Companies Home Search Profile

Pathway to Microsoft Cybersecurity Architect

Focused View

Ramesh Waghmare

7:40:24

0 View
  • 1 - About course.mp4
    10:12
  • 1 - Introduction.pdf
  • 2 - Cybersecurity Architecture and Architect.mp4
    03:34
  • 3 - Start with Microsoft Security Best Practices.mp4
    05:52
  • 4 - Common security antipatterns.mp4
    10:15
  • 5 - Discuss-perimeter-and-zero-trust-security-models.pdf
  • 5 - Section objectives.mp4
    01:40
  • 6 - What is Perimeter Security Model.mp4
    04:58
  • 7 - What is Zero Trust Security Model.mp4
    03:18
  • 8 - Zero Trust as a security strategy.mp4
    02:03
  • 9 - Zero Trust components.mp4
    03:28
  • 10 - Zero Trust Architecture.mp4
    02:41
  • 11 - Zero Trust RaMP Initiatives.mp4
    07:45
  • 12 - Zero Trust Deployment Objectives.mp4
    24:46
  • 13 - Section objectives.mp4
    00:36
  • 13 - Security-design-that-aligns-with-CAF-and-WAF.pdf
  • 14 - Explore Microsoft Cloud Adoption Framework CAF.mp4
    10:23
  • 15 - Cloud Adoption Framework CAF Secure Methodology.mp4
    07:07
  • 16 - Discuss Azure Landing Zones.mp4
    05:26
  • 17 - Security elements in Azure Landing Zones.mp4
    15:13
  • 18 - What is WellArchitected Framework.mp4
    10:45
  • 19 - Well Architected Framework Security Pillars.mp4
    05:16
  • 20 - Section objectives.mp4
    00:55
  • 20 - Security-design-that-aligns-with-MCRA-and-MCSB.pdf
  • 21 - Overview of Microsoft Cybersecurity Reference ArchitectureMCRA.mp4
    07:21
  • 22 - Overview of Microsoft Cloud Security Benchmark MCSB.mp4
    07:36
  • 23 - Capabilities and controls with MCRA.mp4
    02:22
  • 24 - Capabilities and controls with MCSB.mp4
    06:17
  • 25 - Attack protection with MCRA.mp4
    02:41
  • 26 - Attack protection with MCSB.mp4
    02:14
  • 27 - Resiliency-strategy-for-ransomware-and-other-attacks.pdf
  • 27 - Section Objectives.mp4
    00:57
  • 28 - Discuss common cyberthreats and attack patterns.mp4
    08:17
  • 29 - Understand attack chain modeling.mp4
    05:48
  • 30 - How to support business resiliency.mp4
    03:11
  • 31 - Design solutions for mitigating ransomware attacks.mp4
    03:48
  • 32 - Design solutions for business continuity and Disaster Recovery.mp4
    05:26
  • 33 - Explore solution for security updates.mp4
    03:22
  • 34 - Design-solutions-for-regulatory-compliance.pdf
  • 34 - Section Objectives.mp4
    00:43
  • 35 - Overview of regulatory compliance.mp4
    03:54
  • 36 - Explore important regulatory compliance standards.mp4
    08:03
  • 37 - Translate compliance requirements into security controls.mp4
    06:08
  • 38 - Address compliance requirements using Microsoft Purview.mp4
    07:50
  • 39 - Address privacy requirements with Microsoft Priva.mp4
    09:55
  • 40 - Address security and compliance requirements using Azure Policy.mp4
    10:23
  • 41 - Validate alignment with regulatory standards using Microsoft Defender for cloud.mp4
    13:18
  • 42 - Design-solutions-for-identity-and-access-management.pdf
  • 42 - Section objectives.mp4
    01:52
  • 43 - What is IAM and its function.mp4
    06:58
  • 44 - Active Directory based services in Azure.mp4
    03:18
  • 45 - User Management AD Vs Entra ID.mp4
    03:13
  • 46 - IAM design recommendations.mp4
    05:01
  • 47 - External identities and solutions.mp4
    04:27
  • 48 - Modern authentication and authorization strategies.mp4
    05:16
  • 49 - Microsoft Entra Identity Protection.mp4
    04:07
  • 50 - Align conditional access and Zero Trust.mp4
    02:26
  • 51 - Protecting Human and nonhuman identities.mp4
    04:42
  • 52 - Harden Active Directory Domain Services.mp4
    04:23
  • 53 - Design Cloud Key Management Plan.mp4
    12:07
  • 54 - Design-solutions-for-securing-privileged-access.pdf
  • 54 - Section objectives.mp4
    00:46
  • 55 - Types of access.mp4
    04:11
  • 56 - Understand enterprise access model.mp4
    06:10
  • 57 - Azure Privilege Identity Management.mp4
    03:51
  • 58 - Privileged Access Management.mp4
    03:38
  • 59 - Tenant management with Azure Lighthouse.mp4
    04:39
  • 60 - Solution for cloud infrastructure entitlement management.mp4
    03:11
  • 61 - Solution for privileged access workstations and bastion services.mp4
    09:12
  • 62 - Design-solutions-for-security-operations.pdf
  • 62 - Section objectives.mp4
    01:15
  • 63 - Define Security Operations SecOps strategy.mp4
    09:40
  • 64 - Discuss security operations team structure.mp4
    01:48
  • 65 - Security Operation Center Modernization.mp4
    04:45
  • 66 - Security Operation Team composition.mp4
    03:56
  • 67 - Design unified security operation strategy.mp4
    06:13
  • 68 - what is EDR XDR SIEM and SOAR.mp4
    04:15
  • 69 - Design centralized logging solution for security operation.mp4
    10:36
  • 70 - Microsoft Defender XDR architecture.mp4
    03:54
  • 71 - Microsoft Sentinel and defender architecture as a SIEM and SOAR.mp4
    07:12
  • 72 - Explore key security workflows.mp4
    05:23
  • 73 - what is MITRE ATTCK and discuss sentinel integration.mp4
    11:46
  • 74 - Design-security-solutions-for-microsoft-365.pdf
  • 74 - Section objectives.mp4
    01:41
  • 75 - Core Microsoft 365 Services and Apps.mp4
    02:53
  • 76 - Licensing consideration for Microsoft 365 security.mp4
    02:26
  • 77 - Licensing consideration for Office 365 security.mp4
    04:38
  • 78 - Design configuration and Operational Practices for M365.mp4
    10:15
  • 79 - Importance of Microsoft Purview in M365 security.mp4
    11:30
  • 80 - Data security and compliance controls using copilot.mp4
    02:33
  • 81 - Evaluate and assess security posture for M365.mp4
    04:30
  • Description


    SC-100: Microsoft Cybersecurity Architect

    What You'll Learn?


    • Introduction to Zero Trust and best practice frameworks
    • Design security solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
    • Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
    • Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices
    • Design solutions for regulatory compliance
    • Design solutions for identity and access management
    • Design solutions for securing privileged access
    • Design solutions for security operations
    • Design solutions for securing Microsoft 365
    • Design solutions for securing applications
    • Design solutions for securing an organization's data
    • Specify requirements for securing SaaS, PaaS, and IaaS services
    • Design solutions for security posture management in hybrid and multicloud environments
    • Design solutions for securing server and client endpoints
    • Design solutions for network security

    Who is this for?


  • Cybersecurity Architect
  • Security Engineer
  • Cloud Architect
  • Solution Architect
  • Security Operation Engineer
  • What You Need to Know?


  • You bring hands-on experience in implementing or managing solutions across key areas of cybersecurity: identity and access management, platform protection, security operations, data and AI security, application security, and hybrid/multi-cloud infrastructures. You possess deep expertise in at least one of these domains and have a strong background in designing comprehensive security solutions leveraging Microsoft security technologies
  • No programming experience is needed
  • More details


    Description

    Pathway to Microsoft Cybersecurity Architect equips you with essential skills to design and implement resilient cybersecurity solutions that protect against today’s most pressing threats. This course covers critical areas such as developing strategies for ransomware resilience, aligning with security best practices, and supporting business continuity and disaster recovery (BCDR) across hybrid and multi-cloud environments. You’ll learn to design secure backup and restore solutions, prioritize BCDR, and safeguard privileged access—key steps in building a robust defense against potential cyber incidents.

    You'll explore the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB) to design solutions that meet enterprise security needs. Learn to build strategies for Zero Trust security, using Microsoft’s Zero Trust Rapid Modernization Plan (RaMP) to protect against insider, external, and supply chain threats. You’ll also discover how to structure security and governance in line with the Microsoft Cloud Adoption Framework (CAF) and Azure Well-Architected Framework, ensuring that your designs are tailored to support organizational growth and resiliency goals.

    This course emphasizes security operations and identity management, covering advanced topics like SIEM and XDR for detection and response, central logging and auditing, and threat detection using MITRE ATT&CK matrices. You’ll gain skills in configuring Microsoft Sentinel and Defender XDR, allowing you to design proactive incident response and threat hunting workflows that enhance your security posture.

    Identity and access management (IAM) is another focus, with strategies for modern authentication, authorization, and secure external identities. You'll learn to design solutions using Microsoft Entra ID, support B2B/B2C and decentralized identity needs, and align Conditional Access policies with Zero Trust principles. Additionally, this course dives into privileged access security, from Microsoft Entra Privileged Identity Management (PIM) to secure administration in multicloud environments.

    Finally, this course addresses data security and regulatory compliance. You’ll evaluate solutions for Microsoft 365, manage compliance with Microsoft Purview, and design policies to meet privacy requirements. By the end of this pathway, you’ll be prepared to architect security solutions for diverse infrastructure and application environments, applying Microsoft technologies to create comprehensive, resilient, and scalable security strategies across your organization.

    Who this course is for:

    • Cybersecurity Architect
    • Security Engineer
    • Cloud Architect
    • Solution Architect
    • Security Operation Engineer

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Ramesh Waghmare
    Ramesh Waghmare
    Instructor's Courses
    With a career spanning more than two decades, Ramesh has been at the forefront of IT innovation, shaping the landscape of modern technology and architecture. As a seasoned IT professional, Ramesh brings a wealth of knowledge, expertise, and real-world experience to the table.Driven by a passion for technology and a commitment to excellence, Ramesh has dedicated his career to staying at the cutting edge of industry trends and best practices. He has a knack for simplifying complex concepts and distilling them into practical insights that students can easily grasp and apply in their own work.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 81
    • duration 7:40:24
    • Release Date 2025/02/27