Companies Home Search Profile

Microsoft Certified: Cybersecurity Architect Expert (SC-100) Online Training

Focused View

Bob Salmans

9:11:49

136 View
  • 1 Intro to the Microsoft Cybersecurity Reference Architecture (MCRA).mp4
    04:02
  • 2 Security Operations.mp4
    11:58
  • 3 SaaS & Identity Protection.mp4
    06:29
  • 4 Endpoints and Devices.mp4
    04:44
  • 5 Hybrid Infrastructure.mp4
    16:31
  • 6 Information Protection.mp4
    05:23
  • 7 IoT and Operational Technology (OT).mp4
    03:52
  • 8 People Security.mp4
    03:25
  • 9 Other Resources.mp4
    09:15
  • 10 Guiding Principals of Zero Trust.mp4
    07:52
  • 11 Translating Requirements.mp4
    12:33
  • 12 Translating Business Goals into Security Requirements.mp4
    10:23
  • 13 Technical Solutions Basics.mp4
    04:15
  • 14 Azure Security Top 10.mp4
    08:29
  • 15 Azure Security Benchmark.mp4
    08:59
  • 16 Securing Privileged Access Using RaMP.mp4
    04:09
  • 17 Designing Security for a Resiliency Strategy.mp4
    10:10
  • 18 Hybrid Environmental Security Strategies.mp4
    12:50
  • 19 Multi-tenant Environmental Security Strategies.mp4
    05:30
  • 20 Traffic Filtering and Segmentation Strategies.mp4
    09:29
  • 21 Azure Best Practices for Network Security.mp4
    13:07
  • 22 Security Operations Strategy Overview.mp4
    08:13
  • 23 Frameworks, Processes, and Procedures.mp4
    09:08
  • 24 Logging and Auditing Strategy.mp4
    08:06
  • 25 SecOps for a Hybrid or Multi-cloud Environment.mp4
    02:48
  • 26 SIEM-SOAR Strategy.mp4
    09:17
  • 27 Evaluating Security Workflows.mp4
    07:26
  • 28 Incident Management.mp4
    04:02
  • 29 Strategy for Sharing Technical Threat Intelligence.mp4
    04:19
  • 30 Strategy for Access to Cloud Resources.mp4
    11:24
  • 31 Identity Store Strategy.mp4
    05:44
  • 32 Authentication and Authorization Strategy.mp4
    06:58
  • 33 Strategy for Conditional Access.mp4
    07:47
  • 34 Role Assignment and Delegation.mp4
    07:11
  • 35 Privileged Role Access to Infrastructure.mp4
    07:09
  • 36 Strategy for Privileged Activities.mp4
    07:34
  • 37 Translating Compliance Requirements.mp4
    10:00
  • 38 Compliance and Defender for Cloud.mp4
    06:44
  • 39 Compliance Scores and Recommendations.mp4
    06:34
  • 40 Implementing Azure Policy.mp4
    10:42
  • 41 Data Residency Requirements.mp4
    05:19
  • 42 Translating Privacy Requirements.mp4
    10:47
  • 43 Evaluating Security Postures by Using Benchmarks.mp4
    06:24
  • 44 Evaluating Security Postures by Using Defender for Cloud.mp4
    05:29
  • 45 Evaluate Security Posture of Cloud Workloads.mp4
    05:32
  • 46 Designing Security for an Azure Landing Zone.mp4
    10:19
  • 47 Interpret Technical Threat Intelligence.mp4
    08:04
  • 48 Mitigating Identified Risks.mp4
    12:21
  • 49 Security Baselines for Servers and Client Endpoints.mp4
    09:00
  • 50 Security Requirements for Servers.mp4
    09:41
  • 51 Security Requirements for Mobile Devices and Clients.mp4
    09:48
  • 52 Requirements to Secure Active Directory Domain Services.mp4
    09:52
  • 53 Strategy to Manage Secrets, Keys, and Certificates.mp4
    10:36
  • 54 Strategy for Securing Remote Access.mp4
    06:37
  • 55 Security Baselines for SaaS, PaaS, and IaaS services .mp4
    08:27
  • 56 Security Requirements for IoT Workloads.mp4
    07:07
  • 57 Security Requirements for Data Workloads.mp4
    09:12
  • 58 Security Requirements for Web Workloads.mp4
    05:52
  • 59 Security Requirements for Storage Workloads.mp4
    08:08
  • 60 Security Requirements for Containers and Orchestration.mp4
    08:32
  • 61 Specify Priorities for Mitigating Threats to Apps.mp4
    13:24
  • 62 Onboarding New Applications.mp4
    10:17
  • 63 Security Strategy for Applications and APIs.mp4
    10:00
  • 64 Priorities For Mitigating Threats To Data.mp4
    11:51
  • 65 Identify and Protect Sensitive Data.mp4
    08:57
  • 66 Encryption Standards for Data at Rest and In Motion.mp4
    10:29
  • 67 Azure Data Security and Encryption Best Practices.mp4
    05:13
  • More details


    This intermediate SC-100 training prepares learners to design a large network's security architecture that protects its infrastructure, app, and data components, and is grounded in the Zero Trust strategy.

    According to Microsoft, an expert cybersecurity architect isn't just a technical master of the individual components, technology, and protocols involved. They're also a master of the soft skills involved with planning a network security posture. In order to earn Microsoft's certification for expert cybersecurity architects, you'll need to show you have the ability to design an enterprise network's security that doesn't just protect a business' network but also advances their business needs in the digital space.

    That's a big expectation, but this course is designed to help you practice the skills you’re expected to know for the SC-100, the exam that stands between you and the Cybersecurity Architect Expert.

    After completing this SC-100 training, you'll know how to design a large network's security architecture that protects its infrastructure, app, and data components, and is grounded in the Zero Trust strategy.

    For anyone who manages cybersecurity architecture training, this Azure training can be used to onboard new cybersecurity associates, curated into individual or team training plans, or as a Azure reference resource.

    SC-100: What You Need to Know

    This Cybersecurity Architect Expert training covers cybersecurity architecture topics including:

    • Designing security strategies and architecture grounded in the Zero-Trust strategy
    • Incorporating governance risk compliance strategies into network security
    • Recognizing the key differences between infrastructure and app security

    Who Should Take SC-100 Training?

    This Cybersecurity Architect Expert training is considered expert-level Azure training, which means it was designed for cybersecurity architects. This cybersecurity architecture skills course is designed for cybersecurity associates with three to five years of experience with cybersecurity architecture.

    New or aspiring cybersecurity associates. If you're a brand new cybersecurity employee, aiming to earn the Microsoft Certified: Cybersecurity Architect Expert is probably too steep a goal right now. But you can take this course and get the 30,000-foot view of what you need to think about when planning an enterprise network security posture and prepare your career around the skills necessary for that.

    Experienced cybersecurity associates. If you've been working in cybersecurity for several years already, this course and the Cybersecurity Architect Expert certification are good choices for leapfrogging ahead in the security world. You'll learn top-level skills that mesh with your technical expertise and prepare you for taking on leadership and management jobs.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 67
    • duration 9:11:49
    • English subtitles has
    • Release Date 2023/09/30

    Courses related to Cyber Security

    Courses related to Network Security

    L3VPN on JunOS
    Orhan ErgunL3VPN on JunOS
    4:54:25
    04/27/2023
    Subtitle
    Automating Threat Response with Microsoft Sentinel
    Subtitle
    Wireless Security in Mobile Communication Networks
    UdemyWireless Security in Mobile Communication Networks
    15:46:12
    English subtitles
    02/01/2024

    Courses related to Information Security

    Courses related to Cyber Security Awareness