Pathway To Microsoft Cybersecurity Architect - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Pathway To Microsoft Cybersecurity Architect (/Thread-Pathway-To-Microsoft-Cybersecurity-Architect) |
Pathway To Microsoft Cybersecurity Architect - OneDDL - 11-22-2024 Free Download Pathway To Microsoft Cybersecurity Architect Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 3.95 GB | Duration: 11h 16m SC-100: Microsoft Cybersecurity Architect What you'll learn Introduction to Zero Trust and best practice frameworks Design security solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices Design solutions for regulatory compliance Design solutions for identity and access management Design solutions for securing privileged access Design solutions for security operations Design solutions for securing Microsoft 365 Design solutions for securing applications Design solutions for securing an organization's data Specify requirements for securing SaaS, PaaS, and IaaS services Design solutions for security posture management in hybrid and multicloud environments Design solutions for securing server and client endpoints Design solutions for network security Requirements You bring hands-on experience in implementing or managing solutions across key areas of cybersecurity: identity and access management, platform protection, security operations, data and AI security, application security, and hybrid/multi-cloud infrastructures. You possess deep expertise in at least one of these domains and have a strong background in designing comprehensive security solutions leveraging Microsoft security technologies No programming experience is needed Description Pathway to Microsoft Cybersecurity Architect equips you with essential skills to design and implement resilient cybersecurity solutions that protect against today's most pressing threats. This course covers critical areas such as developing strategies for ransomware resilience, aligning with security best practices, and supporting business continuity and disaster recovery (BCDR) across hybrid and multi-cloud environments. You'll learn to design secure backup and restore solutions, prioritize BCDR, and safeguard privileged access-key steps in building a robust defense against potential cyber incidents.You'll explore the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB) to design solutions that meet enterprise security needs. Learn to build strategies for Zero Trust security, using Microsoft's Zero Trust Rapid Modernization Plan (RaMP) to protect against insider, external, and supply chain threats. You'll also discover how to structure security and governance in line with the Microsoft Cloud Adoption Framework (CAF) and Azure Well-Architected Framework, ensuring that your designs are tailored to support organizational growth and resiliency goals.This course emphasizes security operations and identity management, covering advanced topics like SIEM and XDR for detection and response, central logging and auditing, and threat detection using MITRE ATT&CK matrices. You'll gain skills in configuring Microsoft Sentinel and Defender XDR, allowing you to design proactive incident response and threat hunting workflows that enhance your security posture.Identity and access management (IAM) is another focus, with strategies for modern authentication, authorization, and secure external identities. You'll learn to design solutions using Microsoft Entra ID, support B2B/B2C and decentralized identity needs, and align Conditional Access policies with Zero Trust principles. Additionally, this course dives into privileged access security, from Microsoft Entra Privileged Identity Management (PIM) to secure administration in multicloud environments.Finally, this course addresses data security and regulatory compliance. You'll evaluate solutions for Microsoft 365, manage compliance with Microsoft Purview, and design policies to meet privacy requirements. By the end of this pathway, you'll be prepared to architect security solutions for diverse infrastructure and application environments, applying Microsoft technologies to create comprehensive, resilient, and scalable security strategies across your organization. Overview Section 1: Introduction Lecture 1 About course Lecture 2 Cybersecurity Architecture and Architect Lecture 3 Start with Microsoft Security Best Practices Lecture 4 Common security antipatterns Section 2: Discuss Perimeter and Zero Trust Security Models Lecture 5 Section objectives Lecture 6 What is Perimeter Security Model? Lecture 7 What is Zero Trust Security Model? Lecture 8 Zero Trust as a security strategy Lecture 9 Zero Trust components Lecture 10 Zero Trust Architecture Lecture 11 Zero Trust RaMP Initiatives Lecture 12 Zero Trust Deployment Objectives Section 3: Security Design that aligns with CAF and WAF Lecture 13 Section objectives Lecture 14 Explore Microsoft Cloud Adoption Framework (CAF) Lecture 15 Cloud Adoption Framework (CAF) Secure Methodology Lecture 16 Discuss Azure Landing Zones Lecture 17 Security elements in Azure Landing Zones Lecture 18 What is Well-Architected Framework? Lecture 19 Well Architected Framework Security Pillars Section 4: Security design that aligns with MCRA and MCSB Lecture 20 Section objectives Lecture 21 Overview of Microsoft Cybersecurity Reference Architecture(MCRA) Lecture 22 Overview of Microsoft Cloud Security Benchmark (MCSB) Lecture 23 Capabilities and controls with MCRA Lecture 24 Capabilities and controls with MCSB Lecture 25 Attack protection with MCRA Lecture 26 Attack protection with MCSB Section 5: Resiliency strategy for ransomware and other attacks Lecture 27 Section Objectives Lecture 28 Discuss common cyberthreats and attack patterns Lecture 29 Understand attack chain modeling Lecture 30 How to support business resiliency? Lecture 31 Design solutions for mitigating ransomware attacks Lecture 32 Design solutions for business continuity and Disaster Recovery Lecture 33 Explore solution for security updates Section 6: Design solutions for regulatory compliance Lecture 34 Section Objectives Lecture 35 Overview of regulatory compliance Lecture 36 Explore important regulatory compliance standards Lecture 37 Translate compliance requirements into security controls Lecture 38 Address compliance requirements using Microsoft Purview Lecture 39 Address privacy requirements with Microsoft Priva Lecture 40 Address security and compliance requirements using Azure Policy Lecture 41 Validate alignment with regulatory standards using Microsoft Defender for cloud Section 7: Design solutions for identity and access management Lecture 42 Section objectives Lecture 43 What is IAM and its function? Lecture 44 Active Directory based services in Azure Lecture 45 User Management: AD Vs Entra ID Lecture 46 IAM design recommendations Lecture 47 External identities and solutions Lecture 48 Modern authentication and authorization strategies Lecture 49 Microsoft Entra Identity Protection Lecture 50 Align conditional access and Zero Trust Lecture 51 Protecting Human and non-human identities Lecture 52 Harden Active Directory Domain Services Lecture 53 Design Cloud Key Management Plan Section 8: Design solutions for securing privileged access Lecture 54 Section objectives Lecture 55 Types of access Lecture 56 Understand enterprise access model Lecture 57 Azure Privilege Identity Management Lecture 58 Privileged Access Management Lecture 59 Tenant management with Azure Lighthouse Lecture 60 Solution for cloud infrastructure entitlement management Lecture 61 Solution for privileged access workstations and bastion services Section 9: Design solutions for security operations Lecture 62 Section objectives Lecture 63 Define Security Operations (SecOps) strategy Lecture 64 Discuss security operations team structure Lecture 65 Security Operation Center Modernization Lecture 66 Security Operation Team composition Lecture 67 Design unified security operation strategy Lecture 68 what is EDR, XDR, SIEM and SOAR? Lecture 69 Design centralized logging solution for security operation Lecture 70 Microsoft Defender XDR architecture Lecture 71 Microsoft Sentinel and defender architecture as a SIEM and SOAR Lecture 72 Explore key security workflows Lecture 73 what is MITRE ATT&CK and discuss sentinel integration? Section 10: Design security solutions for Microsoft 365 Lecture 74 Section objectives Lecture 75 Core Microsoft 365 Services and Apps Lecture 76 Licensing consideration for Microsoft 365 security Lecture 77 Licensing consideration for Office 365 security Lecture 78 Design configuration and Operational Practices for M365 Lecture 79 Importance of Microsoft Purview in M365 security Lecture 80 Data security and compliance controls using copilot Lecture 81 Evaluate and assess security posture for M365 Section 11: Design security solutions for applications Lecture 82 Section objectives Lecture 83 DevOps security Lecture 84 Design standards to secure application development Lecture 85 Evaluate security posture of existing application portfolios Lecture 86 Evaluate application threats with threat modelling Lecture 87 Design security lifecycle strategy for applications Lecture 88 Secure access for workload identities Lecture 89 Design solution for API management and security Lecture 90 Design solution for secure access to applications Section 12: Design security solutions for organizations data Lecture 91 Section objectives Lecture 92 Best practices for data security Lecture 93 Evaluate solutions for data discovery and classification Lecture 94 Defense in depth in Microsoft Purview Lecture 95 Evaluate solutions for encryption of Azure data Lecture 96 Design data security for Azure SQL workloads Lecture 97 Design security for Azure storage Lecture 98 Microsoft Defender for Azure Storage and SQL Section 13: Secure SaaS, PaaS, and IaaS Services Lecture 99 Section objectives Lecture 100 Shared responsibility model in the cloud Lecture 101 Security baselines for IaaS, and PaaS services Lecture 102 Security baselines for IoT workloads Lecture 103 Security baselines for web workloads Lecture 104 Security baselines for containers and orchestration Lecture 105 Security baselines for AI workloads Section 14: Design security solutions for posture management Lecture 106 Section objectives Lecture 107 What is Microsoft Defender for Cloud? Lecture 108 Understand Cloud Security Posture Management (CSPM) Lecture 109 Understand Cloud Workload Protection (CWP) Lecture 110 Microsoft Defender for Cloud planning and operations Lecture 111 Evaluate security posture by using defender for cloud Lecture 112 Integrate hybrid and multicloud environments with Arc Lecture 113 Design solution for external attack surface management Section 15: Design security solutions for server and client endpoints Lecture 114 Section objectives Lecture 115 Endpoint security Lecture 116 Server security requirements Lecture 117 Mobile devices security requirements Lecture 118 IoT security requirements Lecture 119 Secure OT/IoT with Defender for IoT Lecture 120 Windows Security baselines for server and client endpoints Lecture 121 Design solution for secure remote access Lecture 122 Evaluate Windows local admin password solutions (LAPS) Section 16: Design solutions for network security Lecture 123 Section objectives Lecture 124 Design solutions for network segmentation Lecture 125 Design solutions for traffic filtering with NSG Lecture 126 Solution for network posture management Lecture 127 Solutions for network monitoring Lecture 128 Solutions that use Microsoft Entra Internet Access Lecture 129 Solutions that use Microsoft Entra Private Access Cybersecurity Architect,Security Engineer,Cloud Architect,Solution Architect,Security Operation Engineer Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |