Udemy – SC-100 Microsoft Cybersecurity Architect course with sims By John Christopher 08-2024
English | Tutorial | Size: 12.17 GB
We really hope you’ll agree, this training is way more then the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Design a resiliency strategy for ransomware & other attacks based on MS Security
Working with business resiliency goals, identifying and prioritizing threats
MS ransomware best practices, including backup, restore, and privileged access
Secure backup and restore by using Azure Backup
Security updates using the Azure Update Manager
Design solutions that align with the MCRA and MCSB
Concepts of cybersecurity capabilities and controls using Zero Trust security
Concepts of MS Defender for protecting against insider and external attacks
Navigating the Microsoft Defender and Microsoft Purview admin centers
Understanding insider risk policies as a mitigation solution
Implementing insider risk management policies in Microsoft Purview
Using the Zero Trust Rapid Modernization Plan (RaMP) as your security strategy
Design solutions that align with the Microsoft CAF and WAF Frameworks
Security and governance based on Microsoft Cloud Adoption Framework (CAF)
Security and governance based on Microsoft Azure Well-Architected Framework
Using Azure landing zones for implementing and governing security
The DevSecOps process model
Design solutions for security operations
Security operations capabilities to support a hybrid or multicloud environment
Requirements for centralized logging and auditing
Setting audit permissions and enabling support
Perform threat hunting by with audit logging
Understanding the Kusto Query Language (KQL) for use in threat hunting
Detection and response concepts of extended detection and response (XDR)
Confirming we understand the concept of Microsoft Sentinel
Setting up a Log Analytics workspace and Microsoft Sentinel workspace
Confirming we understand the concepts of SIEM and SOAR
Visualizing data ingestion for use in Microsoft Sentinel
Understanding analytic rules in Microsoft Sentinel to support SIEM and SOAR
Workflow for creating security analytic rules for incident response & management
Workflow for creating built-in scheduled query rules
Workflow for creating near-real-time (NRT) analytics rules
Automation with security orchestration automated response (SOAR)
Utilizing content gallery hunting queries for threat hunting
Threat detection coverage by using MITRE ATT&CK
Design solutions for identity and access management
Understanding SaaS, PaaS, and IaaS, & how it relates to Azure hybrid/on-premise
Use cases with SaaS, PaaS, & IaaS including identity, networking, applications
External identities, business-to-business (B2B), & business-to-customer (B2C)
Managing business-to-business (B2B) settings within Entra ID
Using Entra ID external identities for a business-to-business (B2B) solution
Creating a tenant for using business-to-customer (B2C) scenarios
Decentralized identities with the help of Microsoft Entra Verified ID
Threat mitigation with sign-in logs in Microsoft Entra ID
Understanding Entra Identity Protection for continuous access evaluation
Using Entra Identity Protection for securing authentication and authorization
Threat intelligence integration from Entra Identity Protection into MS Defender
Understanding Multi Factor Authentication (MFA)
Implementing Muti Factor Authentication in Microsoft Entra ID
Implementing Self Service Password Reset (SSPR) in Microsoft Entra ID
Understanding Conditional Access Policies with a Zero Trust strategy
Implementing Conditional Access Policies with a Zero Trust strategy
Concepts of threat intelligence integration with Defender for Cloud
Design and configure workflow automation in Microsoft Defender for Cloud
Setting up email notifications within Defender for Cloud
Create and manage alert suppression rules
Generate sample alerts and incidents in Microsoft Defender for Cloud
Remediate alerts and incidents by using MS Defender for Cloud recommendations
Manage security alerts and incidents
Analyze Microsoft Defender for Cloud threat intelligence reports
Concepts of securing the various types of identities using Defender for Identity
Hybrid Active Directory Domain Services (ADDS) connections for secure identities
Creating an Azure Key Vault for secrets, keys, and certificates
Access control to secrets, keys, and certificates with Azure Key Vault
Managing secrets, keys, and certificates with Azure Key vault
Removing key vault services
Design solutions for securing privileged access
Assigning and delegating privileged roles by using the enterprise access model
Understanding RBAC for Identity governance & privileged access management
Implementing RBAC to provide privileged access management in Entra ID & Azure
Creating a custom RBAC role in Microsoft Entra ID
Using RBAC to provide access to Azure resources
Implementing RBAC to provide privileged access management in Microsoft 365
Understanding Microsoft Entra Privileged Identity Management (PIM)
Implementing Microsoft Entra Privileged Identity Management (PIM)
Understanding entitlement management as an identity governance solution
Creating catalogs for entitlement management
Implementing entitlement management with Microsoft Entra Permissions Management
User access request entitlement management to an access package
Identity governance with access reviews in Microsoft Entra
Privileged Access Workstation (PAW) and bastion services
Design solutions for regulatory compliance
Determining compliance requirements for security solution adaptation
Solutions that address compliance requirements by using Microsoft Purview
Utilizing Microsoft Priva for privacy requirements
Creating Privacy Risk Management policies to meet privacy requirements
Azure Policy solutions to address security and compliance requirements
Compliance with Microsoft Defender for Cloud
Design solutions for security posture management in hybrid and multicloud
Security posture with regulatory compliance policies and MCSB
Security posture with Microsoft Defender for Cloud
Security posture with Microsoft Secure Score
Enabling support for Defender for servers within Defender for Cloud
Enabling Microsoft Defender for Servers as a cloud workload protection solution
Enabling Microsoft Defender for App Service as a cloud app protection solution
Integration with hybrid and multicloud environments by using Azure Arc
Support for Microsoft Defender for DevOps within Defender for Cloud
Utilizing Microsoft Defender External Attack Surface Management (Defender EASM)
Design solutions for securing server and client endpoints
Using Microsoft Defender for Endpoint for securing multiple platforms and OS’
Configuring settings in Microsoft Defender for Endpoint
Utilizing Microsoft Intune for mobile devices & client for endpoint protection
Managing security requirements on mobile devices & clients endpoints with Intune
Using security baselines to secure servers and client endpoints
IoT, OT and ICS security discovery using Microsoft Defender for IoT
Secure remote access with Microsoft Entra Global Secure Access
Specify requirements for securing SaaS, PaaS, and IaaS services
Security baselines for SaaS, PaaS, and IaaS services
Security in your IoT workloads
Web workload management with Azure App Service plans
Creating an Azure App Service plan
Adding an App Service for web workloads
Securing web workloads with Azure App Services
Understanding containers in Azure
Creating a container instance in Azure
Securing Azure container instances
Container orchestration with Azure Kubernetes Service (AKS)
Scaling container orchestration with Azure Kubernetes Service (AKS)
Securing container orchestration with Azure Kubernetes Service (AKS)
Design solutions for securing Microsoft 365
Posture with Microsoft Secure Score & Microsoft Defender for Cloud secure score
Requirements for a Microsoft 365 Defender security solution
Secure configuration & operational practices for Microsoft 365 workloads & data
Design solutions for securing applications
Securing existing application portfolios and business-critical applications
Standards and practices for securing the application development process
Considerations for API management and security solutions
Understanding secure access with Azure Web Application Firewall (WAF)
Use cases for implementing the Azure Front Door
Setting up an Azure Web Application Firewall (WAF) & Azure Front Door
Removing existing resources up to this point
Design solutions for securing an organization’s data
Understanding data discovery and classification with Purview sensitivity labels
Managing sensitive info types for a classification data governance solution
Implementing a data governance & classification solution with sensitivity labels
Visualizing protection solutions with data at rest, data in motion & data in use
Understanding the concepts of relational databases
Setting up an Azure SQL database and connecting with SSMS
Configuring Azure SQL firewall settings for client connections
Utilizing Azure SQL dynamic masking
Utilizing Azure SQL database encryption
Understanding the concepts of non-relational data and NoSQL
Setting up an Azure Cosmos DB solution in Azure
Protection and durability with replication of an Azure Cosmos DB
Remove existing database resources
Grasping the purposes of Azure Synapse Analytics
Registering Azure Synapse as a resource provider
Creating a SQL DB and server for use with Azure Synapse Analytics
Adding an Azure Synapse workspace and Data Lake Storage account
Visualizing the concepts of SQL Pool usage with Azure Synapse Analytics
Setting up a SQL Pool for usage with Azure Synapse
Confirming we understand the concepts of Azure Storage accounts
Creating an Azure Storage account as a data storage solution
Mitigating threats to data within our Azure Storage account solution
Enabling Defender for Storage within a Azure Storage account
Utilizing Microsoft Defender for SQL as a security solution
Conclusion
Cleaning up resource
Getting a Udemy certificate
BONUS Where do I go from here?
RAPIDGATOR:
rapidgator.net/file/98029b3523d4272409b7dfafda68827b/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part01.rar.html
rapidgator.net/file/b30fa97d7fa573edd25b14660fff05d7/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part02.rar.html
rapidgator.net/file/19d0c0894faec7ebc5ab9dd9d1385512/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part03.rar.html
rapidgator.net/file/036729375354ae62b00f09c9d62834d9/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part04.rar.html
rapidgator.net/file/c0a3fdad5f16f10ef0ca0b9a2a5040d1/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part05.rar.html
rapidgator.net/file/a8cab70034c425d5887e27d82409269b/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part06.rar.html
rapidgator.net/file/eb59e6f05f6eef4071285bfc0d0e836a/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part07.rar.html
rapidgator.net/file/c0914ebde0ecee02c832acea0353d277/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part08.rar.html
rapidgator.net/file/a1d4b3c88eb6e3a13be9fec7ce222d1a/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part09.rar.html
rapidgator.net/file/67f20c5f8365f633660098b29f1eba84/Udemy_-_SC-100_Microsoft_Cybersecurity_Architect_course_with_sims_By_John_Christopher_08-2024.part10.rar.html
TURBOBIT:
tbit.to/anasziigtd8h/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part01.rar.html
tbit.to/bdpidockwdtn/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part02.rar.html
tbit.to/n2wy1degje2y/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part03.rar.html
tbit.to/goq7xe8qco59/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part04.rar.html
tbit.to/0pmajl6a2ty7/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part05.rar.html
tbit.to/zk07nrpty36a/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part06.rar.html
tbit.to/kuc03ag52pto/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part07.rar.html
tbit.to/xq1a2skz58iu/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part08.rar.html
tbit.to/e1mcf9auix2l/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part09.rar.html
tbit.to/f02saz26xzof/Udemy%20-%20SC-100%20Microsoft%20Cybersecurity%20Architect%20course%20with%20sims%20By%20John%20Christopher%2008-2024.part10.rar.html