PDFs and exam guides are not so efficient, right? Prepare for your Microsoft examination with our training course. The SC-100 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Microsoft certification exam. Pass the Microsoft SC-100 test with flying colors.
Curriculum for SC-100 Certification Video Course
Name of Video | Time |
---|---|
1. SC - 100 Microsoft Cybersecurity Architect - Course trailer |
0:42 |
Name of Video | Time |
---|---|
1. Chapter 1: The role of a security Architect |
1:29 |
2. Zero Trust Overview |
1:39 |
3. Guiding principles of zero trust |
2:53 |
4. Pillars of Zero Trust |
6:39 |
5. MCRA - Identity |
3:50 |
6. MCRA - SOC Tools |
3:05 |
7. MCRA - Endpoint Security |
5:08 |
8. MCRA - Hybrid Computing |
7:21 |
9. MCRA - Information Protection |
4:06 |
10. MCRA - People Security |
6:54 |
11. MCRA - IoT and IT Security - II |
7:39 |
12. CAF - Introduction |
2:20 |
13. CAF - strategy |
5:57 |
14. CAF - Planning |
4:58 |
15. CAF - Readyness - Azure setup guide |
11:01 |
16. CAF - Readyness - Azure Landing Zone |
9:17 |
17. CAF Landing Zone Deployment - Lab Step By Step-I |
5:29 |
18. CAF Landing Zone Deployment - Lab Step By Step-II |
26:54 |
19. CAF - Adopt Phase |
2:17 |
20. CAF - Governance |
13:16 |
21. IT Transformations - Gap analysis |
3:43 |
22. Security transformations |
7:51 |
23. Design Security for resiliency strategy |
4:05 |
24. The reliability Pillar |
4:06 |
25. SC 100 Case study overview |
2:25 |
26. SC 100 Case Study |
12:04 |
27. Chapter 2: Design a security options strategy - overview |
1:26 |
28. Security operations strategy overview |
3:03 |
29. Security operations frameworks, processes and procedures |
3:32 |
30. SecOps and the Leadership |
3:58 |
31. People and Processes |
4:42 |
32. Metrics and Its importance in SOC |
3:31 |
33. Recommendations for Designing a logging and auditing security strategy |
6:24 |
34. Cyber Kill Chain - An overview |
3:49 |
35. Focus areas for SOC in hybrid computing |
1:51 |
36. Unified operations in Hybrid clouds |
5:06 |
37. Tiers in SecOps |
3:47 |
38. Azure Tools for SecOps |
6:10 |
39. SecOps - Best practices for SIEM _ SOAR |
9:22 |
40. SecOPs- Best Practices for Network and Azure AD Monitoring |
4:04 |
41. Incident Response - Best Practices |
2:27 |
42. Recovery - Best Practices |
3:03 |
43. Workflow Automation |
3:03 |
44. Workflow Automation - Lab |
4:28 |
45. Workflow Automation - Logic apps integration - Lab |
7:22 |
46. Incident Management process- Overview |
5:51 |
47. Incident Management process - Preparation |
2:46 |
48. Incident Management Process - Detection and Analysis |
1:37 |
49. Incident Management Process - Containment Eradication and recovery |
3:31 |
50. Incident Management Process - Post - Incident Activity |
2:27 |
51. Threat Intelligence and SOC |
3:48 |
52. Threat intelligence in Sentinel |
1:52 |
53. Threat intelligence in Defender for Endpoint |
5:08 |
54. Threat Intelligence for IOT |
2:13 |
55. Threat Intelligence in Defender for Cloud |
2:07 |
56. Chapter2 Case Study |
8:47 |
57. Chapter 3: Identity Security Strategy -Introduction |
01:10 |
58. Identity Security Strategy Overview |
2:28 |
59. Evolution of Identity Technology |
2:51 |
60. Identity Challenges |
1:56 |
61. Microsoft Identity Store - Overview |
5:30 |
62. Identity Governance - Overview |
4:20 |
63. Identity is the new control plane |
2:45 |
64. Zero Trust Concepts and Principles |
2:43 |
65. Zero Trust Components |
4:26 |
66. Planning a Zero Trust Strategy |
3:29 |
67. Zero Trust Model - Introduction |
1:07 |
68. Enabling Zero Trust Model-II |
10:36 |
69. Enabling Zero Trust Model-III |
4:01 |
70. Zero trust Security strategy for Identities |
7:08 |
71. Conditional Access support for Zero Trust Architecture |
3:22 |
72. Conditional Access Personas |
6:01 |
73. Secure Authentication Methods |
1:35 |
74. Secure Authentication Methods - II |
1:35 |
75. Password hash Sync - PHS |
8:38 |
76. Pass Through Authentication - PTA |
9:51 |
77. Azure AD Roles - Best Practices |
6:17 |
78. Design a Security Strategy for Privileged Role Access |
2:20 |
79. Develop a Roadmap |
2:09 |
80. Develop a Roadmap - Explained |
5:33 |
81. Design a security strategy for privileged activities |
4:34 |
82. Rapid Modernization Plan - RAMP |
4:21 |
83. Execute Critical strategic initiatives for Privileged Activity Management |
2:10 |
84. Chapter Case Study 01 |
8:04 |
85. Chapter Case Study 02 |
5:08 |
Name of Video | Time |
---|---|
1. Evaluate Regulatory Compliance - Introduction |
1:17 |
2. Interpret Compliance Requirements |
2:53 |
3. Compliance Offerings |
6:10 |
4. Evaluate infra compliance using defender for cloud |
3:44 |
5. Design for data residency requirements |
5:01 |
6. Encryption Support for various services |
6:25 |
7. Chapter 1: Case Study |
7:29 |
8. Chapter 2: Evaluate Security postures - Chapter Introduction |
1:00 |
9. what is security posture |
3:04 |
10. Azure Security Benchmark |
2:21 |
11. Miter attack and Microsoft Defender for cloud |
3:44 |
12. Security Hygiene for Cloud workloads |
5:57 |
13. Security and policy options in Azure Landing zone |
2:37 |
14. Chapter 2: Case Study |
11:32 |
Name of Video | Time |
---|---|
1. Chapter 1 : Introduction |
1:13 |
2. Plan and Implement a security strategy across teams |
7:19 |
3. Security Role and Responsibilities |
4:59 |
4. Building the cloud security strategy document - considerations |
5:41 |
5. Security strategy document - deliverables |
2:41 |
6. Security Strategy document - Best Practices |
4:28 |
7. Continuous evolution of security strategy - Deliverables |
3:12 |
8. Best Practices for Security Planning |
3:54 |
9. Establishing Essential security practices |
2:28 |
10. Security Management strategy |
1:53 |
11. Continuous Assessment |
3:08 |
12. Chapter 1 case study |
4:07 |
13. Chapter 2 : Introduction |
0:54 |
14. What is a Security Baseline |
2:02 |
15. Security Baseline Principles |
4:31 |
16. Security Requirement for servers |
3:11 |
17. Securing Member Servers |
5:43 |
18. Azure Security Benchmarks |
6:17 |
19. Securing Mobile devices |
2:40 |
20. Application Control |
2:11 |
21. Device Settings using Intune |
3:07 |
22. Other requirements for clients and endpoints |
1:46 |
23. Securing Domain Controllers |
5:55 |
24. Securing DCs from Attacks |
4:14 |
25. Key Vault - Fundamentals |
3:19 |
26. Managing access to secrets |
3:56 |
27. Securing remote access |
3:50 |
28. Security Ops - Best Practices |
2:58 |
29. Importance of Interactions with Business leaders |
3:39 |
30. Hiring right people with right mindset |
2:18 |
31. Metrics linked to SOC team |
3:13 |
32. Forensic Procedures and Endpoint Forensics |
4:32 |
33. Chapter 2 Case Study |
4:34 |
34. Chapter 3 Introduction |
0:48 |
35. Security baselines for PaaS services |
6:48 |
36. Security baselines for IaaS services |
5:27 |
37. Security Baselines for SaaS Services |
4:42 |
38. Security requirements for IOT based workloads |
6:31 |
39. IOT Devices - Security Posture and Threat Management |
4:08 |
40. Specify security requirements for data work loads |
4:52 |
41. Security posture management for data related workloads |
5:59 |
42. Security requirements for Web Based Workloads |
7:29 |
43. Security posture management for App services |
2:33 |
44. Security requirements for Azure Storage Accounts |
9:01 |
45. Azure Defender for Storage |
2:21 |
46. Security recommendations for Containers |
8:26 |
47. Defender for Containers |
2:49 |
48. Chapter 3 Case Study |
3:32 |
Name of Video | Time |
---|---|
1. Threat Modelling - Introduction |
8:24 |
2. Threat Modelling - Use Case |
10:49 |
3. Understanding the application threat modelling |
2:38 |
4. STRIDE Methodology |
3:58 |
5. Mitigating the Identified threats |
2:04 |
6. Shift from Waterfall to DevOps |
1:54 |
7. DevOps & Its Phases |
4:20 |
8. DevSecOps and its importance |
3:00 |
9. Onboarding applications to Azure AD |
6:31 |
10. Chapter 1 Case study |
5:11 |
11. Chapter 2 Introduction |
1:26 |
12. Mitigating threats to data |
4:25 |
13. Ransomware protection |
1:52 |
14. Ransomware protection - Phases |
6:26 |
15. Strategy to identify and protect sensitive Data |
4:58 |
16. Know your data with Microsoft Purview -I |
5:42 |
17. Govern your data with Defender for cloud apps - II |
6:33 |
18. Govern your data - Data Retention |
5:05 |
19. Govern your data - Records Management |
7:33 |
20. Chapter 2 case study |
5:43 |
100% Latest & Updated Microsoft SC-100 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!
SC-100 Premium Bundle
Free SC-100 Exam Questions & SC-100 Dumps
File Name | Size | Votes |
---|---|---|
File Name microsoft.selftesttraining.sc-100.v2024-08-05.by.shadow.7q.vce |
Size 84.63 KB |
Votes 1 |
Microsoft SC-100 Training Course
Want verified and proven knowledge for Microsoft Cybersecurity Architect? Believe it's easy when you have ExamSnap's Microsoft Cybersecurity Architect certification video training course by your side which along with our Microsoft SC-100 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.
Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap Microsoft Cybersecurity Architect certification video training course that goes in line with the corresponding Microsoft SC-100 exam dumps, study guide, and practice test questions & answers.
Comments (0)
Please post your comments about SC-100 Exams. Don't share your email address asking for SC-100 braindumps or SC-100 exam pdf files.
Purchase Individually
Microsoft Training Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Latest IT Certification News
LIMITED OFFER: GET 30% Discount
This is ONE TIME OFFER
A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.