SC-100 Microsoft Cybersecurity Architect course with sims | Udemy


SC-100 Microsoft Cybersecurity Architect course with sims | Udemy [Update 08/2024]
English | Size: 12.17 GB
Genre: eLearning

Get prepared for the SC-100 exam with instructor led labs and hands on simulations available 24/7

What you’ll learn
Learn the concepts and perform hands on activities needed to pass the SC-100 exam
Gain a tremendous amount of knowledge involving securing Microsoft 365 and Azure Services
Get loads of hands on experience with Microsoft Cybersecurity for Azure and Microsoft 365
Utilize hands on simulations that can be accessed anytime, anywhere!

We really hope you’ll agree, this training is way more then the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Design a resiliency strategy for ransomware & other attacks based on MS Security

  • Working with business resiliency goals, identifying and prioritizing threats
  • MS ransomware best practices, including backup, restore, and privileged access
  • Secure backup and restore by using Azure Backup
  • Security updates using the Azure Update Manager

Design solutions that align with the MCRA and MCSB

  • Concepts of cybersecurity capabilities and controls using Zero Trust security
  • Concepts of MS Defender for protecting against insider and external attacks
  • Navigating the Microsoft Defender and Microsoft Purview admin centers
  • Understanding insider risk policies as a mitigation solution
  • Implementing insider risk management policies in Microsoft Purview
  • Using the Zero Trust Rapid Modernization Plan (RaMP) as your security strategy

Design solutions that align with the Microsoft CAF and WAF Frameworks

  • Security and governance based on Microsoft Cloud Adoption Framework (CAF)
  • Security and governance based on Microsoft Azure Well-Architected Framework
  • Using Azure landing zones for implementing and governing security
  • The DevSecOps process model

Design solutions for security operations

  • Security operations capabilities to support a hybrid or multicloud environment
  • Requirements for centralized logging and auditing
  • Setting audit permissions and enabling support
  • Perform threat hunting by with audit logging
  • Understanding the Kusto Query Language (KQL) for use in threat hunting
  • Detection and response concepts of extended detection and response (XDR)
  • Confirming we understand the concept of Microsoft Sentinel
  • Setting up a Log Analytics workspace and Microsoft Sentinel workspace
  • Confirming we understand the concepts of SIEM and SOAR
  • Visualizing data ingestion for use in Microsoft Sentinel
  • Understanding analytic rules in Microsoft Sentinel to support SIEM and SOAR
  • Workflow for creating security analytic rules for incident response & management
  • Workflow for creating built-in scheduled query rules
  • Workflow for creating near-real-time (NRT) analytics rules
  • Automation with security orchestration automated response (SOAR)
  • Utilizing content gallery hunting queries for threat hunting
  • Threat detection coverage by using MITRE ATT&CK

Design solutions for identity and access management

  • Understanding SaaS, PaaS, and IaaS, & how it relates to Azure hybrid/on-premise
  • Use cases with SaaS, PaaS, & IaaS including identity, networking, applications
  • External identities, business-to-business (B2B), & business-to-customer (B2C)
  • Managing business-to-business (B2B) settings within Entra ID
  • Using Entra ID external identities for a business-to-business (B2B) solution
  • Creating a tenant for using business-to-customer (B2C) scenarios
  • Decentralized identities with the help of Microsoft Entra Verified ID
  • Threat mitigation with sign-in logs in Microsoft Entra ID
  • Understanding Entra Identity Protection for continuous access evaluation
  • Using Entra Identity Protection for securing authentication and authorization
  • Threat intelligence integration from Entra Identity Protection into MS Defender
  • Understanding Multi Factor Authentication (MFA)
  • Implementing Muti Factor Authentication in Microsoft Entra ID
  • Implementing Self Service Password Reset (SSPR) in Microsoft Entra ID
  • Understanding Conditional Access Policies with a Zero Trust strategy
  • Implementing Conditional Access Policies with a Zero Trust strategy
  • Concepts of threat intelligence integration with Defender for Cloud
  • Design and configure workflow automation in Microsoft Defender for Cloud
  • Setting up email notifications within Defender for Cloud
  • Create and manage alert suppression rules
  • Generate sample alerts and incidents in Microsoft Defender for Cloud
  • Remediate alerts and incidents by using MS Defender for Cloud recommendations
  • Manage security alerts and incidents
  • Analyze Microsoft Defender for Cloud threat intelligence reports
  • Concepts of securing the various types of identities using Defender for Identity
  • Hybrid Active Directory Domain Services (ADDS) connections for secure identities
  • Creating an Azure Key Vault for secrets, keys, and certificates
  • Access control to secrets, keys, and certificates with Azure Key Vault
  • Managing secrets, keys, and certificates with Azure Key vault
  • Removing key vault services

Design solutions for securing privileged access

  • Assigning and delegating privileged roles by using the enterprise access model
  • Understanding RBAC for Identity governance & privileged access management
  • Implementing RBAC to provide privileged access management in Entra ID & Azure
  • Creating a custom RBAC role in Microsoft Entra ID
  • Using RBAC to provide access to Azure resources
  • Implementing RBAC to provide privileged access management in Microsoft 365
  • Understanding Microsoft Entra Privileged Identity Management (PIM)
  • Implementing Microsoft Entra Privileged Identity Management (PIM)
  • Understanding entitlement management as an identity governance solution
  • Creating catalogs for entitlement management
  • Implementing entitlement management with Microsoft Entra Permissions Management
  • User access request entitlement management to an access package
  • Identity governance with access reviews in Microsoft Entra
  • Privileged Access Workstation (PAW) and bastion services

Design solutions for regulatory compliance

  • Determining compliance requirements for security solution adaptation
  • Solutions that address compliance requirements by using Microsoft Purview
  • Utilizing Microsoft Priva for privacy requirements
  • Creating Privacy Risk Management policies to meet privacy requirements
  • Azure Policy solutions to address security and compliance requirements
  • Compliance with Microsoft Defender for Cloud

Design solutions for security posture management in hybrid and multicloud

  • Security posture with regulatory compliance policies and MCSB
  • Security posture with Microsoft Defender for Cloud
  • Security posture with Microsoft Secure Score
  • Enabling support for Defender for servers within Defender for Cloud
  • Enabling Microsoft Defender for Servers as a cloud workload protection solution
  • Enabling Microsoft Defender for App Service as a cloud app protection solution
  • Integration with hybrid and multicloud environments by using Azure Arc
  • Support for Microsoft Defender for DevOps within Defender for Cloud
  • Utilizing Microsoft Defender External Attack Surface Management (Defender EASM)

Design solutions for securing server and client endpoints

  • Using Microsoft Defender for Endpoint for securing multiple platforms and OS’
  • Configuring settings in Microsoft Defender for Endpoint
  • Utilizing Microsoft Intune for mobile devices & client for endpoint protection
  • Managing security requirements on mobile devices & clients endpoints with Intune
  • Using security baselines to secure servers and client endpoints
  • IoT, OT and ICS security discovery using Microsoft Defender for IoT
  • Secure remote access with Microsoft Entra Global Secure Access

Specify requirements for securing SaaS, PaaS, and IaaS services

  • Security baselines for SaaS, PaaS, and IaaS services
  • Security in your IoT workloads
  • Web workload management with Azure App Service plans
  • Creating an Azure App Service plan
  • Adding an App Service for web workloads
  • Securing web workloads with Azure App Services
  • Understanding containers in Azure
  • Creating a container instance in Azure
  • Securing Azure container instances
  • Container orchestration with Azure Kubernetes Service (AKS)
  • Scaling container orchestration with Azure Kubernetes Service (AKS)
  • Securing container orchestration with Azure Kubernetes Service (AKS)

Design solutions for securing Microsoft 365

  • Posture with Microsoft Secure Score & Microsoft Defender for Cloud secure score
  • Requirements for a Microsoft 365 Defender security solution
  • Secure configuration & operational practices for Microsoft 365 workloads & data

Design solutions for securing applications

  • Securing existing application portfolios and business-critical applications
  • Standards and practices for securing the application development process
  • Considerations for API management and security solutions
  • Understanding secure access with Azure Web Application Firewall (WAF)
  • Use cases for implementing the Azure Front Door
  • Setting up an Azure Web Application Firewall (WAF) & Azure Front Door
  • Removing existing resources up to this point

Design solutions for securing an organization’s data

  • Understanding data discovery and classification with Purview sensitivity labels
  • Managing sensitive info types for a classification data governance solution
  • Implementing a data governance & classification solution with sensitivity labels
  • Visualizing protection solutions with data at rest, data in motion & data in use
  • Understanding the concepts of relational databases
  • Setting up an Azure SQL database and connecting with SSMS
  • Configuring Azure SQL firewall settings for client connections
  • Utilizing Azure SQL dynamic masking
  • Utilizing Azure SQL database encryption
  • Understanding the concepts of non-relational data and NoSQL
  • Setting up an Azure Cosmos DB solution in Azure
  • Protection and durability with replication of an Azure Cosmos DB
  • Remove existing database resources
  • Grasping the purposes of Azure Synapse Analytics
  • Registering Azure Synapse as a resource provider
  • Creating a SQL DB and server for use with Azure Synapse Analytics
  • Adding an Azure Synapse workspace and Data Lake Storage account
  • Visualizing the concepts of SQL Pool usage with Azure Synapse Analytics
  • Setting up a SQL Pool for usage with Azure Synapse
  • Confirming we understand the concepts of Azure Storage accounts
  • Creating an Azure Storage account as a data storage solution
  • Mitigating threats to data within our Azure Storage account solution
  • Enabling Defender for Storage within a Azure Storage account
  • Utilizing Microsoft Defender for SQL as a security solution

Conclusion

  • Cleaning up resource
  • Getting a Udemy certificate
  • BONUS Where do I go from here?

Who this course is for:

  • IT people interested in learning and passing the Microsoft SC-100 Exam
  • People interested in learning a tremendous amount about Microsoft Cybersecurity for Azure and Microsoft 365
DOWNLOAD FROM RAPIDGATOR

rapidgator.net/file/02ee0058d49767e18d988f357beb8c56/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part01.rar.html
rapidgator.net/file/a835905969638206826caebfa5854680/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part02.rar.html
rapidgator.net/file/624a929e9e6cf7da6671e52be01a94cc/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part03.rar.html
rapidgator.net/file/7c2bd762228025eb7c3c3bd241d7cc4b/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part04.rar.html
rapidgator.net/file/16708d01d51684ba52db8e10f94ce2b1/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part05.rar.html
rapidgator.net/file/811ac63e6201355efb2c8782417938c1/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part06.rar.html
rapidgator.net/file/7a365e2e01d6195972b1c4f4431e1819/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part07.rar.html
rapidgator.net/file/a4797e292ecdd4d0de4f90ce1991ce69/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part08.rar.html
rapidgator.net/file/1fbd04b41370e104928f5843236a263e/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part09.rar.html
rapidgator.net/file/8b927afd17d7c17a20284c753fc603cc/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part10.rar.html
rapidgator.net/file/b6fa7ff7a14d75f3dd5446bed0245836/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part11.rar.html
rapidgator.net/file/706b4c138c950fb9cda783550e7e0433/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part12.rar.html
rapidgator.net/file/545938bce9ada906e7e9c08377f0e22e/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part13.rar.html

DOWNLOAD FROM TURBOBIT

tbit.to/dqdss0bjh3m2/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part01.rar.html
tbit.to/dk8uvm87h59w/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part02.rar.html
tbit.to/q9magzyct4xf/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part03.rar.html
tbit.to/z6txzh9q7k1x/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part04.rar.html
tbit.to/lslz0qg51grm/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part05.rar.html
tbit.to/3pf5s166sexu/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part06.rar.html
tbit.to/3ln0ye5x8b6a/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part07.rar.html
tbit.to/wjfi9jrl9yk0/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part08.rar.html
tbit.to/kragmxomfr4z/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part09.rar.html
tbit.to/lm7dz3d9tgpn/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part10.rar.html
tbit.to/zuitq4zssdt1/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part11.rar.html
tbit.to/xo1rh6d45gl1/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part12.rar.html
tbit.to/9si3a95o7c7j/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part13.rar.html

DOWNLOAD FROM NITROFLARE

nitroflare.com/view/A29AEFEA634AE8F/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part01.rar
nitroflare.com/view/B0FF73BC7C677F2/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part02.rar
nitroflare.com/view/3768698D136BAD2/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part03.rar
nitroflare.com/view/75316F4B3D95941/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part04.rar
nitroflare.com/view/785BFD069DF6EB8/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part05.rar
nitroflare.com/view/C92E152B29BAD06/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part06.rar
nitroflare.com/view/4B571C000A86ED5/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part07.rar
nitroflare.com/view/CC76CD42976C389/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part08.rar
nitroflare.com/view/E4B52479CCD2500/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part09.rar
nitroflare.com/view/4ABC8FB09FF9131/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part10.rar
nitroflare.com/view/3E6631695D9644B/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part11.rar
nitroflare.com/view/61600C0FF7CB232/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part12.rar
nitroflare.com/view/00F92B3BCAE2FB8/UD-SC-100MicrosoftCybersecurityArchitectcoursewithsims08-2024.part13.rar

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.