Training Video Course

SC-100: Microsoft Cybersecurity Architect

PDFs and exam guides are not so efficient, right? Prepare for your Microsoft examination with our training course. The SC-100 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Microsoft certification exam. Pass the Microsoft SC-100 test with flying colors.

Rating
4.49rating
Students
101
Duration
12:51:36 h
$16.49
$14.99

Curriculum for SC-100 Certification Video Course

Name of Video Time
Play Video: SC - 100 Microsoft Cybersecurity Architect - Course trailer
1. SC - 100 Microsoft Cybersecurity Architect - Course trailer
0:42
Name of Video Time
Play Video: Chapter 1: The role of a security Architect
1. Chapter 1: The role of a security Architect
1:29
Play Video: Zero Trust Overview
2. Zero Trust Overview
1:39
Play Video: Guiding principles of zero trust
3. Guiding principles of zero trust
2:53
Play Video: Pillars of Zero Trust
4. Pillars of Zero Trust
6:39
Play Video: MCRA - Identity
5. MCRA - Identity
3:50
Play Video: MCRA - SOC Tools
6. MCRA - SOC Tools
3:05
Play Video: MCRA - Endpoint Security
7. MCRA - Endpoint Security
5:08
Play Video: MCRA - Hybrid Computing
8. MCRA - Hybrid Computing
7:21
Play Video: MCRA - Information Protection
9. MCRA - Information Protection
4:06
Play Video: MCRA - People Security
10. MCRA - People Security
6:54
Play Video: MCRA - IoT and IT Security - II
11. MCRA - IoT and IT Security - II
7:39
Play Video: CAF - Introduction
12. CAF - Introduction
2:20
Play Video: CAF - strategy
13. CAF - strategy
5:57
Play Video: CAF - Planning
14. CAF - Planning
4:58
Play Video: CAF - Readyness - Azure setup guide
15. CAF - Readyness - Azure setup guide
11:01
Play Video: CAF - Readyness - Azure Landing Zone
16. CAF - Readyness - Azure Landing Zone
9:17
Play Video: CAF Landing Zone Deployment - Lab Step By Step-I
17. CAF Landing Zone Deployment - Lab Step By Step-I
5:29
Play Video: CAF Landing Zone Deployment - Lab Step By Step-II
18. CAF Landing Zone Deployment - Lab Step By Step-II
26:54
Play Video: CAF - Adopt Phase
19. CAF - Adopt Phase
2:17
Play Video: CAF - Governance
20. CAF - Governance
13:16
Play Video: IT Transformations - Gap analysis
21. IT Transformations - Gap analysis
3:43
Play Video: Security transformations
22. Security transformations
7:51
Play Video: Design Security for resiliency strategy
23. Design Security for resiliency strategy
4:05
Play Video: The reliability Pillar
24. The reliability Pillar
4:06
Play Video: SC 100 Case study overview
25. SC 100 Case study overview
2:25
Play Video: SC 100 Case Study
26. SC 100 Case Study
12:04
Play Video: Chapter 2: Design a security options strategy - overview
27. Chapter 2: Design a security options strategy - overview
1:26
Play Video: Security operations strategy overview
28. Security operations strategy overview
3:03
Play Video: Security operations frameworks, processes and procedures
29. Security operations frameworks, processes and procedures
3:32
Play Video: SecOps and the Leadership
30. SecOps and the Leadership
3:58
Play Video: People and Processes
31. People and Processes
4:42
Play Video: Metrics and Its importance in SOC
32. Metrics and Its importance in SOC
3:31
Play Video: Recommendations for Designing a logging and auditing security strategy
33. Recommendations for Designing a logging and auditing security strategy
6:24
Play Video: Cyber Kill Chain - An overview
34. Cyber Kill Chain - An overview
3:49
Play Video: Focus areas for SOC in hybrid computing
35. Focus areas for SOC in hybrid computing
1:51
Play Video: Unified operations in Hybrid clouds
36. Unified operations in Hybrid clouds
5:06
Play Video: Tiers in SecOps
37. Tiers in SecOps
3:47
Play Video: Azure Tools for SecOps
38. Azure Tools for SecOps
6:10
Play Video: SecOps - Best practices for SIEM _ SOAR
39. SecOps - Best practices for SIEM _ SOAR
9:22
Play Video: SecOPs- Best Practices for Network and Azure AD Monitoring
40. SecOPs- Best Practices for Network and Azure AD Monitoring
4:04
Play Video: Incident Response - Best Practices
41. Incident Response - Best Practices
2:27
Play Video: Recovery - Best Practices
42. Recovery - Best Practices
3:03
Play Video: Workflow Automation
43. Workflow Automation
3:03
Play Video: Workflow Automation - Lab
44. Workflow Automation - Lab
4:28
Play Video: Workflow Automation - Logic apps integration - Lab
45. Workflow Automation - Logic apps integration - Lab
7:22
Play Video: Incident Management process- Overview
46. Incident Management process- Overview
5:51
Play Video: Incident Management process - Preparation
47. Incident Management process - Preparation
2:46
Play Video: Incident Management Process - Detection and Analysis
48. Incident Management Process - Detection and Analysis
1:37
Play Video: Incident Management Process - Containment Eradication and recovery
49. Incident Management Process - Containment Eradication and recovery
3:31
Play Video: Incident Management Process - Post - Incident Activity
50. Incident Management Process - Post - Incident Activity
2:27
Play Video: Threat Intelligence and SOC
51. Threat Intelligence and SOC
3:48
Play Video: Threat intelligence in Sentinel
52. Threat intelligence in Sentinel
1:52
Play Video: Threat intelligence in Defender for Endpoint
53. Threat intelligence in Defender for Endpoint
5:08
Play Video: Threat Intelligence for IOT
54. Threat Intelligence for IOT
2:13
Play Video: Threat Intelligence in Defender for Cloud
55. Threat Intelligence in Defender for Cloud
2:07
Play Video: Chapter2 Case Study
56. Chapter2 Case Study
8:47
Play Video: Chapter 3: Identity Security Strategy -Introduction
57. Chapter 3: Identity Security Strategy -Introduction
01:10
Play Video: Identity Security Strategy Overview
58. Identity Security Strategy Overview
2:28
Play Video: Evolution of Identity Technology
59. Evolution of Identity Technology
2:51
Play Video: Identity Challenges
60. Identity Challenges
1:56
Play Video: Microsoft Identity Store - Overview
61. Microsoft Identity Store - Overview
5:30
Play Video: Identity Governance - Overview
62. Identity Governance - Overview
4:20
Play Video: Identity is the new control plane
63. Identity is the new control plane
2:45
Play Video: Zero Trust Concepts and Principles
64. Zero Trust Concepts and Principles
2:43
Play Video: Zero Trust Components
65. Zero Trust Components
4:26
Play Video: Planning a Zero Trust Strategy
66. Planning a Zero Trust Strategy
3:29
Play Video: Zero Trust Model - Introduction
67. Zero Trust Model - Introduction
1:07
Play Video: Enabling Zero Trust Model-II
68. Enabling Zero Trust Model-II
10:36
Play Video: Enabling Zero Trust Model-III
69. Enabling Zero Trust Model-III
4:01
Play Video: Zero trust Security strategy for Identities
70. Zero trust Security strategy for Identities
7:08
Play Video: Conditional Access support for Zero Trust Architecture
71. Conditional Access support for Zero Trust Architecture
3:22
Play Video: Conditional Access Personas
72. Conditional Access Personas
6:01
Play Video: Secure Authentication Methods
73. Secure Authentication Methods
1:35
Play Video: Secure Authentication Methods - II
74. Secure Authentication Methods - II
1:35
Play Video: Password hash Sync - PHS
75. Password hash Sync - PHS
8:38
Play Video: Pass Through Authentication - PTA
76. Pass Through Authentication - PTA
9:51
Play Video: Azure AD Roles - Best Practices
77. Azure AD Roles - Best Practices
6:17
Play Video: Design a Security Strategy for Privileged Role Access
78. Design a Security Strategy for Privileged Role Access
2:20
Play Video: Develop a Roadmap
79. Develop a Roadmap
2:09
Play Video: Develop a Roadmap - Explained
80. Develop a Roadmap - Explained
5:33
Play Video: Design a security strategy for privileged activities
81. Design a security strategy for privileged activities
4:34
Play Video: Rapid Modernization Plan - RAMP
82. Rapid Modernization Plan - RAMP
4:21
Play Video: Execute Critical strategic initiatives for Privileged Activity Management
83. Execute Critical strategic initiatives for Privileged Activity Management
2:10
Play Video: Chapter Case Study 01
84. Chapter Case Study 01
8:04
Play Video: Chapter Case Study 02
85. Chapter Case Study 02
5:08
Name of Video Time
Play Video: Evaluate Regulatory Compliance - Introduction
1. Evaluate Regulatory Compliance - Introduction
1:17
Play Video: Interpret Compliance Requirements
2. Interpret Compliance Requirements
2:53
Play Video: Compliance Offerings
3. Compliance Offerings
6:10
Play Video: Evaluate infra compliance using defender for cloud
4. Evaluate infra compliance using defender for cloud
3:44
Play Video: Design for data residency requirements
5. Design for data residency requirements
5:01
Play Video: Encryption Support for various services
6. Encryption Support for various services
6:25
Play Video: Chapter 1: Case Study
7. Chapter 1: Case Study
7:29
Play Video: Chapter 2: Evaluate Security postures - Chapter Introduction
8. Chapter 2: Evaluate Security postures - Chapter Introduction
1:00
Play Video: what is security posture
9. what is security posture
3:04
Play Video: Azure Security Benchmark
10. Azure Security Benchmark
2:21
Play Video: Miter attack and Microsoft Defender for cloud
11. Miter attack and Microsoft Defender for cloud
3:44
Play Video: Security Hygiene for Cloud workloads
12. Security Hygiene for Cloud workloads
5:57
Play Video: Security and policy options in Azure Landing zone
13. Security and policy options in Azure Landing zone
2:37
Play Video: Chapter 2: Case Study
14. Chapter 2: Case Study
11:32
Name of Video Time
Play Video: Chapter 1 : Introduction
1. Chapter 1 : Introduction
1:13
Play Video: Plan and Implement a security strategy across teams
2. Plan and Implement a security strategy across teams
7:19
Play Video: Security Role and Responsibilities
3. Security Role and Responsibilities
4:59
Play Video: Building the cloud security strategy document - considerations
4. Building the cloud security strategy document - considerations
5:41
Play Video: Security strategy document - deliverables
5. Security strategy document - deliverables
2:41
Play Video: Security Strategy document - Best Practices
6. Security Strategy document - Best Practices
4:28
Play Video: Continuous evolution of security strategy - Deliverables
7. Continuous evolution of security strategy - Deliverables
3:12
Play Video: Best Practices for Security Planning
8. Best Practices for Security Planning
3:54
Play Video: Establishing Essential security practices
9. Establishing Essential security practices
2:28
Play Video: Security Management strategy
10. Security Management strategy
1:53
Play Video: Continuous Assessment
11. Continuous Assessment
3:08
Play Video: Chapter 1 case study
12. Chapter 1 case study
4:07
Play Video: Chapter 2 : Introduction
13. Chapter 2 : Introduction
0:54
Play Video: What is a Security Baseline
14. What is a Security Baseline
2:02
Play Video: Security Baseline Principles
15. Security Baseline Principles
4:31
Play Video: Security Requirement for servers
16. Security Requirement for servers
3:11
Play Video: Securing Member Servers
17. Securing Member Servers
5:43
Play Video: Azure Security Benchmarks
18. Azure Security Benchmarks
6:17
Play Video: Securing Mobile devices
19. Securing Mobile devices
2:40
Play Video: Application Control
20. Application Control
2:11
Play Video: Device Settings using Intune
21. Device Settings using Intune
3:07
Play Video: Other requirements for clients and endpoints
22. Other requirements for clients and endpoints
1:46
Play Video: Securing Domain Controllers
23. Securing Domain Controllers
5:55
Play Video: Securing DCs from Attacks
24. Securing DCs from Attacks
4:14
Play Video: Key Vault - Fundamentals
25. Key Vault - Fundamentals
3:19
Play Video: Managing access to secrets
26. Managing access to secrets
3:56
Play Video: Securing remote access
27. Securing remote access
3:50
Play Video: Security Ops - Best Practices
28. Security Ops - Best Practices
2:58
Play Video: Importance of Interactions with Business leaders
29. Importance of Interactions with Business leaders
3:39
Play Video: Hiring right people with right mindset
30. Hiring right people with right mindset
2:18
Play Video: Metrics linked to SOC team
31. Metrics linked to SOC team
3:13
Play Video: Forensic Procedures and Endpoint Forensics
32. Forensic Procedures and Endpoint Forensics
4:32
Play Video: Chapter 2 Case Study
33. Chapter 2 Case Study
4:34
Play Video: Chapter 3 Introduction
34. Chapter 3 Introduction
0:48
Play Video: Security baselines for PaaS services
35. Security baselines for PaaS services
6:48
Play Video: Security baselines for IaaS services
36. Security baselines for IaaS services
5:27
Play Video: Security Baselines for SaaS Services
37. Security Baselines for SaaS Services
4:42
Play Video: Security requirements for IOT based workloads
38. Security requirements for IOT based workloads
6:31
Play Video: IOT Devices - Security Posture and Threat Management
39. IOT Devices - Security Posture and Threat Management
4:08
Play Video: Specify security requirements for data work loads
40. Specify security requirements for data work loads
4:52
Play Video: Security posture management for data related workloads
41. Security posture management for data related workloads
5:59
Play Video: Security requirements for Web Based Workloads
42. Security requirements for Web Based Workloads
7:29
Play Video: Security posture management for App services
43. Security posture management for App services
2:33
Play Video: Security requirements for Azure Storage Accounts
44. Security requirements for Azure Storage Accounts
9:01
Play Video: Azure Defender for Storage
45. Azure Defender for Storage
2:21
Play Video: Security recommendations for Containers
46. Security recommendations for Containers
8:26
Play Video: Defender for Containers
47. Defender for Containers
2:49
Play Video: Chapter 3 Case Study
48. Chapter 3 Case Study
3:32
Name of Video Time
Play Video: Threat Modelling - Introduction
1. Threat Modelling - Introduction
8:24
Play Video: Threat Modelling - Use Case
2. Threat Modelling - Use Case
10:49
Play Video: Understanding the application threat modelling
3. Understanding the application threat modelling
2:38
Play Video: STRIDE Methodology
4. STRIDE Methodology
3:58
Play Video: Mitigating the Identified threats
5. Mitigating the Identified threats
2:04
Play Video: Shift from Waterfall to DevOps
6. Shift from Waterfall to DevOps
1:54
Play Video: DevOps & Its Phases
7. DevOps & Its Phases
4:20
Play Video: DevSecOps and its importance
8. DevSecOps and its importance
3:00
Play Video: Onboarding applications to Azure AD
9. Onboarding applications to Azure AD
6:31
Play Video: Chapter 1 Case study
10. Chapter 1 Case study
5:11
Play Video: Chapter 2 Introduction
11. Chapter 2 Introduction
1:26
Play Video: Mitigating threats to data
12. Mitigating threats to data
4:25
Play Video: Ransomware protection
13. Ransomware protection
1:52
Play Video: Ransomware protection - Phases
14. Ransomware protection - Phases
6:26
Play Video: Strategy to identify and protect sensitive Data
15. Strategy to identify and protect sensitive Data
4:58
Play Video: Know your data with Microsoft Purview -I
16. Know your data with Microsoft Purview -I
5:42
Play Video: Govern your data with Defender for cloud apps - II
17. Govern your data with Defender for cloud apps - II
6:33
Play Video: Govern your data - Data Retention
18. Govern your data - Data Retention
5:05
Play Video: Govern your data - Records Management
19. Govern your data - Records Management
7:33
Play Video: Chapter 2 case study
20. Chapter 2 case study
5:43

Microsoft SC-100 Exam Dumps, Practice Test Questions

100% Latest & Updated Microsoft SC-100 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

Microsoft SC-100 Premium Bundle
$69.97
$49.99

SC-100 Premium Bundle

  • Premium File: 197 Questions & Answers. Last update: Jul 9, 2024
  • Training Course: 168 Video Lectures
  • Study Guide: 436 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

SC-100 Premium Bundle

Microsoft SC-100 Premium Bundle
  • Premium File: 197 Questions & Answers. Last update: Jul 9, 2024
  • Training Course: 168 Video Lectures
  • Study Guide: 436 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free SC-100 Exam Questions & SC-100 Dumps

File Name Size Votes
File Name
microsoft.selftesttraining.sc-100.v2024-05-03.by.shadow.7q.vce
Size
84.63 KB
Votes
1

Microsoft SC-100 Training Course

Want verified and proven knowledge for Microsoft Cybersecurity Architect? Believe it's easy when you have ExamSnap's Microsoft Cybersecurity Architect certification video training course by your side which along with our Microsoft SC-100 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap Microsoft Cybersecurity Architect certification video training course that goes in line with the corresponding Microsoft SC-100 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about SC-100 Exams. Don't share your email address asking for SC-100 braindumps or SC-100 exam pdf files.

Add Comment

Purchase Individually

SC-100  Premium File
SC-100
Premium File
197 Q&A
$43.99 $39.99
SC-100  Training Course
SC-100
Training Course
168 Lectures
$16.49 $14.99
SC-100  Study Guide
SC-100
Study Guide
436 Pages
$16.49 $14.99

Microsoft Training Courses

Technology Literacy for Educators Training Course
62-193
Technology Literacy for Educators
$14.99
Windows Operating System Fundamentals Training Course
98-349
Windows Operating System Fundamentals
$14.99
Designing and Implementing a Microsoft Azure AI Solution Training Course
AI-102
Designing and Implementing a Microsoft Azure AI Solution
$14.99
Microsoft Azure AI Fundamentals Training Course
AI-900
Microsoft Azure AI Fundamentals
$14.99
Microsoft Azure Administrator Training Course
AZ-104
Microsoft Azure Administrator
$14.99
Planning and Administering Microsoft Azure for SAP Workloads Training Course
AZ-120
Planning and Administering Microsoft Azure for SAP Workloads
$14.99
Configuring and Operating Microsoft Azure Virtual Desktop Training Course
AZ-140
Configuring and Operating Microsoft Azure Virtual Desktop
$14.99
Developing Solutions for Microsoft Azure Training Course
AZ-204
Developing Solutions for Microsoft Azure
$14.99
Microsoft Azure Architect Technologies Training Course
AZ-303
Microsoft Azure Architect Technologies
$14.99
Designing Microsoft Azure Infrastructure Solutions Training Course
AZ-305
Designing Microsoft Azure Infrastructure Solutions
$14.99
Designing and Implementing Microsoft DevOps Solutions Training Course
AZ-400
Designing and Implementing Microsoft DevOps Solutions
$14.99
Microsoft Azure Security Technologies Training Course
AZ-500
Microsoft Azure Security Technologies
$14.99
Designing and Implementing Microsoft Azure Networking Solutions Training Course
AZ-700
Designing and Implementing Microsoft Azure Networking Solutions
$14.99
Administering Windows Server Hybrid Core Infrastructure Training Course
AZ-800
Administering Windows Server Hybrid Core Infrastructure
$14.99
Configuring Windows Server Hybrid Advanced Services Training Course
AZ-801
Configuring Windows Server Hybrid Advanced Services
$14.99
Microsoft Azure Fundamentals Training Course
AZ-900
Microsoft Azure Fundamentals
$14.99
Designing and Implementing a Data Science Solution on Azure Training Course
DP-100
Designing and Implementing a Data Science Solution on Azure
$14.99
Data Engineering on Microsoft Azure Training Course
DP-203
Data Engineering on Microsoft Azure
$14.99
Administering Microsoft Azure SQL Solutions Training Course
DP-300
Administering Microsoft Azure SQL Solutions
$14.99
Implementing Analytics Solutions Using Microsoft Fabric Training Course
DP-600
Implementing Analytics Solutions Using Microsoft Fabric
$14.99
Microsoft Azure Data Fundamentals Training Course
DP-900
Microsoft Azure Data Fundamentals
$14.99
Microsoft Dynamics 365 for Sales Training Course
MB-210
Microsoft Dynamics 365 for Sales
$14.99
Microsoft Dynamics 365 Customer Service Functional Consultant Training Course
MB-230
Microsoft Dynamics 365 Customer Service Functional Consultant
$14.99
Microsoft Dynamics 365 for Field Service Training Course
MB-240
Microsoft Dynamics 365 for Field Service
$14.99
Microsoft Dynamics 365 Finance Functional Consultant Training Course
MB-310
Microsoft Dynamics 365 Finance Functional Consultant
$14.99
Microsoft Dynamics 365 Business Central Functional Consultant Training Course
MB-800
Microsoft Dynamics 365 Business Central Functional Consultant
$14.99
Microsoft Dynamics 365 Fundamentals Customer Engagement Apps (CRM) Training Course
MB-910
Microsoft Dynamics 365 Fundamentals Customer Engagement Apps (CRM)
$14.99
Endpoint Administrator Training Course
MD-102
Endpoint Administrator
$14.99
Microsoft Word (Word and Word 2019) Training Course
MO-100
Microsoft Word (Word and Word 2019)
$14.99
Microsoft Excel (Excel and Excel 2019) Training Course
MO-200
Microsoft Excel (Excel and Excel 2019)
$14.99
Microsoft Excel Expert (Excel and Excel 2019) Training Course
MO-201
Microsoft Excel Expert (Excel and Excel 2019)
$14.99
Microsoft 365 Administrator Training Course
MS-102
Microsoft 365 Administrator
$14.99
Microsoft 365 Messaging Training Course
MS-203
Microsoft 365 Messaging
$14.99
Managing Microsoft Teams Training Course
MS-700
Managing Microsoft Teams
$14.99
Microsoft 365 Fundamentals Training Course
MS-900
Microsoft 365 Fundamentals
$14.99
Microsoft Power Platform Functional Consultant Training Course
PL-200
Microsoft Power Platform Functional Consultant
$14.99
Microsoft Power BI Data Analyst Training Course
PL-300
Microsoft Power BI Data Analyst
$14.99
Microsoft Power Platform Developer Training Course
PL-400
Microsoft Power Platform Developer
$14.99
Microsoft Power Platform Fundamentals Training Course
PL-900
Microsoft Power Platform Fundamentals
$14.99
Microsoft Cybersecurity Architect Training Course
SC-100
Microsoft Cybersecurity Architect
$14.99
Microsoft Security Operations Analyst Training Course
SC-200
Microsoft Security Operations Analyst
$14.99
Microsoft Identity and Access Administrator Training Course
SC-300
Microsoft Identity and Access Administrator
$14.99
Microsoft Information Protection Administrator Training Course
SC-400
Microsoft Information Protection Administrator
$14.99
Microsoft Security, Compliance, and Identity Fundamentals Training Course
SC-900
Microsoft Security, Compliance, and Identity Fundamentals
$14.99

Microsoft Certifications

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.