SC 100: Design security for infrastructure
- Offered byMicrosoft
SC 100: Design security for infrastructure at Microsoft Overview
Duration | 2 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Advanced |
Official Website | Explore Free Course |
Credential | Certificate |
SC 100: Design security for infrastructure at Microsoft Course details
- Understand architecture best practices and how they are changing with the Cloud
- Design a strategy for securing server and client endpoints
- Design a strategy for securing PaaS, IaaS, and SaaS services
- Learn how to design for infrastructure security, including architecture best practices, endpoint security and cloud security for different service models (SaaS, PaaS and IaaS)
- This learning path helps prepare you for Exam SC-100: Microsoft Cybersecurity Architect
- Learn best practices for cybersecurity architecture and how they have been affected by cloud computing
- Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models
SC 100: Design security for infrastructure at Microsoft Curriculum
Understand architecture best practices and how they are changing with the Cloud
Introduction
Plan and implement a security strategy across teams
Establish a process for proactive and continuous evolution of a security strategy
Exercise: Understand architecture best practices and how they are changing with the Cloud
Knowledge check
Summary
Design a strategy for securing server and client endpoints
Introduction
Specify security baselines for server and client endpoints
Specify security requirements for servers
Specify security requirements for mobile devices and clients
Specify requirements for securing Active Directory Domain Services
Design a strategy to manage secrets, keys, and certificates
Design a strategy for secure remote access
Plan for endpoint forensics
Exercise: Design a strategy for securing server and client endpoints
Knowledge check
Summary
Design a strategy for securing PaaS, IaaS, and SaaS services
Introduction
Specify security baselines for PaaS services
Specify security baselines for IaaS services
Specify security baselines for SaaS services
Specify security requirements for IoT workloads
Specify security requirements for data workloads
Specify security requirements for web workloads
Specify security requirements for storage workloads
Specify security requirements for containers
Specify security requirements for container orchestration
Exercise: Design a strategy for securing PaaS, IaaS, and SaaS services
Knowledge check
Summary