SC-100 Microsoft Cybersecurity Architect

Torrent Details


SC-100 Microsoft Cybersecurity Architect

NAME
SC-100 Microsoft Cybersecurity Architect.torrent
CATEGORY
Other
INFOHASH
2e6e32664703fa208e035a792bcacf1af310bfbe
SIZE
4.3 GB in 98 files
ADDED
Uploaded on 05-10-2022 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Description

This course is designed for students to prepare for the SC-100: Microsoft Cybersecurity Architect exam.

The various objectives and chapters that will be covered include

Design a Zero Trust strategy and architecture

In this section, we will first cover some basic theory when it comes to aspects like Zero trust, the Cloud Adoption Framework, some tools that can be used from a security perspective when it comes to Azure. Next we will focus on the Microsoft Sentinel tool. This is an important tool from an exam perspective. We will revisit aspects such as using Data connectors, creating alerts and incidents, and the automation process. The next aspect we need to touch upon is Azure Active Directory. We need to revisit important aspects such as Application Objects, Enterprise Applications, Conditional Access , Privileged Identity management etc.

Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies

In this section, we need to cover important aspects when it comes to Microsoft Defender for Cloud. How we can use the tool to evaluate the security posture of our resources. And how we can use the various compliance policies available from within the tool. We also will have a touch base when it comes to working with Azure Blueprints as well.

Design security for infrastructure

In this section, we will learn aspects on how to secure our infrastructure. For example, how can we enhance security for services like Azure Web Apps, Azure SQL databases, Azure Storage Accounts etc.

Design a strategy for data and applications

In this section we have to look into aspects on how we can protect our data. How can we enable data at rest and in transit when it comes to services that store data.
Who this course is for:

This course is designed for those students who want to take the SC-100 Azure-based exam
This course is designed for those students who want to learn about the important security services covered from an exam perspective

Requirements

Students should have knowledge on basic security concepts
Students should have prior knowledge when it comes to working on Azure
Students should have ideally completed at least one of the pre-requisite exam – AZ-500, SC-300, SC-200, SC-400

Last Updated 9/2022

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
.pad/06.4 KB
.pad/1835.4 KB
.pad/10396.4 KB
.pad/11854.4 KB
.pad/12372.3 KB
.pad/13605.2 KB
.pad/14716.1 KB
.pad/15892.2 KB
.pad/16506.3 KB
.pad/17398.9 KB
.pad/18223.6 KB
.pad/19291.9 KB
.pad/2129.9 KB
.pad/20298.3 KB
.pad/21517.4 KB
.pad/22641.7 KB
.pad/23290.7 KB
.pad/24925.6 KB
.pad/2569.6 KB
.pad/26452.8 KB
.pad/27689.7 KB
.pad/28882.5 KB
.pad/29965.7 KB
.pad/3658.8 KB
.pad/30181.5 KB
.pad/31259.4 KB
.pad/32728 KB
.pad/4145.4 KB
.pad/5588.6 KB
.pad/6397.4 KB
.pad/7608.9 KB
.pad/8924.4 KB
.pad/9328.4 KB
TutsNode.net.txt63 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/1. Slides and Diagrams download.html141 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp476.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp461.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4121.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/18. Lab - Microsoft Sentinel - Generating Incidents - Resources.html303 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/2. How are we approaching this course.mp451.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/20. Lab - Microsoft Sentinel - Virtual Machines - Incidents.mp451.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/21. Lab - Microsoft Sentinel - Virtual Machines - Incidents - Resources.html229 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4102.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/24.1 Microsoft Sentinel - Threat Intelligence.html139 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp482.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25.1 NSG Flow Logs.html157 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/27.1 RBAC in-built roles.html140 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp486.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/31. Installing the Postman tool.html2.4 KB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4137 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip101.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/33. Installing Visual Studio 2022.html1.5 KB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp473.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/37. Review - Conditional Access Policies.mp456.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp474.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/41. Azure B2C.mp451.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/45. Section Quiz.html159 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/13. Microsoft Defender for Cloud - Remediations.html576 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp484.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/15.1 Azure and AWS Security.html162 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp491.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/19. Example on using Azure Blueprints - Resources.html6.8 KB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/2. Review of Azure Policy service.mp452.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/20. Section Quiz.html159 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/4. Microsoft Defender for Cloud - Initial Look.mp457.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/5. Azure Security Benchmark.mp456.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp488.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp489.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/9. Microsoft Defender for Cloud - Workflow Automation.mp448.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/11. Creating an Azure SQL database.mp459.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/14. Azure Web Apps - Enabling Diagnostics.mp459.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/21. Lab - Creating an Azure Cosmos DB Account - Resources.html587 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/23. Example of an application connecting to Azure Cosmos DB - Resources.html187 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp485.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/25. Storing Azure Cosmos DB keys - Resources.html160 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/26. Azure Cosmos DB logs.html463 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4113.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/30. Building a Docker Image - Resources.html155 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/30.1 commands.txt628 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/30.2 Dockerfile.original114 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4108.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/32. Deploying the container - Resources.html155 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/32.1 Deployment.yml362 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/32.2 Service.yml187 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/37. Quick look at Microsoft Defender for Endpoint.mp456.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/38. Section Quiz.html159 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/5. Azure Storage Account Authorization - Shared Access Signature.mp456.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp471.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/14.1 Developing secure applications.html131 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4102.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/17. Simple implementation of Azure Front Door.mp459.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/17.1 Restricting access to Front Door.html194 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/19. Azure Front Door Log details.html1018 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp470.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/4. Lab - Azure SQL database - Dynamic data masking - Resources.html733 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/5. Azure SQL database - Classification of data.mp457.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/5. Practice Section/1. Practice Test 1.html159 B
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/5. Practice Section/2. Practice Test 2.html159 B

Alternative Torrents for 'SC Microsoft Cybersecurity Architect'.

There are no alternative torrents found.