Companies Home Search Profile

Microsoft Certified: Cybersecurity Architect Expert (SC-100) Online Training

Focused View

Bob Salmans

9:11:49

173 View
  • 1. Examining the Microsoft Cybersecurity Reference Architecture-1.mp4
    04:02
  • 2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
    11:58
  • 3. SaaS & Identity Protection - Microsoft Certified Cybersecuri.mp4
    06:29
  • 4. Endpoints and Devices - Microsoft Certified Cybersecurity Ar-1.mp4
    04:44
  • 5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
    16:31
  • 6. Information Protection - Microsoft Certified Cybersecurity A.mp4
    05:23
  • 7. IoT and Operational Technology (OT) - Microsoft Certified Cy-1.mp4
    03:52
  • 8. People Security - Microsoft Certified Cybersecurity Architec.mp4
    03:25
  • 9. Other Resources - Microsoft Certified Cybersecurity Architec.mp4
    09:15
  • 1. Guiding Principals of Zero Trust - Microsoft Certified Cyber.mp4
    07:52
  • 2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
    12:33
  • 3. Translating Business Goals into Security Requirements - Micr.mp4
    10:23
  • 4. Technical Solutions Basics - Microsoft Certified Cybersecuri.mp4
    04:15
  • 5. Azure Security Top 10 - Microsoft Certified Cybersecurity Ar.mp4
    08:29
  • 6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
    08:59
  • 7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
    04:09
  • 1. Designing Security for a Resiliency Strategy - Microsoft Cer.mp4
    10:10
  • 2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
    12:50
  • 3. Multi-tenant Environmental Security Strategies - Microsoft C.mp4
    05:30
  • 4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
    09:29
  • 5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
    13:07
  • 1. Security Operations Strategy Overview - Microsoft Certified .mp4
    08:13
  • 2. Frameworks, Processes, and Procedures - Microsoft Certified .mp4
    09:08
  • 3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
    08:06
  • 4. SecOps for a Hybrid or Multi-cloud Environment - Microsoft C-1.mp4
    02:48
  • 5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
    09:17
  • 6. Evaluating Security Workflows - Microsoft Certified Cybersec-1.mp4
    07:26
  • 7. Incident Management - Microsoft Certified Cybersecurity Arch.mp4
    04:02
  • 8. Strategy for Sharing Technical Threat Intelligence - Microso.mp4
    04:19
  • 1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
    11:24
  • 2. Identity Store Strategy - Microsoft Certified Cybersecurity .mp4
    05:44
  • 3. Authentication and Authorization Strategy - Microsoft Certif-1.mp4
    06:58
  • 4. Strategy for Conditional Access - Microsoft Certified Cybers.mp4
    07:47
  • 5. Role Assignment and Delegation - Microsoft Certified Cyberse-1.mp4
    07:11
  • 6. Privileged Role Access to Infrastructure - Microsoft Certifi-1.mp4
    07:09
  • 7. Strategy for Privileged Activities - Microsoft Certified Cyb.mp4
    07:34
  • 1. Translating Compliance Requirements - Microsoft Certified Cy-1.mp4
    10:00
  • 2. Compliance and Defender for Cloud - Microsoft Certified Cybe-1.mp4
    06:44
  • 3. Compliance Scores and Recommendations - Microsoft Certified -1.mp4
    06:34
  • 4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
    10:42
  • 5. Data Residency Requirements - Microsoft Certified Cybersecur.mp4
    05:19
  • 6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
    10:47
  • 1. Evaluating Security Postures by Using Benchmarks - Microsoft-1.mp4
    06:24
  • 2. Evaluating Security Postures by Using Defender for Cloud - M-1.mp4
    05:29
  • 3. Evaluate Security Posture of Cloud Workloads - Microsoft Cer-1.mp4
    05:32
  • 4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
    10:19
  • 5. Interpret Technical Threat Intelligence - Microsoft Certifie-1.mp4
    08:04
  • 6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
    12:21
  • 1. Security Baselines for Servers and Client Endpoints - Micros-1.mp4
    09:00
  • 2. Security Requirements for Servers - Microsoft Certified Cybe.mp4
    09:41
  • 3. Security Requirements for Mobile Devices and Clients - Micro.mp4
    09:48
  • 4. Requirements to Secure Active Directory Domain Services - Mi-1.mp4
    09:52
  • 5. Strategy to Manage Secrets, Keys, and Certificates - Microso-1.mp4
    10:36
  • 6. Strategy for Securing Remote Access - Microsoft Certified Cy.mp4
    06:37
  • 1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
    08:27
  • 2. Security Requirements for IoT Workloads - Microsoft Certifie.mp4
    07:07
  • 3. Security Requirements for Data Workloads - Microsoft Certifi-1.mp4
    09:12
  • 4. Security Requirements for Web Workloads - Microsoft Certifie.mp4
    05:52
  • 5. Security Requirements for Storage Workloads - Microsoft Cert-1.mp4
    08:08
  • 6. Security Requirements for Containers and Orchestration - Mic-1.mp4
    08:32
  • 1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
    13:24
  • 2. Onboarding New Applications - Microsoft Certified Cybersecur-1.mp4
    10:17
  • 3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
    10:00
  • 4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
    11:51
  • 5. Identify and Protect Sensitive Data - Microsoft Certified Cy.mp4
    08:57
  • 6. Encryption Standards for Data at Rest and In Motion - Micros-1.mp4
    10:29
  • 7. Azure Data Security and Encryption Best Practices - Microsof.mp4
    05:13
  • Description


    This intermediate SC-100 training prepares learners to design a large network's security architecture that protects its infrastructure, app, and data components, and is grounded in the Zero Trust strategy.

    According to Microsoft, an expert cybersecurity architect isn't just a technical master of the individual components, technology, and protocols involved. They're also a master of the soft skills involved with planning a network security posture. In order to earn Microsoft's certification for expert cybersecurity architects, you'll need to show you have the ability to design an enterprise network's security that doesn't just protect a business' network but also advances their business needs in the digital space.

    More details


    That's a big expectation, but this course is designed to help you practice the skills you’re expected to know for the SC-100, the exam that stands between you and the Cybersecurity Architect Expert.

    After completing this SC-100 training, you'll know how to design a large network's security architecture that protects its infrastructure, app, and data components, and is grounded in the Zero Trust strategy.

    For anyone who manages cybersecurity architecture training, this Azure training can be used to onboard new cybersecurity associates, curated into individual or team training plans, or as a Azure reference resource.

    SC-100: What You Need to Know

    This Cybersecurity Architect Expert training covers cybersecurity architecture topics including:

    • Designing security strategies and architecture grounded in the Zero-Trust strategy
    • Incorporating governance risk compliance strategies into network security
    • Recognizing the key differences between infrastructure and app security

    Who Should Take SC-100 Training?

    This Cybersecurity Architect Expert training is considered expert-level Azure training, which means it was designed for cybersecurity architects. This cybersecurity architecture skills course is designed for cybersecurity associates with three to five years of experience with cybersecurity architecture.

    New or aspiring cybersecurity associates. If you're a brand new cybersecurity employee, aiming to earn the Microsoft Certified: Cybersecurity Architect Expert is probably too steep a goal right now. But you can take this course and get the 30,000-foot view of what you need to think about when planning an enterprise network security posture and prepare your career around the skills necessary for that.

    Experienced cybersecurity associates. If you've been working in cybersecurity for several years already, this course and the Cybersecurity Architect Expert certification are good choices for leapfrogging ahead in the security world. You'll learn top-level skills that mesh with your technical expertise and prepare you for taking on leadership and management jobs.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 67
    • duration 9:11:49
    • Release Date 2023/03/25