Microsoft Cybersecurity Architect Video Course

SC-100: Microsoft Cybersecurity Architect

Your Microsoft SC-100 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SC-100 certification test. Ace your Microsoft SC-100 at the first attempt and obtain the Microsoft Cybersecurity Architect credential with ease.

# of Students
101
# of Lectures
168
Course Length
12 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for SC-100 Video Course

SC-100 Microsoft Cybersecurity Architect-Introduction

  Video Name Time
  1. SC - 100 Microsoft Cybersecurity Architect - Course trailer 0:42
  Video Name Time
  1. Chapter 1: The role of a security Architect 1:29
  2. Zero Trust Overview 1:39
  3. Guiding principles of zero trust 2:53
  4. Pillars of Zero Trust 6:39
  5. MCRA - Identity 3:50
  6. MCRA - SOC Tools 3:05
  7. MCRA - Endpoint Security 5:08
  8. MCRA - Hybrid Computing 7:21
  9. MCRA - Information Protection 4:06
  10. MCRA - People Security 6:54
  11. MCRA - IoT and IT Security - II 7:39
  12. CAF - Introduction 2:20
  13. CAF - strategy 5:57
  14. CAF - Planning 4:58
  15. CAF - Readyness - Azure setup guide 11:01
  16. CAF - Readyness - Azure Landing Zone 9:17
  17. CAF Landing Zone Deployment - Lab Step By Step-I 5:29
  18. CAF Landing Zone Deployment - Lab Step By Step-II 26:54
  19. CAF - Adopt Phase 2:17
  20. CAF - Governance 13:16
  21. IT Transformations - Gap analysis 3:43
  22. Security transformations 7:51
  23. Design Security for resiliency strategy 4:05
  24. The reliability Pillar 4:06
  25. SC 100 Case study overview 2:25
  26. SC 100 Case Study 12:04
  27. Chapter 2: Design a security options strategy - overview 1:26
  28. Security operations strategy overview 3:03
  29. Security operations frameworks, processes and procedures 3:32
  30. SecOps and the Leadership 3:58
  31. People and Processes 4:42
  32. Metrics and Its importance in SOC 3:31
  33. Recommendations for Designing a logging and auditing security strategy 6:24
  34. Cyber Kill Chain - An overview 3:49
  35. Focus areas for SOC in hybrid computing 1:51
  36. Unified operations in Hybrid clouds 5:06
  37. Tiers in SecOps 3:47
  38. Azure Tools for SecOps 6:10
  39. SecOps - Best practices for SIEM _ SOAR 9:22
  40. SecOPs- Best Practices for Network and Azure AD Monitoring 4:04
  41. Incident Response - Best Practices 2:27
  42. Recovery - Best Practices 3:03
  43. Workflow Automation 3:03
  44. Workflow Automation - Lab 4:28
  45. Workflow Automation - Logic apps integration - Lab 7:22
  46. Incident Management process- Overview 5:51
  47. Incident Management process - Preparation 2:46
  48. Incident Management Process - Detection and Analysis 1:37
  49. Incident Management Process - Containment Eradication and recovery 3:31
  50. Incident Management Process - Post - Incident Activity 2:27
  51. Threat Intelligence and SOC 3:48
  52. Threat intelligence in Sentinel 1:52
  53. Threat intelligence in Defender for Endpoint 5:08
  54. Threat Intelligence for IOT 2:13
  55. Threat Intelligence in Defender for Cloud 2:07
  56. Chapter2 Case Study 8:47
  57. Chapter 3: Identity Security Strategy -Introduction 01:10
  58. Identity Security Strategy Overview 2:28
  59. Evolution of Identity Technology 2:51
  60. Identity Challenges 1:56
  61. Microsoft Identity Store - Overview 5:30
  62. Identity Governance - Overview 4:20
  63. Identity is the new control plane 2:45
  64. Zero Trust Concepts and Principles 2:43
  65. Zero Trust Components 4:26
  66. Planning a Zero Trust Strategy 3:29
  67. Zero Trust Model - Introduction 1:07
  68. Enabling Zero Trust Model-II 10:36
  69. Enabling Zero Trust Model-III 4:01
  70. Zero trust Security strategy for Identities 7:08
  71. Conditional Access support for Zero Trust Architecture 3:22
  72. Conditional Access Personas 6:01
  73. Secure Authentication Methods 1:35
  74. Secure Authentication Methods - II 1:35
  75. Password hash Sync - PHS 8:38
  76. Pass Through Authentication - PTA 9:51
  77. Azure AD Roles - Best Practices 6:17
  78. Design a Security Strategy for Privileged Role Access 2:20
  79. Develop a Roadmap 2:09
  80. Develop a Roadmap - Explained 5:33
  81. Design a security strategy for privileged activities 4:34
  82. Rapid Modernization Plan - RAMP 4:21
  83. Execute Critical strategic initiatives for Privileged Activity Management 2:10
  84. Chapter Case Study 01 8:04
  85. Chapter Case Study 02 5:08
  Video Name Time
  1. Evaluate Regulatory Compliance - Introduction 1:17
  2. Interpret Compliance Requirements 2:53
  3. Compliance Offerings 6:10
  4. Evaluate infra compliance using defender for cloud 3:44
  5. Design for data residency requirements 5:01
  6. Encryption Support for various services 6:25
  7. Chapter 1: Case Study 7:29
  8. Chapter 2: Evaluate Security postures - Chapter Introduction 1:00
  9. what is security posture 3:04
  10. Azure Security Benchmark 2:21
  11. Miter attack and Microsoft Defender for cloud 3:44
  12. Security Hygiene for Cloud workloads 5:57
  13. Security and policy options in Azure Landing zone 2:37
  14. Chapter 2: Case Study 11:32
  Video Name Time
  1. Chapter 1 : Introduction 1:13
  2. Plan and Implement a security strategy across teams 7:19
  3. Security Role and Responsibilities 4:59
  4. Building the cloud security strategy document - considerations 5:41
  5. Security strategy document - deliverables 2:41
  6. Security Strategy document - Best Practices 4:28
  7. Continuous evolution of security strategy - Deliverables 3:12
  8. Best Practices for Security Planning 3:54
  9. Establishing Essential security practices 2:28
  10. Security Management strategy 1:53
  11. Continuous Assessment 3:08
  12. Chapter 1 case study 4:07
  13. Chapter 2 : Introduction 0:54
  14. What is a Security Baseline 2:02
  15. Security Baseline Principles 4:31
  16. Security Requirement for servers 3:11
  17. Securing Member Servers 5:43
  18. Azure Security Benchmarks 6:17
  19. Securing Mobile devices 2:40
  20. Application Control 2:11
  21. Device Settings using Intune 3:07
  22. Other requirements for clients and endpoints 1:46
  23. Securing Domain Controllers 5:55
  24. Securing DCs from Attacks 4:14
  25. Key Vault - Fundamentals 3:19
  26. Managing access to secrets 3:56
  27. Securing remote access 3:50
  28. Security Ops - Best Practices 2:58
  29. Importance of Interactions with Business leaders 3:39
  30. Hiring right people with right mindset 2:18
  31. Metrics linked to SOC team 3:13
  32. Forensic Procedures and Endpoint Forensics 4:32
  33. Chapter 2 Case Study 4:34
  34. Chapter 3 Introduction 0:48
  35. Security baselines for PaaS services 6:48
  36. Security baselines for IaaS services 5:27
  37. Security Baselines for SaaS Services 4:42
  38. Security requirements for IOT based workloads 6:31
  39. IOT Devices - Security Posture and Threat Management 4:08
  40. Specify security requirements for data work loads 4:52
  41. Security posture management for data related workloads 5:59
  42. Security requirements for Web Based Workloads 7:29
  43. Security posture management for App services 2:33
  44. Security requirements for Azure Storage Accounts 9:01
  45. Azure Defender for Storage 2:21
  46. Security recommendations for Containers 8:26
  47. Defender for Containers 2:49
  48. Chapter 3 Case Study 3:32
  Video Name Time
  1. Threat Modelling - Introduction 8:24
  2. Threat Modelling - Use Case 10:49
  3. Understanding the application threat modelling 2:38
  4. STRIDE Methodology 3:58
  5. Mitigating the Identified threats 2:04
  6. Shift from Waterfall to DevOps 1:54
  7. DevOps & Its Phases 4:20
  8. DevSecOps and its importance 3:00
  9. Onboarding applications to Azure AD 6:31
  10. Chapter 1 Case study 5:11
  11. Chapter 2 Introduction 1:26
  12. Mitigating threats to data 4:25
  13. Ransomware protection 1:52
  14. Ransomware protection - Phases 6:26
  15. Strategy to identify and protect sensitive Data 4:58
  16. Know your data with Microsoft Purview -I 5:42
  17. Govern your data with Defender for cloud apps - II 6:33
  18. Govern your data - Data Retention 5:05
  19. Govern your data - Records Management 7:33
  20. Chapter 2 case study 5:43

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Microsoft
Next Step
Next Step

Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address