | |
20. Chapter 2 case study | 5:43 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals