Book Image

Microsoft Cybersecurity Architect Exam Ref SC-100

By : Dwayne Natwick
5 (1)
Book Image

Microsoft Cybersecurity Architect Exam Ref SC-100

5 (1)
By: Dwayne Natwick

Overview of this book

Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you’ll have everything you need to pass the SC-100 exam. This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you’ll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions. By the end of this book, you’ll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors.
Table of Contents (20 chapters)
1
Part 1: The Evolution of Cybersecurity in the Cloud
3
Part 2: Designing a Zero-Trust Strategy and Architecture
7
Part 3: Evaluating Governance, Risk, and Compliance (GRC) Technical Strategies and Security Operations Strategies
10
Part 4: Designing Security for Infrastructure
13
Part 5: Designing a Strategy for Data and Applications

What this book covers

Chapter 1, Cybersecurity in the Cloud, provides an overview of what cybersecurity is and why it is important. This chapter also discusses the evolution of cybersecurity and cyber attacks as cloud technologies have become more prevalent.

Chapter 2, Building an Overall Security Strategy and Architecture, focuses on the design and architecture of an overall security strategy. This includes the utilization of the Microsoft Cybersecurity Reference Architectures (MCRA) and how to align security requirements with business goals and objectives.

Chapter 3, Designing a Security Operations Strategy, discusses how to design and architect a security operations strategy.

Chapter 4, Designing an Identity Security Strategy, discusses how to design an identity security strategy for cloud-native, hybrid, and multi-cloud identity and access management infrastructures.

Chapter 5, Designing a Regulatory Compliance Strategy, discusses the planning and design of a regulatory compliance strategy.

Chapter 6, Evaluating the Security Posture and Recommending Technical Strategies to Manage Risk, discusses how to evaluate security posture and recommends technical strategies to manage and reduce risk.

Chapter 7, Designing a Strategy for Securing Server and Client Endpoints, focuses on designing a strategy for securing servers and client endpoints.

Chapter 8, Designing a Strategy for Securing SaaS, PaaS, and IaaS, discusses how to design security strategies for SaaS, PaaS, and IaaS infrastructures.

Chapter 9, Specifying Security Requirements for Applications, discusses specifying security requirements for applications.

Chapter 10, Designing a Strategy for Securing Data, discusses designing a strategy for securing data and mitigating threats.

Chapter 11, Case Study Responses and Final Assessment/Mock Exam, provides possible responses to the case studies and sample questions that can be used to test your knowledge and understanding of the content from this book.

Appendix: Preparing for Your Microsoft Exam, provides guidance on getting prepared for a Microsoft exam along with resources that can assist in your learning plan. This includes helpful links along with steps on how to gain access to a trial Microsoft 365 subscription for hands-on practice.