% Off Udemy Coupon - CoursesWyn

SC-100: Microsoft Cybersecurity Architect Expert

Pass SC-100 | Elevate your Career

$9.99 (92% OFF)
Get Course Now

About This Course

<div>This course contains the use of artificial intelligence.</div><div><br></div><div>This <u><b>SC-100 course by Christopher Nett</b></u> is a meticulously organized Udemy course designed for IT professionals aiming to pass the Microsoft SC-100: Microsoft Cybersecurity Architect Expert exam. This course systematically guides you from the basis to advanced concepts of Cyber Security.</div><div><br></div><div>By mastering Microsoft Cybersecurity Architectures, you're developing expertise in essential topics in today's cybersecurity landscape.</div><div><br></div><div>The course is always aligned with Microsoft's latest study guide and exam objectives:</div><div><br></div><div>Skills at a glance</div><div><ul><li><span style="font-size: 1rem;">Design solutions that align with security best practices and priorities (20–25%)</span></li><li><span style="font-size: 1rem;">Design security operations, identity, and compliance capabilities (25–30%)</span></li><li><span style="font-size: 1rem;">Design security solutions for infrastructure (25–30%)</span></li><li><span style="font-size: 1rem;">Design security solutions for applications and data (20–25%)</span></li></ul><span style="font-size: 1rem;">Design solutions that align with security best practices and priorities (20–25%)</span></div><div><br></div><div>Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices</div><div><ul><li><span style="font-size: 1rem;">Design a security strategy to support business resiliency goals, including identifying and prioritizing threats to business-critical assets</span></li><li><span style="font-size: 1rem;">Design solutions for business continuity and disaster recovery (BCDR), including secure backup and restore for hybrid and multicloud environments</span></li><li><span style="font-size: 1rem;">Design solutions for mitigating ransomware attacks, including prioritization of BCDR and privileged access</span></li><li><span style="font-size: 1rem;">Evaluate solutions for security updates</span></li></ul></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">Design solutions that align with the Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft cloud security benchmark (MCSB)</span></div><div><ul><li><span style="font-size: 1rem;">Design solutions that align with best practices for cybersecurity capabilities and controls</span></li><li><span style="font-size: 1rem;">Design solutions that align with best practices for protecting against insider, external, and supply chain attacks</span></li><li><span style="font-size: 1rem;">Design solutions that align with best practices for Zero Trust security, including the Zero Trust Rapid Modernization Plan (RaMP)</span></li></ul></div><div><br></div><div>Design solutions that align with the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework</div><div><br></div><div>Design a new or evaluate an existing strategy for security and governance based on the Microsoft Cloud Adoption Framework (CAF) for Azure and the Microsoft Azure Well-Architected Framework</div><div><ul><li><span style="font-size: 1rem;">Recommend solutions for security and governance based on the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework</span></li><li><span style="font-size: 1rem;">Design solutions for implementing and governing security by using Azure landing zones</span></li><li><span style="font-size: 1rem;">Design a DevSecOps process that aligns with best practices in the Microsoft Cloud Adoption Framework (CAF)</span></li><li><span style="font-size: 1rem;">Design security operations, identity, and compliance capabilities (25–30%)</span></li></ul></div><div><br></div><div>Design solutions for security operations</div><div><ul><li><span style="font-size: 1rem;">Design a solution for detection and response that includes extended detection and response (XDR) and security information and event management (SIEM)</span></li><li><span style="font-size: 1rem;">Design a solution for centralized logging and auditing, including Microsoft Purview Audit</span></li><li><span style="font-size: 1rem;">Design monitoring to support hybrid and multicloud environments</span></li><li><span style="font-size: 1rem;">Design a solution for security orchestration automated response (SOAR), including Microsoft Sentinel and Microsoft Defender XDR</span></li><li><span style="font-size: 1rem;">Design and evaluate security workflows, including incident response, threat hunting, and incident management</span></li><li><span style="font-size: 1rem;">Design and evaluate threat detection coverage by using MITRE ATT&amp;CK matrices, including Cloud, Enterprise, Mobile, and ICS</span></li></ul></div><div><br></div><div>Design solutions for identity and access management</div><div><ul><li><span style="font-size: 1rem;">Design a solution for access to software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), hybrid/on-premises, and multicloud resources, including identity, networking, and application controls</span></li><li><span style="font-size: 1rem;">Design a solution for Microsoft Entra ID, including hybrid and multi-cloud environments</span></li><li><span style="font-size: 1rem;">Design a solution for external identities, including business-to-business (B2B), business-to-customer (B2C), and decentralized identity</span></li><li><span style="font-size: 1rem;">Design a modern authentication and authorization strategy, including Conditional Access, continuous access evaluation, risk scoring, and protected actions</span></li><li><span style="font-size: 1rem;">Validate the alignment of Conditional Access policies with a Zero Trust strategy</span></li><li><span style="font-size: 1rem;">Specify requirements to harden Active Directory Domain Services (AD DS)</span></li><li><span style="font-size: 1rem;">Design a solution to manage secrets, keys, and certificates</span></li></ul></div><div><br></div><div>Design solutions for securing privileged access</div><div><ul><li><span style="font-size: 1rem;">Design a solution for assigning and delegating privileged roles by using the enterprise access model</span></li><li><span style="font-size: 1rem;">Evaluate the security and governance of Microsoft Entra ID, including Microsoft Entra Privileged Identity Management (PIM), entitlement management, and access reviews</span></li><li><span style="font-size: 1rem;">Evaluate the security and governance of on-premises Active Directory Domain Services (AD DS), including resilience to common attacks</span></li><li><span style="font-size: 1rem;">Design a solution for securing the administration of cloud tenants, including SaaS and multicloud infrastructure and platforms</span></li><li><span style="font-size: 1rem;">Design a solution for cloud infrastructure entitlement management that includes Microsoft Entra Permissions Management</span></li><li><span style="font-size: 1rem;">Evaluate an access review management solution that includes Microsoft Entra Permissions Management</span></li><li><span style="font-size: 1rem;">Design a solution for Privileged Access Workstation (PAW), including remote access</span></li></ul></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">Design solutions for regulatory compliance</span></div><div><ul><li><span style="font-size: 1rem;">Translate compliance requirements into security controls</span></li><li><span style="font-size: 1rem;">Design a solution to address compliance requirements by using Microsoft Purview</span></li><li><span style="font-size: 1rem;">Design a solution to address privacy requirements, including Microsoft Priva</span></li><li><span style="font-size: 1rem;">Design Azure Policy solutions to address security and compliance requirements</span></li><li><span style="font-size: 1rem;">Evaluate and validate alignment with regulatory standards and benchmarks by using Microsoft Defender for Cloud</span></li></ul></div><div><br></div><div>Design security solutions for infrastructure (25–30%)</div><div><br></div><div>Design solutions for security posture management in hybrid and multicloud environments</div><div><ul><li><span style="font-size: 1rem;">Evaluate security posture by using Microsoft Defender for Cloud, including the Microsoft cloud security benchmark (MCSB)</span></li><li><span style="font-size: 1rem;">Evaluate security posture by using Microsoft Secure Score</span></li><li><span style="font-size: 1rem;">Design integrated security posture management solutions that include Microsoft Defender for Cloud in hybrid and multi-cloud environments</span></li><li><span style="font-size: 1rem;">Select cloud workload protection solutions in Microsoft Defender for Cloud</span></li><li><span style="font-size: 1rem;">Design a solution for integrating hybrid and multicloud environments by using Azure Arc</span></li><li><span style="font-size: 1rem;">Design a solution for Microsoft Defender External Attack Surface Management (Defender EASM)</span></li><li><span style="font-size: 1rem;">Specify requirements and priorities for a posture management process that uses Exposure Management attack paths, attack surface reduction, security insights, and initiatives</span></li></ul></div><div><br></div><div>Specify requirements for securing server and client endpoints</div><div><ul><li><span style="font-size: 1rem;">Specify security requirements for servers, including multiple platforms and operating systems</span></li><li><span style="font-size: 1rem;">Specify security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration</span></li><li><span style="font-size: 1rem;">Specify security requirements for IoT devices and embedded systems</span></li><li><span style="font-size: 1rem;">Evaluate solutions for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT</span></li><li><span style="font-size: 1rem;">Specify security baselines for server and client endpoints</span></li><li><span style="font-size: 1rem;">Evaluate Windows Local Admin Password Solution (LAPS) solutions</span></li></ul></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">Specify requirements for securing SaaS, PaaS, and IaaS services</span></div><div><ul><li><span style="font-size: 1rem;">Specify security baselines for SaaS, PaaS, and IaaS services</span></li><li><span style="font-size: 1rem;">Specify security requirements for IoT workloads</span></li><li><span style="font-size: 1rem;">Specify security requirements for web workloads</span></li><li><span style="font-size: 1rem;">Specify security requirements for containers</span></li><li><span style="font-size: 1rem;">Specify security requirements for container orchestration</span></li><li><span style="font-size: 1rem;">Evaluate solutions that include Azure AI Services Security</span></li></ul></div><div><span style="font-size: 1rem;">Evaluate solutions for network security and Security Service Edge (SSE)</span></div><div><ul><li><span style="font-size: 1rem;">Evaluate network designs to align with security requirements and best practices</span></li><li><span style="font-size: 1rem;">Evaluate solutions that use Microsoft Entra Internet Access as a secure web gateway</span></li><li><span style="font-size: 1rem;">Evaluate solutions that use Microsoft Entra Internet Access to access Microsoft 365, including cross-tenant configurations</span></li><li><span style="font-size: 1rem;">Evaluate solutions that use Microsoft Entra Private Access</span></li></ul></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">Design security solutions for applications and data (20–25%)</span></div><div><span style="font-size: 1rem;">Evaluate solutions for securing Microsoft 365</span></div><div><ul><li><span style="font-size: 1rem;">Evaluate security posture for productivity and collaboration workloads by using metrics, including Microsoft Secure Score</span></li><li><span style="font-size: 1rem;">Evaluate solutions that include Microsoft Defender for Office and Microsoft Defender for Cloud Apps</span></li><li><span style="font-size: 1rem;">Evaluate device management solutions that include Microsoft Intune</span></li><li><span style="font-size: 1rem;">Evaluate solutions for securing data in Microsoft 365 by using Microsoft Purview</span></li><li><span style="font-size: 1rem;">Evaluate data security and compliance controls in Microsoft Copilot for Microsoft 365 services</span></li></ul></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">Design solutions for securing applications</span></div><div><ul><li><span style="font-size: 1rem;">Evaluate the security posture of existing application portfolios</span></li><li><span style="font-size: 1rem;">Evaluate threats to business-critical applications by using threat modeling</span></li><li><span style="font-size: 1rem;">Design and implement a full lifecycle strategy for application security</span></li><li><span style="font-size: 1rem;">Design and implement standards and practices for securing the application development process</span></li><li><span style="font-size: 1rem;">Map technologies to application security requirements</span></li><li><span style="font-size: 1rem;">Design a solution for workload identity to authenticate and access Azure cloud resources</span></li><li><span style="font-size: 1rem;">Design a solution for API management and security</span></li><li><span style="font-size: 1rem;">Design solutions that secure applications by using Azure Web Application Firewall (WAF)</span></li></ul></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">Design solutions for securing an organization's data</span></div><div><ul><li><span style="font-size: 1rem;">Evaluate solutions for data discovery and classification</span></li><li><span style="font-size: 1rem;">Specify priorities for mitigating threats to data</span></li><li><span style="font-size: 1rem;">Evaluate solutions for encryption of data at rest and in transit, including Azure KeyVault and infrastructure encryption</span></li><li><span style="font-size: 1rem;">Design a security solution for data in Azure workloads, including Azure SQL, Azure Synapse Analytics, and Azure Cosmos DB</span></li><li><span style="font-size: 1rem;">Design a security solution for data in Azure Storage</span></li><li><span style="font-size: 1rem;">Design a security solution that includes Microsoft Defender for Storage and Microsoft Defender for Databases</span></li></ul></div><div><span style="font-size: 1rem;">This course contains promotional materials.</span></div>

What you'll learn:

  • Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
  • Design solutions that align with the Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft cloud security benchmark (MCSB)
  • Design solutions that align with the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework
  • Design solutions for security operations
  • Design solutions for identity and access management
  • Design solutions for securing privileged access
  • Design solutions for regulatory compliance
  • Design solutions for security posture management in hybrid and multicloud environments
  • Specify requirements for securing server and client endpoints
  • Specify requirements for securing SaaS, PaaS, and IaaS services
  • Evaluate solutions for network security and Security Service Edge (SSE)
  • Evaluate solutions for securing Microsoft 365
  • Design solutions for securing applications
  • Design solutions for securing an organization's data