Exam Ref SC-100 Microsoft Cybersecurity Architect, 1st edition

Published by Microsoft Press (February 6, 2023) © 2023

  • Yuri Diogenes
  • Sarah Young
  • Mark Simos
  • Gladys Rodriguez
Products list
Products list

This product is expected to ship within 5-7 business days for Australian customers.

Title overview

Prepare for Microsoft Exam SC-100

Demonstrate your real-world mastery of skills and knowledge needed to design and evolve cybersecurity strategy for all aspects of enterprise architecture. Designed for experienced IT professionals, this Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certfied: Cybersecurity Architect Expert level.

Focus on the expertise measured by these objectives:

  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design a strategy for data and applications
  • Recommend security best practices and priorities

This Microsoft Exam Ref:

  • Organises its coverage by exam objectives
  • Features strategic, what-if scenarios to challenge you
  • Assumes you have advanced security engineering experience and knowledge and experience with hybrid and cloud implementations

About the Exam

Exam SC-100 focuses on the knowledge needed to build overall security strategy and architecture; design strategies for security operations, identity security, and regulatory compliance; evaluate security posture; recommend technical strategies to manage risk; design strategies to secure server endpoints, client endpoints, and SaaS, PaaS, and IaaS services; specify application security requirements; design data security strategy; recommend security best practices based on Microsoft Cybersecurity Reference Architecture and Azure Security Benchmarks; use the Cloud Adoption Framework to recommend secure methodologies; use Microsoft Security Best Practices to recommend ransomware strategies.

Table of contents

  • CHAPTER 1 Build an overall security strategy and architecture
  • CHAPTER 2 Design a security operations strategy
  • CHAPTER 3 Design an identity security strategy
  • CHAPTER 4 Design a regulatory compliance strategy
  • CHAPTER 5 Evaluate security posture and recommend technical strategies to manage risk
  • CHAPTER 6 Design a strategy for securing server and client endpoints
  • CHAPTER 7 Design a strategy for securing SaaS, PaaS, and IaaS services
  • CHAPTER 8 Specify security requirements for applications
  • CHAPTER 9 Design a strategy for securing data
  • CHAPTER 10 Microsoft Cybersecurity Reference Architectures and Microsoft cloud security benchmark best practices
  • CHAPTER 11 Recommend a secure methodology by using the Cloud Adoption Framework (CAF)
  • CHAPTER 12 Recommend a ransomware strategy by using Microsoft Security Best Practices

Need help?Get in touch