SC 100: Design security operations identity and compliance capabilities
- Offered byMicrosoft
SC 100: Design security operations identity and compliance capabilities at Microsoft Overview
Duration | 5 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Advanced |
Official Website | Explore Free Course |
Credential | Certificate |
SC 100: Design security operations identity and compliance capabilities at Microsoft Course details
- Design solutions for regulatory compliance
- Design solutions for identity and access management
- Design solutions for securing privileged access
- Design solutions for security operations
- Case study: Design security operations, identity and compliance capabilities
- You learn how to design solutions for security operations (SecOps), identity & access management, privileged access, and regulatory compliance.
SC 100: Design security operations identity and compliance capabilities at Microsoft Curriculum
Design solutions for regulatory compliance
Introduction to regulatory compliance
Translate compliance requirements into a security solution
Address compliance requirements with Microsoft Purview
Address privacy requirements with Microsoft Priva
Address security and compliance requirements with Azure policy
Evaluate infrastructure compliance with Defender for Cloud
Knowledge check
Summary - Design solutions for regulatory requirements
Design solutions for identity and access management
Introduction to Identity and Access Management
Design cloud, hybrid and multicloud access strategies (including Azure AD)
Design a solution for external identities
Design modern authentication and authorization strategies
Align conditional access and Zero Trust
Specify requirements to secure Active Directory Domain Services (AD DS)
Design a solution to manage secrets, keys, and certificates
Knowledge check - Design solutions for identity and access management
Summary - Design solutions for identity and access management
Design solutions for securing privileged access
Introduction to privileged access
The enterprise access model
Design identity governance solutions
Design a solution to secure tenant administration
Design a solution for cloud infrastructure entitlement management (CIEM)
Design a solution for privileged access workstations and bastion services
Knowledge check - Design solutions for securing privileged access management
Summary - Design solutions for securing privileged access
Design solutions for security operations
Introduction to Security operations (SecOps)
Design security operations capabilities in hybrid and multicloud environments
Design centralized logging and auditing
Design security information and event management (SIEM) solutions
Design solutions for detection and response
Design a solution for security orchestration, automation, and response (SOAR)
Design security workflows
Design threat detection coverage
Knowledge check - Design solutions for security operations
Summary - Design solutions for security operations
Case study: Design security operations, identity and compliance capabilities
Introduction
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Knowledge check
Summary