Companies Home Search Profile

Microsoft Cybersecurity Architect - SC-100 Exam Prep

Focused View

Anand Rao Nednur

10:00:08

87 View
  • 1 - SC 100 Microsoft Cybersecurity Architect Course trailer.mp4
    00:59
  • 2 - Chapter 1 The role of a security Architect.mp4
    01:31
  • 3 - Zero Trust Overview.mp4
    01:44
  • 4 - Guiding principles of zero trust.mp4
    02:54
  • 5 - Pillars of Zero Trust.mp4
    06:39
  • 6 - MCRA Identity.mp4
    03:51
  • 7 - MCRA SOC Tools.mp4
    03:06
  • 8 - MCRA Endpoint Security.mp4
    05:08
  • 9 - MCRA Hybrid Computing.mp4
    07:21
  • 10 - MCRA Information Protection.mp4
    04:06
  • 11 - MCRA People Security.mp4
    06:58
  • 12 - MCRA IoT and IT Security II.mp4
    07:39
  • 13 - CAF Introduction.mp4
    02:21
  • 14 - CAF strategy.mp4
    05:57
  • 15 - CAF Planning.mp4
    04:59
  • 16 - CAF Readyness Azure setup guide.mp4
    11:11
  • 17 - CAF Readyness Azure Landing Zone.mp4
    09:17
  • 18 - CAF Landing Zone Deployment Lab Step By StepI.mp4
    05:31
  • 19 - CAF Landing Zone Deployment Lab Step By StepII.mp4
    26:55
  • 20 - CAF Adopt Phase.mp4
    02:17
  • 21 - CAF Governance.mp4
    13:18
  • 22 - IT Transformations Gap analysis.mp4
    03:47
  • 23 - Security transformations.mp4
    07:51
  • 24 - Design Security for resiliency strategy.mp4
    04:05
  • 25 - The reliability Pillar.mp4
    04:06
  • 26 - SC 100 Case study overview.mp4
    02:25
  • 27 - SC 100 Case Study.mp4
    12:05
  • 28 - Reviews.mp4
    00:53
  • 29 - Chapter 2 Design a security options strategy overview.mp4
    01:26
  • 30 - Security operations strategy overview.mp4
    03:03
  • 31 - Security operations frameworks processes and procedures.mp4
    03:32
  • 32 - SecOps and the Leadership.mp4
    03:58
  • 33 - People and Processes.mp4
    04:42
  • 34 - Metrics and Its importance in SOC.mp4
    03:32
  • 35 - Recommendations for Designing a logging and auditing security strategy.mp4
    06:26
  • 36 - Cyber Kill Chain An overview.mp4
    03:49
  • 37 - Focus areas for SOC in hybrid computing.mp4
    01:52
  • 38 - Unified operations in Hybrid clouds.mp4
    05:06
  • 39 - Tiers in SecOps.mp4
    03:47
  • 40 - Azure Tools for SecOps.mp4
    06:10
  • 41 - SecOps Best practices for SIEM SOAR.mp4
    09:22
  • 42 - SecOPs Best Practices for Network and Azure AD Monitoring.mp4
    04:04
  • 43 - Incident Response Best Practices.mp4
    02:27
  • 44 - Recovery Best Practices.mp4
    03:03
  • 45 - Workflow Automation.mp4
    03:03
  • 46 - Workflow Automation Lab.mp4
    04:28
  • 47 - Workflow Automation Logic apps integration Lab.mp4
    07:22
  • 48 - Incident Management process Overview.mp4
    05:52
  • 49 - Incident Management process Preparation.mp4
    02:46
  • 50 - Incident Management Process Detection and Analysis.mp4
    01:37
  • 51 - Incident Management Process Containment Eradication and recovery.mp4
    03:32
  • 52 - Incident Management Process Post Incident Activity.mp4
    02:27
  • 53 - Threat Intelligence and SOC.mp4
    03:49
  • 54 - Threat intelligence in Sentinel.mp4
    01:52
  • 55 - Threat intelligence in Defender for Endpoint.mp4
    05:08
  • 56 - Threat Intelligence for IOT.mp4
    02:13
  • 57 - Threat Intelligence in Defender for Cloud.mp4
    02:07
  • 58 - Chapter2 Case Study.mp4
    08:47
  • 59 - Chapter 3 Identity Security Strategy Introduction.mp4
    01:09
  • 60 - Identity Security Strategy Overview.mp4
    02:29
  • 61 - Evolution of Identity Technology.mp4
    02:51
  • 62 - Microsoft Identity Store Overview.mp4
    05:31
  • 63 - Identity Challenges.mp4
    01:56
  • 64 - Identity Governance Overview.mp4
    04:21
  • 65 - Identity is the new control plane.mp4
    02:45
  • 66 - Zero Trust Concepts and Principles.mp4
    02:43
  • 67 - Zero Trust Components.mp4
    04:27
  • 68 - Planning a Zero Trust Strategy.mp4
    03:28
  • 69 - Zero Trust Model Introduction.mp4
    01:07
  • 70 - Enabling Zero Trust ModelII.mp4
    10:36
  • 71 - Enabling Zero Trust ModelIII.mp4
    04:01
  • 72 - Zero trust Security strategy for Identities.mp4
    07:09
  • 73 - Conditional Access support for Zero Trust Architecture.mp4
    03:23
  • 74 - Conditional Access Personas.mp4
    06:01
  • 75 - Secure Authentication Methods.mp4
    01:36
  • 76 - Secure Authentication Methods II.mp4
    01:35
  • 77 - Password hash Sync PHS.mp4
    08:39
  • 78 - Pass Through Authentication PTA.mp4
    09:52
  • 79 - Azure AD Roles Best Practices.mp4
    06:17
  • 80 - Design a Security Strategy for Privileged Role Access.mp4
    02:21
  • 81 - Develop a Roadmap.mp4
    02:09
  • 82 - Develop a Roadmap Explained.mp4
    05:33
  • 83 - Design a security strategy for privileged activities.mp4
    04:35
  • 84 - Rapid Modernization Plan RAMP.mp4
    04:21
  • 85 - Execute Critical strategic initiatives for Privileged Activity Management.mp4
    02:10
  • 86 - Chapter Case Study 01.mp4
    08:05
  • 86 - case study url reference.zip
  • 87 - Chapter Case Study 02.mp4
    05:08
  • 87 - case study url reference.zip
  • 88 - Evaluate Regulatory Compliance Introduction.mp4
    01:18
  • 89 - Interpret Compliance Requirements.mp4
    02:53
  • 90 - Compliance Offerings.mp4
    06:10
  • 91 - Evaluate infra compliance using defender for cloud.mp4
    03:45
  • 92 - Design for data residency requirements.mp4
    05:02
  • 93 - Encryption Support for various services.mp4
    06:25
  • 94 - Chapter 1 Case Study.mp4
    07:29
  • 95 - Chapter 2 Evaluate Security postures Chapter Introduction.mp4
    01:00
  • 96 - what is security posture.mp4
    03:04
  • 97 - Azure Security Benchmark.mp4
    02:21
  • 98 - Miter attack and Microsoft Defender for cloud.mp4
    03:44
  • 99 - Security Hygiene for Cloud workloads.mp4
    05:57
  • 100 - Security and policy options in Azure Landing zone.mp4
    02:37
  • 101 - Chapter 2 Case Study.mp4
    11:35
  • 102 - Chapter 1 Introduction.mp4
    01:14
  • 103 - Plan and Implement a security strategy across teams.mp4
    07:22
  • 104 - Security Role and Responsibilities.mp4
    04:59
  • 105 - Building the cloud security strategy document considerations.mp4
    05:41
  • 106 - Security strategy document deliverables.mp4
    02:41
  • 107 - Security Strategy document Best Practices.mp4
    04:28
  • 108 - Continuous evolution of security strategy Deliverables.mp4
    03:13
  • 109 - Best Practices for Security Planning.mp4
    03:55
  • 110 - Establishing Essential security practices.mp4
    02:28
  • 111 - Security Management strategy.mp4
    01:53
  • 112 - Continuous Assessment.mp4
    03:08
  • 113 - Chapter 1 case study.mp4
    04:07
  • 114 - Chapter 2 Introduction.mp4
    00:54
  • 115 - What is a Security Baseline.mp4
    02:02
  • 116 - Security Baseline Principles.mp4
    04:31
  • 117 - Security Requirement for servers.mp4
    03:11
  • 118 - Securing Member Servers.mp4
    05:43
  • 119 - Azure Security Benchmarks.mp4
    06:17
  • 120 - Securing Mobile devices.mp4
    02:41
  • 121 - Application Control.mp4
    02:11
  • 122 - Device Settings using Intune.mp4
    03:07
  • 123 - Other requirements for clients and endpoints.mp4
    01:46
  • 124 - Securing Domain Controllers.mp4
    05:54
  • 125 - Securing DCs from Attacks.mp4
    04:14
  • 126 - Key Vault Fundamentals.mp4
    03:34
  • 127 - Managing access to secrets.mp4
    03:56
  • 128 - Securing remote access.mp4
    03:50
  • 129 - Security Ops Best Practices.mp4
    02:58
  • 130 - Importance of Interactions with Business leaders.mp4
    03:39
  • 131 - Hiring right people with right mindset.mp4
    02:18
  • 132 - Metrics linked to SOC team.mp4
    03:13
  • 133 - Forensic Procedures and Endpoint Forensics.mp4
    04:32
  • 134 - Chapter 2 Case Study.mp4
    04:34
  • Description


    Exactly What you need to become Microsoft Certified CyberSecurity Architect - Clear and Concise

    What You'll Learn?


    • Prepare for SC-100 Microsoft Cybersecurity Architect Certification
    • Understand the cyber security ecosystem in Microsoft cloud
    • Identify and manage risks using Microsoft security tools
    • Importance of people, process & technologies and how they relate to business
    • Understand Cyber security best practices and how they are changing with the cloud
    • Design Security strategy for IaaS, PaaS and SaaS services
    • Design a Zero Trust Strategy and architecture
    • Evaluate Governance Risk Compliance Strategies

    Who is this for?


  • This course is designed for those students who want to take the SC-100 Microsoft Cybersecurity Architect Exam
  • Those who want to understand the best practices for building and designing cyber security solutions using MS products
  • Those who want to have a strong foundation in creating Zero trust strategies
  • More details


    Description

    A subject matter expert (SME) in building and advancing cybersecurity strategies to safeguard an organization's goals and operational procedures throughout all facets of enterprise architecture is the Microsoft cybersecurity architect. A Zero Trust strategy and architecture, comprising security measures for data, apps, access control, identity, and infrastructure, are created by the cybersecurity architect. The Governance Risk Compliance (GRC) technological plans and security operational strategies are both evaluated by the cybersecurity architect.

    To create and implement a cybersecurity strategy that satisfies an organization's business goals, the cybersecurity architect works consistently with executives and practitioners in IT security, privacy, and other positions throughout the organization.

    A candidate for this exam should have advanced expertise and understanding in many different security engineering fields, such as identity and access, platform protection, security operations, securing data, and securing applications. They should also have knowledge of cloud and hybrid implementations.

    To earn the Microsoft Cybersecurity Architect certification, candidates must also pass one of the following exams: SC-200, SC-300, AZ-500, or MS-500.

    Modules covered in SC 100 Certification -

    •Module 1 - Design a Zero Trust strategy and architecture (30–35%)

    • Module 2 - Evaluate Governance Risk Compliance (GRC) technical strategies and security operations

    strategies (10–15%)

    • Module 3 - Design security for infrastructure (10–15%)

    • Module 4 - Design a strategy for data and applications (15–20%)

    • Module 5 - Recommend security best practices and priorities (20–25%) ( Added on Feb 7th 2023 )

    Who this course is for:

    • This course is designed for those students who want to take the SC-100 Microsoft Cybersecurity Architect Exam
    • Those who want to understand the best practices for building and designing cyber security solutions using MS products
    • Those who want to have a strong foundation in creating Zero trust strategies

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Anand Rao Nednur
    Anand Rao Nednur
    Instructor's Courses
    Anand Rao is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure , AWS and GCP) but also well-versed with IAM, security and automation with powershell and python.In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in the lab examinations and securing certifications.Anand Rao has delivered instructor led trainings in several states in India as well as several countries like USA, Bahrain, Kenya and UAE. He has worked as a Microsoft Certified Trainer globally for Corporate Major Clients.Anand is also a Certified seasoned professional holding certifications in following platforms:     Microsoft Certified Trainer ( MCT )     SY0-401 : CompTIA Security +     Scrum Certified master ( SCRUM )     ITIL V3      Certified Network Defender ( CND – EC-Council )     Certified Ethical hacker  ( CEH – EC-Council )     70-640 MS Active Directory     70-533 MS Azure Administration     70-534 MS Azure Architecture     AWS certified solutions Architect – Associate     AWS certified sysops administrator – Associate     Google Cloud Platform-Cloud Architect (GCP)     Certified Cloud Security Knowledge ( CCSK )     SC 900, SC 200 & SC -300Note: Anand also manages channel "The Cloud Mentor" in youtube. Feel free to subscribe to AWS and Azure. Share, Learn, Subscribe.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 134
    • duration 10:00:08
    • Release Date 2023/03/09