SC 100: Design solutions that align with security best practices and priorities
- Offered byMicrosoft
SC 100: Design solutions that align with security best practices and priorities at Microsoft Overview
Duration | 3 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Advanced |
Official Website | Explore Free Course |
Credential | Certificate |
SC 100: Design solutions that align with security best practices and priorities at Microsoft Course details
- Introduction to Zero Trust and best practice frameworks
- Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
- Design a resiliency strategy for common cyberthreats like ransomware
- You learn how to use critical Microsoft security best practices such as the Cloud Adoption Framework (CAF), Well-Architected Framework (WAF), Microsoft Cybersecurity Reference Architecture (MCRA) to improve an organizations security posture, apply zero trust principles and minimize risk from emerging attacks.
SC 100: Design solutions that align with security best practices and priorities at Microsoft Curriculum
Introduction to Zero Trust and best practice frameworks
Introduction to best practices
Introduction to Zero Trust
Zero Trust initiatives
Zero Trust technology pillars part 1
Zero Trust technology pillars part 2
Knowledge check - Introduction to Zero Trust and best practice frameworks
Summary - Introduction to Zero Trust and best practice frameworks
Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Define a security strategy
Introduction to the Cloud Adoption Framework
Cloud Adoption Framework secure methodology
Introduction to Azure Landing Zones
Design security with Azure Landing Zones
Introduction to the Well-Architected Framework
The Well-Architected Framework security pillar
Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
Design solutions with best practices for capabilities and controls
Design solutions with best practices for attack protection
Knowledge check - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
Summary - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
Design a resiliency strategy for common cyberthreats like ransomware
Common cyberthreats and attack patterns
Support business resiliency
Ransomware protection
Configurations for secure backup and restore
Security updates
Knowledge check - Design a resiliency strategy for common cyberthreats
Summary - Design a resiliency strategy for common cyberthreats like ransomware