SC 100: Design a Zero Trust strategy and architecture
- Offered byMicrosoft
SC 100: Design a Zero Trust strategy and architecture at Microsoft Overview
Duration | 4 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Advanced |
Official Website | Explore Free Course |
Credential | Certificate |
SC 100: Design a Zero Trust strategy and architecture at Microsoft Course details
- Build an overall security strategy and architecture
- Design a security operations strategy
- Design an identity security strategy
- Learn how to design an organizations security strategy, including security operations and identity based on the principles of Zero Trust
- This learning path helps prepare you for Exam SC-100: Microsoft Cybersecurity Architect
- Learn how to build an overall security strategy and architecture with zero trust in mind
- Learn how to design a cybersecurity strategy for security operations (SecOps)
SC 100: Design a Zero Trust strategy and architecture at Microsoft Curriculum
Build an overall security strategy and architecture
Introduction
Zero Trust overview
Develop Integration points in an architecture
Develop security requirements based on business goals
Translate security requirements into technical capabilities
Design security for a resiliency strategy
Design a security strategy for hybrid and multi-tenant environments
Design technical and governance strategies for traffic filtering and segmentation
Exercise: Build an overall security strategy and architecture
Knowledge check
Summary
Design a security operations strategy
Introduction
Understand security operations frameworks, processes, and procedures
Design a logging and auditing security strategy
Develop security operations for hybrid and multi-cloud environments
Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR)
Evaluate security workflows
Review security strategies for incident management
Evaluate security operations for technical threat intelligence
Monitor sources for insights on threats and mitigations
Exercise: Design a security operations strategy
Knowledge check
Summary
Design an identity security strategy
Introduction
Secure access to cloud resources
Recommend an identity store for security
Recommend secure authentication and security authorization strategies
Secure conditional access
Design a strategy for role assignment and delegation
Define Identity governance for access reviews and entitlement management
Design a security strategy for privileged role access to infrastructure
Design a security strategy for privileged activities
Exercise: Design an identity security strategy
Knowledge check
Summary