01 - Exam SC-100 Microsoft Cybersecurity Architect.mp4
01:57
02 - Module introduction Design a Zero Trust strategy and architecture.mp4
00:55
03 - Learning objectives.mp4
01:01
04 - Identify cybersecutiy integration points.mp4
04:19
05 - Translate business goals to security.mp4
01:37
06 - Translate security requirements.mp4
02:36
07 - Design security with resiliency.mp4
01:50
08 - Hybrid security strategies.mp4
00:55
09 - Traffic filtering and segmentation.mp4
01:04
10 - Learning objectives.mp4
00:42
11 - Designing a logging and auditing strategy.mp4
01:15
12 - Security operation considerations.mp4
01:51
13 - Design a SIEM and SOAR strategy.mp4
01:30
14 - Evaluate security workflows.mp4
01:08
15 - Evaluate incident management.mp4
01:22
16 - Evaluate technical threat intelligence.mp4
00:54
17 - Learning objectives.mp4
00:39
18 - Design a resource access strategy.mp4
01:27
19 - Recommend an identity store.mp4
00:59
20 - Recommend an authentication strategy.mp4
01:21
21 - Recommend an authorization strategy.mp4
00:52
22 - Design for conditional access.mp4
01:19
23 - Design role assignments.mp4
01:49
24 - Design privilege activity strategy.mp4
01:05
25 - Module introduction Evaluate governance risk compliance (GRC) technical strategies and secur.mp4
00:49
26 - Learning objectives.mp4
01:00
27 - Interpret compliance requirements.mp4
01:05
28 - Interpret compliance scores.mp4
02:50
29 - Evaluate infrastructure compliance.mp4
04:35
30 - Design an Azure Policy configuration.mp4
05:21
31 - Design for data residency.mp4
00:53
32 - Translate privacy into security.mp4
02:55
33 - Learning objectives.mp4
00:43
34 - Evaluate security using benchmarks.mp4
01:01
35 - Evaluate security using Defender.mp4
02:36
36 - Evaluate security using Secure Score.mp4
00:41
37 - Evaluate security of cloud workloads.mp4
00:57
38 - Design security with landing zones.mp4
01:53
39 - Interpret threat intelligence.mp4
00:35
40 - Mitigate identified risks.mp4
01:08
41 - Module introduction Design security for infrastructure.mp4
00:50
42 - Learning objectives.mp4
00:46
43 - Specify security baselines for endpoints.mp4
03:27
44 - Specify security requirements for servers.mp4
01:12
45 - Specify security requirements for mobile devices.mp4
04:50
46 - Specify requirements to secure AD DS.mp4
01:03
47 - Design a strategy to manage secrets.mp4
04:48
48 - Design a strategy for secure remote access.mp4
01:17
49 - Learning objectives.mp4
00:33
50 - Specify security baselines for IaaS.mp4
00:57
51 - Specify security baselines for PaaS.mp4
00:45
52 - Specify security baselines for SaaS.mp4
00:34
53 - Specify security baselines for IoT.mp4
01:05
54 - Specify security requirements for data workloads.mp4
04:22
55 - Specify security requirements for web workloads.mp4
00:54
56 - Specify security requirements for storage.mp4
02:42
57 - Specify security requirements for containers.mp4
00:40
58 - Specify security requirements for container orchestration.mp4
00:32
59 - Module introduction Design a strategy for data and application.mp4
00:37
60 - Learning objectives.mp4
00:28
61 - Specify priorities for mitigating threats to apps.mp4
00:46
62 - Specify a security standard for onboarding new apps.mp4
01:38
63 - Specify a security strategy for apps and APIs.mp4
01:21
64 - Learning objectives.mp4
00:32
65 - Specify priorities for mitigating threats to data.mp4
00:56
66 - Design a strategy to identify and protect sensitive data.mp4
00:49
67 - Specify an encryption standard for data.mp4
00:40
68 - Exam SC-100 Microsoft Cybersecurity Architect.mp4
01:17