Exam Ref SC-100 Microsoft Cybersecurity Architect, 1st edition

Published by Microsoft Press (January 24, 2023) © 2023

  • Yuri Diogenes
  • Sarah Young
  • Mark Simos
  • Gladys Rodriguez
Products list

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com

This product is expected to ship within 3-6 business days for US and 5-10 business days for Canadian customers.

Title overview

Prepare for Microsoft Exam SC-100

Demonstrate your real-world mastery of skills and knowledge needed to design and evolve cybersecurity strategy for all aspects of enterprise architecture. Designed for experienced IT professionals, this Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certfied: Cybersecurity Architect Expert level.

Focus on the expertise measured by these objectives:

  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design a strategy for data and applications
  • Recommend security best practices and priorities

This Microsoft Exam Ref:

  • Organises its coverage by exam objectives
  • Features strategic, what-if scenarios to challenge you
  • Assumes you have advanced security engineering experience and knowledge and experience with hybrid and cloud implementations

About the Exam

Exam SC-100 focuses on the knowledge needed to build overall security strategy and architecture; design strategies for security operations, identity security, and regulatory compliance; evaluate security posture; recommend technical strategies to manage risk; design strategies to secure server endpoints, client endpoints, and SaaS, PaaS, and IaaS services; specify application security requirements; design data security strategy; recommend security best practices based on Microsoft Cybersecurity Reference Architecture and Azure Security Benchmarks; use the Cloud Adoption Framework to recommend secure methodologies; use Microsoft Security Best Practices to recommend ransomware strategies.

Table of contents

CHAPTER 1      Build an overall security strategy and architecture

CHAPTER 2      Design a security operations strategy

CHAPTER 3      Design an identity security strategy

CHAPTER 4      Design a regulatory compliance strategy

CHAPTER 5      Evaluate security posture and recommend technical strategies to manage risk

CHAPTER 6      Design a strategy for securing server and client endpoints

CHAPTER 7      Design a strategy for securing SaaS, PaaS, and IaaS services

CHAPTER 8      Specify security requirements for applications

CHAPTER 9      Design a strategy for securing data

CHAPTER 10    Microsoft Cybersecurity Reference Architectures and Microsoft cloud security benchmark best practices

CHAPTER 11    Recommend a secure methodology by using the Cloud Adoption Framework (CAF)

CHAPTER 12    Recommend a ransomware strategy by using Microsoft Security Best Practices

Need help?Get in touch