This course is designed for students to prepare for the SC-100: Microsoft Cybersecurity Architect exam.
The various objectives and chapters that will be covered include
Design a Zero Trust strategy and architecture
This course is designed for students to prepare for the SC-100: Microsoft Cybersecurity Architect exam.
The various objectives and chapters that will be covered include
Design a Zero Trust strategy and architecture
In this section, we will first cover some basic theory when it comes to aspects like Zero trust, the Cloud Adoption Framework, some tools that can be used from a security perspective when it comes to Azure. Next we will focus on the Microsoft Sentinel tool. This is an important tool from an exam perspective. We will revisit aspects such as using Data connectors, creating alerts and incidents, and the automation process. The next aspect we need to touch upon is Azure Active Directory. We need to revisit important aspects such as Application Objects, Enterprise Applications, Conditional Access , Privileged Identity management etc.
Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
In this section, we need to cover important aspects when it comes to Microsoft Defender for Cloud. How we can use the tool to evaluate the security posture of our resources. And how we can use the various compliance policies available from within the tool. We also will have a touch base when it comes to working with Azure Blueprints as well.
Design security for infrastructure
In this section, we will learn aspects on how to secure our infrastructure. For example, how can we enhance security for services like Azure Web Apps, Azure SQL databases, Azure Storage Accounts etc.
Design a strategy for data and applications
In this section we have to look into aspects on how we can protect our data. How can we enable data at rest and in transit when it comes to services that store data.
This chapter looks into how we are approaching this course
This chapter looks into Zero Trust
This chapter looks into Security -Integration endpoints
This chapter looks into Cloud Adoption Framework
This chapter looks into Security Strategy
This chapter looks into Security Strategy-Hybrid Environments
This chapter looks into Security logging-tools
This chapter looks into Security logging-Our next steps
This chapter looks into Security logging - Building a simple infrastructure
This chapter looks into Microsoft Sentinel
This chapter looks into Lab-Microsoft Sentinel-Setup
This chapter looks into Lab-Microsoft Sentinel -Data connectors
This chapter looks into Lab-Microsoft Sentinel-Azure Activity
This chapter looks into Lab-Microsoft Sentinel-Generating Incidents
This chapter looks into Lab - Microsoft Sentinel - Generating Incidents - Resources
This chapter looks into Incidents
This chapter looks into Lab-Microsoft Sentinel-Virtual Machines -Incidents
This chapter looks into Lab - Microsoft Sentinel - Virtual Machines - Incidents - Resources
This chapter looks into Microsoft Sentinel -Workbooks
This chapter looks into Microsoft Sentinel-Automation
This chapter looks into Microsoft Sentinel - Note on threat protection
This chapter looks into NSG Flow logs
This chapter looks into Our next focus-Azure Active Directory
This chapter is a Review on Role-based access control
This chapter looks into Identity Governance - Entitlement Management
This chapter is a Review of Application Objects
This chapter looks into Example on using Application Objects
This chapter looks into Installing the Postman tool
This chapter looks into another example on Application Objects
This chapter looks into Installing Visual Studio 2022
This chapter looks into Enterprise Applications
This chapter looks into Example on Enterprise Applications
This chapter reviews-Azure AD Identity Protection
This chapter Reviews-Conditional Access Policies
This chapter looks into Hybrid Identities -Azure AD Connect
This chapter Reviews -Azure AD Privileged Identity Management
This chapter looks into Azure B2B
This chapter looks into Azure B2C
This chapter looks into-Which service to choose
This chapter looks into Azure AD Logs
This chapter is a Quick note before moving along
This is a short quiz based on the concepts discussed in this section
This chapter looks into Compliance of your resources
This chapter is a Review of Azure Policy service
This chapter is a Introduction to Microsoft Defender for Cloud
This chapter looks into Microsoft Defender for Cloud -Initial Look
This chapter looks into Azure Security Benchmark
This chapter looks into Microsoft Defender for Cloud-Servers
This chapter looks into Microsoft Defender for Cloud -Secure Management Ports
This chapter looks into Microsoft Defender for Cloud-Workload Protection features
This chapter looks into Microsoft Defender for Cloud -Workflow Automation
This chapter looks into Microsoft Defender for Cloud - Vulnerability assessment
This chapter looks into Management Ports update
This chapter looks into Microsoft Defender for Cloud - Regulatory compliance
This chapter looks into Microsoft Defender for Cloud - Remediations
This chapter looks into Microsoft Defender for Cloud-AWS resources
This chapter is a Quick note on other AWS aspects
This chapter looks into Azure Landing zones
This chapter looks into Azure Blueprints
This chapter is a Example on using Azure Blueprints
This chapter is a Example on using Azure Blueprints - Resources
This chapter looks into the topics we are going to cover
This chapter looks into quick overview of the services
This chapter looks into Azure Storage Accounts
This chapter looks into Azure Storage Accounts Authorization-Access keys
This chapter looks into Azure Storage Accounts Authorization-Shared Access Signature
This chapter looks into Azure Storage Accounts- Azure AD Authorization
This chapter looks into Azure Storage Accounts -Firewalls
This chapter looks into Azure Storage Account -Service Endpoint
This chapter looks into Azure Storage Accounts -Deny use of Access keys
This chapter looks into Azure Storage Accounts -Azure policy use case
This chapter looks into creating an Azure SQL database
This chapter looks into Azure SQL Database -Auditing
This chapter looks into Azure SQL Database -Log output
This chapter looks into Using the Azure Bastion Service
This chapter looks into Azure Bastion-Creating the environment
This chapter looks into Azure Bastion Service
This chapter looks into Azure Web apps -Enabling Diagnostics
This chapter looks into Azure Web Apps -Diagnostics results
This chapter looks into Azure Web Apps -Virtual Network Integration
This chapter looks Lab- Creating an Azure Cosmos DB Account
This chapter looks into Example of an application connecting to Azure Cosmos DB
This chapter looks into Storing Azure Cosmos DB keys
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.