
Udemy – SC-100 Microsoft Cybersecurity Architect course with sims 2024-4
Published on: 2024-09-26 19:44:24
Categories: 28
Description
SC-100 Microsoft Cybersecurity Architect course with sims. In this course, the concepts are explained in a simple way for people who are just starting with this material. The instructor also provides hands-on instructions and simulations for practice that you can follow even if you have little or no experience.
What you will learn:
- Designing a resilient strategy for ransomware and other MS security-based attacks
- Working with business resilience goals, identifying and prioritizing threats
- MS ransomware best practices, including backup, recovery, and privileged access
- Secure backup and recovery using Azure Backup
- Security updates using Azure Update Manager
- Design solutions that comply with MCRA and MCSB
- Concepts of cybersecurity capabilities and controls using Zero Trust security
- MS Defender concepts to protect against internal and external attacks
- Navigating the Microsoft Defender and Microsoft Purview admin centers
- Understanding internal risk policies as a risk mitigation solution
- Implementation of internal risk management policies in Microsoft Purview
- Use the Zero Trust Rapid Modernization Plan (RaMP) as your security strategy
- Designing solutions that are compatible with Microsoft CAF and WAF frameworks
- Security and governance based on Microsoft Cloud Adoption Framework (CAF)
- Security and governance based on the Microsoft Azure Well-Architected Framework
- Use Azure Landing Zones to enforce and govern security
- DevSecOps process model
- Design solutions for security operations
- Security operations capabilities to support a hybrid or multi-cloud environment
- Centralized logging and auditing requirements
- Set audit permissions and enable support
- Perform threat hunting by logging into the audit system
- Understanding Kusto Query Language (KQL) for use in threat hunting
- Detection and Response Concepts Extended Detection and Response (XDR)
- Verify understanding of Microsoft Sentinel concept
- Setting up a Log Analytics workspace and a Microsoft Sentinel workspace
- Verify understanding of SIEM and SOAR concepts
- Data input visualization for use in Microsoft Sentinel
- Understanding of analytical rules in Microsoft Sentinel to support SIEM and SOAR
- Workflow to create security analytical rules for incident response and management
- Built-in scheduled query rules creation workflow
- Near-Real-Time (NRT) Analytical Rule Creation Workflow
- Automation with Security Coordination Automated Response (SOAR)
- Using content gallery hunting queries for threat hunting
- Cover threat detection using MITER ATT&CK
- Design solutions for identity and access management
- Understanding of SaaS, PaaS and IaaS and how it relates to hybrid/on-premises Azure
- Use cases with SaaS, PaaS and IaaS including identity, networking, applications
- External identities, business to business (B2B) and business to customer (B2C)
- Manage business-to-business (B2B) settings in Entra ID
- Using Entra ID external identities for a business-to-business (B2B) solution
- Create a lease for use in business-to-customer (B2C) scenarios.
- Decentralized identities with the help of Microsoft Entra Verified ID
- Mitigate threats by logging into Microsoft Entra ID
- Understanding Entra Identity Protection to assess continuous access
- Use Entra Identity Protection to secure authentication and authorization
- Integration of threat intelligence from Entra Identity Protection into MS Defender
- Understanding Multi-Factor Authentication (MFA)
- Implementing multi-factor authentication in Microsoft Entra ID
- Run Automatic Password Reset (SSPR) on Microsoft Entra ID
- Understanding Conditional Access Policies with a Zero Trust Strategy
- Implementing Conditional Access Policies with a Zero Trust Strategy
- Threat intelligence integration concepts with Defender for Cloud
- Design and configure workflow automation in Microsoft Defender for Cloud
- Set up email notifications in Defender for Cloud
- Create and manage alert suppression rules
- Create and manage sample alerts and incidents in Microsoft Defender for Cloud
- Remediate alerts and incidents using MS Defender for Cloud recommendations
- Management of security alerts and incidents
- Analyze Microsoft Defender for Cloud threat intelligence reports
- Concepts of securing different types of identities using Defender for Identity
- Hybrid Active Directory Domain Services (ADDS) connectors for secure identities
- Create an Azure Key Vault for secrets, keys, and certificates
- Control access to secrets, keys, and certificates with Azure Key Vault
- Manage secrets, keys and certificates with Azure Key vault
- Remove key vault services
What you will learn in SC-100 Microsoft Cybersecurity Architect course with sims:
- Learning the concepts and doing the practical activities needed to pass the SC-100 exam
- Gain extensive knowledge of securing Microsoft 365 and Azure services
- Extensive hands-on experience in Microsoft Cyber Security for Azure and Microsoft 365
- Using hands-on simulations that can be accessed anytime, anywhere
This course is suitable for people who:
- IT people interested in learning and passing the Microsoft SC-100 exam
- People interested in learning a great deal about Microsoft Cyber Security for Azure and Microsoft 365
Course specifications SC-100 Microsoft Cybersecurity Architect course with sims
- Publisher: Udemy
- Lecturer: John Christopher
- Training level: beginner to advanced
- Training duration: 18 hours and 24 minutes
- Number of courses: 159
Course topics on 8/2024

SC-100 Microsoft Cybersecurity Architect course prerequisites with sims
- Willingness to put in the time and practice the steps shown in the course
Course images

Sample video of the course
Installation guide
After Extract, view with your favorite Player.
Subtitle: None
Quality: 1080p
download link
Download part 1 – 2 GB
Download part 2 – 2 GB
Download part 3 – 2 GB
Download part 4 – 2 GB
Download part 5 – 2 GB
Download part 6 – 1.42 GB
File(s) password: www.downloadly.ir
File size
11.3 GB
Leave a Comment (Please sign to comment)