Companies Home Search Profile

SC-100: Microsoft Cybersecurity Architect

Focused View

Alan Rodrigues

9:39:00

279 View
  • 1.1 Diagrams.pdf
  • 1.2 PPT's.pdf
  • 1. Slides and Diagrams download.html
  • 2. How are we approaching this course.mp4
    06:38
  • 3. About this section.mp4
    00:53
  • 4. Zero Trust.mp4
    05:09
  • 5. Security - Integration endpoints.mp4
    03:02
  • 6. Cloud Adoption Framework.mp4
    03:40
  • 7. Security Strategy.mp4
    02:16
  • 8. Security Strategy - Hybrid environments.mp4
    03:15
  • 9. Security logging - tools.mp4
    02:16
  • 10. Let's start using the tools.mp4
    00:40
  • 11. Security logging - Our next steps.mp4
    02:36
  • 12. Security logging - Building a simple infrastructure.mp4
    05:11
  • 13. About Microsoft Sentinel.mp4
    03:19
  • 14. Lab - Microsoft Sentinel - Setup.mp4
    06:41
  • 15. Lab - Microsoft Sentinel - Data connectors.mp4
    10:41
  • 16. Lab - Microsoft Sentinel - Azure Activity.mp4
    07:47
  • 17. Lab - Microsoft Sentinel - Generating Incidents.mp4
    14:34
  • 18. Lab - Microsoft Sentinel - Generating Incidents - Resources.html
  • 19. Incidents.mp4
    03:46
  • 20. Lab - Microsoft Sentinel - Virtual Machines - Incidents.mp4
    05:36
  • 21. Lab - Microsoft Sentinel - Virtual Machines - Incidents - Resources.html
  • 22. Microsoft Sentinel - Workbooks.mp4
    02:52
  • 23. Microsoft Sentinel - Automation.mp4
    13:11
  • 24.1 Microsoft Sentinel - Threat Intelligence.html
  • 24. Microsoft Sentinel - Note on threat protection.mp4
    01:44
  • 25.1 NSG Flow Logs.html
  • 25. NSG Flow logs.mp4
    11:18
  • 26. Our next focus - Azure Active Directory.mp4
    03:04
  • 27.1 RBAC in-built roles.html
  • 27. Review on Role-based access control.mp4
    06:04
  • 28. Identity Governance - Entitlement Management.mp4
    05:59
  • 29. Review of Application Objects.mp4
    02:22
  • 30. Example on using Application Objects.mp4
    12:08
  • 31. Installing the Postman tool.html
  • 32.1 AuthApp.zip
  • 32. Another example on Application Objects.mp4
    17:08
  • 33. Installing Visual Studio 2022.html
  • 34. Enterprise Applications.mp4
    05:58
  • 35. Example on Enterprise Applications.mp4
    09:38
  • 36. Review - Azure AD Identity Protection.mp4
    04:33
  • 37. Review - Conditional Access Policies.mp4
    08:31
  • 38. Hybrid Identities - Azure AD Connect.mp4
    05:31
  • 39. Review - Azure AD Privileged Identity Management.mp4
    09:55
  • 40. Azure B2B.mp4
    03:34
  • 41. Azure B2C.mp4
    07:28
  • 42. Which service to choose.mp4
    02:28
  • 43. Azure AD Logs.mp4
    02:03
  • 44. Quick note before moving along.mp4
    01:12
  • 45. Section Quiz.html
  • 1. Compliance of your resources.mp4
    01:21
  • 2. Review of Azure Policy service.mp4
    06:34
  • 3. Introduction to Microsoft Defender for Cloud.mp4
    04:29
  • 4. Microsoft Defender for Cloud - Initial Look.mp4
    07:42
  • 5. Azure Security Benchmark.mp4
    07:00
  • 6. Microsoft Defender for Cloud - Servers.mp4
    11:07
  • 7. Microsoft Defender for Cloud - Secure Management Ports.mp4
    11:06
  • 8. Microsoft Defender for Cloud - Workload Protection features.mp4
    03:09
  • 9. Microsoft Defender for Cloud - Workflow Automation.mp4
    06:29
  • 10. Microsoft Defender for Cloud - Vulnerability assessment.mp4
    06:40
  • 11. Management Ports update.mp4
    04:31
  • 12. Microsoft Defender for Cloud - Regulatory compliance.mp4
    05:34
  • 13. Microsoft Defender for Cloud - Remediations.html
  • 14. Microsoft Defender for Cloud - AWS resources.mp4
    10:12
  • 15.1 Azure and AWS Security.html
  • 15. Quick note on other AWS aspects.mp4
    02:00
  • 16. Azure Landing zones.mp4
    04:00
  • 17. Azure Blueprints.mp4
    02:59
  • 18. Example on using Azure Blueprints.mp4
    11:42
  • 19. Example on using Azure Blueprints - Resources.html
  • 20. Section Quiz.html
  • 1. What are we going to cover.mp4
    00:56
  • 2. Quick overview of the services.mp4
    04:14
  • 3. Azure Storage Accounts - Authorization.mp4
    04:01
  • 4. Azure Storage Accounts Authorization - Access keys.mp4
    06:07
  • 5. Azure Storage Account Authorization - Shared Access Signature.mp4
    07:26
  • 6. Azure Storage Accounts - Azure AD Authentication.mp4
    08:44
  • 7. Azure Storage Accounts - Firewalls.mp4
    04:48
  • 8. Azure Storage Account - Service Endpoint.mp4
    05:32
  • 9. Azure Storage Accounts - Deny use of Access keys.mp4
    03:39
  • 10. Azure Storage accounts - Azure Policy use case.mp4
    03:57
  • 11. Creating an Azure SQL database.mp4
    07:23
  • 12. Azure SQL Database - Auditing.mp4
    03:56
  • 13. Azure SQL Database - Log output.mp4
    02:36
  • 14. Azure Web Apps - Enabling Diagnostics.mp4
    07:14
  • 15. Azure Web Apps - Diagnostics results.mp4
    02:09
  • 16. Azure Web Apps - Virtual Network Integration.mp4
    05:21
  • 17. Using the Azure Bastion Service.mp4
    04:23
  • 18. Azure Bastion - Creating the environment.mp4
    03:43
  • 19. Lab - Using the Azure Bastion Service.mp4
    05:37
  • 20. Lab - Creating an Azure Cosmos DB Account.mp4
    06:29
  • 21. Lab - Creating an Azure Cosmos DB Account - Resources.html
  • 22. Example of an application connecting to Azure Cosmos DB.mp4
    03:59
  • 23.1 sqlapp.zip
  • 23. Example of an application connecting to Azure Cosmos DB - Resources.html
  • 24. Storing Azure Cosmos DB keys.mp4
    10:58
  • 25.1 keyvault.zip
  • 25. Storing Azure Cosmos DB keys - Resources.html
  • 26. Azure Cosmos DB logs.html
  • 27. Microsoft Defender for Containers.mp4
    01:52
  • 28. Containers - What are we going to implement.mp4
    04:22
  • 29. Building a Docker Image.mp4
    12:59
  • 30.1 commands.zip
  • 30.2 dockerfile.zip
  • 30. Building a Docker Image - Resources.html
  • 31. Deploying the container.mp4
    14:10
  • 32.1 deployment.zip
  • 32.2 service.zip
  • 32. Deploying the container - Resources.html
  • 33. Quick Note on protecting domain controllers.mp4
    01:39
  • 34. Network Security Groups - Quick Review.mp4
    04:55
  • 35. Introduction to Microsoft Defender.mp4
    02:37
  • 36. Microsoft 365 Admin Center.mp4
    07:15
  • 37. Quick look at Microsoft Defender for Endpoint.mp4
    07:40
  • 38. Section Quiz.html
  • 1. What are we going to cover.mp4
    00:47
  • 2. Protecting your data.mp4
    02:14
  • 3. Lab - Azure SQL database - Dynamic data masking.mp4
    09:06
  • 4. Lab - Azure SQL database - Dynamic data masking - Resources.html
  • 5. Azure SQL database - Classification of data.mp4
    07:20
  • 6. Encryption of data.mp4
    02:59
  • 7. Azure Storage Service Encryption.mp4
    02:35
  • 8. Azure SQL Database Encryption.mp4
    02:15
  • 9. Azure SQL Database - Always Encrypted feature.mp4
    03:47
  • 10. Managed Disks Encryption.mp4
    02:58
  • 11. Note on Azure Backups.mp4
    03:55
  • 12. Protecting your workloads.mp4
    03:10
  • 13. Note on your DevOps pipeline.mp4
    02:31
  • 14.1 Developing secure applications.html
  • 14. Quick Note on securing applications.mp4
    01:46
  • 15. Review of the Azure Firewall service.mp4
    14:39
  • 16. Quick Note on Azure Web App - Azure Firewall.mp4
    01:34
  • 17.1 Restricting access to Front Door.html
  • 17. Simple implementation of Azure Front Door.mp4
    07:47
  • 18. Azure Front Door - Web Application Firewall.mp4
    05:57
  • 19. Azure Front Door Log details.html
  • 20. Quick Note - Microsoft 365 Defender - Web Content Filtering.mp4
    01:43
  • 1. Practice Test 1.html
  • 2. Practice Test 2.html
  • Description


    SC-100: Microsoft Cybersecurity Architect Preparation Course

    What You'll Learn?


    • Students will be prepared to take on the SC-100 exam
    • Students will learn aspects which relate to the exam objectives
    • Students will learn the important security services when it comes to the SC-100 exam
    • Students can also learn along with the demos and labs present in the course

    Who is this for?


  • This course is designed for those students who want to take the SC-100 Azure-based exam
  • This course is designed for those students who want to learn about the important security services covered from an exam perspective
  • What You Need to Know?


  • Students should have knowledge on basic security concepts
  • Students should have prior knowledge when it comes to working on Azure
  • Students should have ideally completed at least one of the pre-requisite exam - AZ-500, SC-300, SC-200, SC-400
  • More details


    Description

    This course is designed for students to prepare for the SC-100: Microsoft Cybersecurity Architect exam.

    The various objectives and chapters that will be covered include


    • Design a Zero Trust strategy and architecture

    In this section, we will first cover some basic theory when it comes to aspects like Zero trust, the Cloud Adoption Framework, some tools that can be used from a security perspective when it comes to Azure. Next we will focus on the Microsoft Sentinel tool. This is an important tool from an exam perspective. We will revisit aspects such as using Data connectors, creating alerts and incidents, and the automation process. The next aspect we need to touch upon is Azure Active Directory. We need to revisit important aspects such as Application Objects, Enterprise Applications, Conditional Access , Privileged Identity management etc.


    • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies

    In this section, we need to cover important aspects when it comes to Microsoft Defender for Cloud. How we can use the tool to evaluate the security posture of our resources. And how we can use the various compliance policies available from within the tool. We also will have a touch base when it comes to working with Azure Blueprints as well.


    • Design security for infrastructure

    In this section, we will learn aspects on how to secure our infrastructure. For example, how can we enhance security for services like Azure Web Apps, Azure SQL databases, Azure Storage Accounts etc.


    • Design a strategy for data and applications

    In this section we have to look into aspects on how we can protect our data. How can we enable data at rest and in transit when it comes to services that store data.

    Who this course is for:

    • This course is designed for those students who want to take the SC-100 Azure-based exam
    • This course is designed for those students who want to learn about the important security services covered from an exam perspective

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Alan Rodrigues
    Alan Rodrigues
    Instructor's Courses
    A Software technology evangelist with over 20+ years in the software Industry. A certification buff with numerous certifications with the most recent ones being 1. Microsoft Cybersecurity Architect [SC-100] 2. Designing and Implementing Cloud [DP-420]3.Designing & Implementing Microsoft DevOps  Solutions [AZ-400]4. Developing Solutions for Microsoft Azure [AZ-204]5. Designing & Implementing Azure Networking Solutions [AZ-700]6. Data Engineering on Microsoft Azure [DP-203]7. Microsoft Identity and Access Administrator [SC-300] 8. Designing Azure Infrastructure Solutions   [AZ-305]9. Microsoft Azure Administrator [AZ-104]10. Microsoft Azure AI Fundamentals [AI-900]I have also ghostwritten Exam Question banks , and developed courses for various high profile clients. Hence creating courses for the mass public is just what I do best.I just have one quote for all my students"Just follow your passion , never limit your potential. Never stop , just go on and achieve your dreams"
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 105
    • duration 9:39:00
    • English subtitles has
    • Release Date 2022/11/22