SC-100: Recommend security best practices
- Offered byMicrosoft
SC-100: Recommend security best practices at Microsoft Overview
Duration | 1 hour |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Advanced |
Official Website | Explore Free Course |
Credential | Certificate |
SC-100: Recommend security best practices at Microsoft Course details
- Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks
- Recommend a secure methodology using the Cloud Adoption Framework (CAF)
- Recommend a ransomware strategy by using Microsoft Security Best Practices
- You'll learn how to use critical Microsoft security best practices to improve an organizations security posture, apply zero trust principles and minimize risk from emerging attacks
- You'll learn how to use guidance in Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks to help an organization apply Zero Trust principles and secure their infrastructure
- You'll learn how to use the Cloud Adoption Framework to recommend security best practices that help an organization move to the cloud while improving overall security posture
- You'll learn how to execute the three important phases of ransomware protection: create a recovery plan, limit the scope of damage, make it hard to get in
SC-100: Recommend security best practices at Microsoft Curriculum
Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks
Introduction
Recommend best practices for cybersecurity capabilities and controls
Recommend best practices for protecting from insider and external attacks
Recommend best practices for Zero Trust security
Recommend best practices for Zero Trust Rapid Modernization Plan
Knowledge check
Summary
Recommend a secure methodology using the Cloud Adoption Framework (CAF)
Introduction
Recommend a DevSecOps process
Recommend a methodology for asset protection
Recommend strategies for managing and minimizing risk
Knowledge check
Summary
Recommend a ransomware strategy by using Microsoft Security Best Practices
introduction
Plan for ransomware protection and extortion-based attacks
Protect assets from ransomware attacks
Recommend Microsoft ransomware best practices
Knowledge check
Summary