Bookmarks
Fältet Favoriter
SC-100
Module 1
- Zero Trust Rapid Modernization Plan | Microsoft Learn
- Accelerate cloud adoption with the Microsoft Cloud Adoption Framework for Azure - Training | Microsoft Learn
- Use the Cloud Adoption Framework to manage organizational alignment - Training | Microsoft Learn
- Microsoft Cloud Adoption Framework for Azure - Cloud Adoption Framework | Microsoft Learn
- MITRE ATT&CK®
- Zero Trust Guidance Center | Microsoft Learn
- Knowledge check - Introduction to Zero Trust and best practice frameworks - Training | Microsoft Learn
- Introduction to Zero Trust and best practice frameworks - Training | Microsoft Learn
Module 2
- Azure Well-Architected Framework - Microsoft Azure Well-Architected Framework | Microsoft Learn
- Security quick links - Microsoft Azure Well-Architected Framework | Microsoft Learn
- Overview of the Microsoft cloud security benchmark | Microsoft Learn
- Microsoft Cybersecurity Architect Knowledge Check Question
- Case Study Module 2
- Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) - Training | Microsoft Learn
- Define a security strategy - Cloud Adoption Framework | Microsoft Learn
- Assessments | Cloud Adoption Security Review
- Security in the Microsoft Cloud Adoption Framework for Azure - Cloud Adoption Framework | Microsoft Learn
- What is an Azure landing zone? - Cloud Adoption Framework | Microsoft Learn
- Security design in Azure - Cloud Adoption Framework | Microsoft Learn
- Well-Architected assessment for mission-critical workloads on Azure - Microsoft Azure Well-Architected Framework | Microsoft Learn
Module 3
- Microsoft Cybersecurity Reference Architectures (MCRA) | Microsoft Learn
- Security Adoption Resources | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect
- Knowledge check - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark - Training | Microsoft Learn
- Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) - Training | Microsoft Learn
- Unified Kill Chain: Raising Resilience Against Cyber Attacks
Module 4
- Design a resiliency strategy for common cyberthreats like ransomware - Training | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect
- Azure Automation update management - Azure Architecture Center | Microsoft Learn
- Azure Automation Update Management overview | Microsoft Learn
- Security features that protect hybrid backups - Azure Backup | Microsoft Learn
- Guidance and best practices - Azure Backup | Microsoft Learn
- Get started quickly configuring ransomware prevention so you can stop ransomware cybercriminals from targeting your organization. | Microsoft Learn
- Business resilience - Cloud Adoption Framework | Microsoft Learn
- Securing privileged access overview - Privileged access | Microsoft Learn
Module 5
- Introduction to regulatory compliance - Cloud Adoption Framework | Microsoft Learn
- Hantering av efterlevnad i molnet
- Managing compliance in the cloud
- Security Baseline discipline overview - Cloud Adoption Framework | Microsoft Learn
- Overview of Azure Blueprints - Azure Blueprints | Microsoft Learn
- Create & deploy template specs in Bicep - Azure Resource Manager | Microsoft Learn
- Create & deploy deployment stacks in Bicep - Azure Resource Manager | Microsoft Learn
- Microsoft Purview Compliance Manager | Microsoft Learn
- Overview of Azure Policy - Azure Policy | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect
- Learn about Microsoft Priva - Microsoft Priva | Microsoft Learn
- Remediate non-compliant resources - Azure Policy | Microsoft Learn
- Improve regulatory compliance in Microsoft Defender for Cloud - Microsoft Defender for Cloud | Microsoft Learn
- Defender for Cloud Planning and Operations Guide - Microsoft Defender for Cloud | Microsoft Learn
Module 6
- Azure identity and access management design area - Cloud Adoption Framework | Microsoft Learn
- Compare Active Directory to Microsoft Entra ID - Microsoft Entra | Microsoft Learn
- Deploy AD DS in an Azure virtual network - Azure Architecture Center | Microsoft Learn
- Secure Microsoft Entra Domain Services - Microsoft Entra ID | Microsoft Learn
- Microsoft Entra External ID documentation - Microsoft Entra External ID | Microsoft Learn
- Microsoft Entra External ID overview - Microsoft Entra External ID | Microsoft Learn
- Continuous access evaluation in Microsoft Entra - Microsoft Entra ID | Microsoft Learn
- Building a Conditional Access policy - Microsoft Entra ID | Microsoft Learn
- What is Microsoft Entra ID Protection? - Microsoft Entra ID Protection | Microsoft Learn
- Conditional Access design principles and dependencies - Azure Architecture Center | Microsoft Learn
- Workload identities - Microsoft Entra Workload ID | Microsoft Learn
- Overview of Key Management in Azure | Microsoft Learn
- Best practices for using Azure Key Vault | Microsoft Learn
- What is Azure Key Vault? | Microsoft Learn
- Azure Key Vault Overview - Azure Key Vault | Microsoft Learn
- Best practices for using Azure Key Vault | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect
- Azure Key Vault soft-delete | Microsoft Learn
Module 7
- Securing privileged access Enterprise access model - Privileged access | Microsoft Learn
- What is Privileged Identity Management? - Microsoft Entra ID Governance | Microsoft Learn
- Privileged Access Management for Active Directory Domain Services | Microsoft Learn
- Learn about privileged access management | Microsoft Learn
- What is entitlement management? - Microsoft Entra ID Governance | Microsoft Learn
- What are access reviews? - Microsoft Entra - Microsoft Entra ID Governance | Microsoft Learn
- What is Azure Lighthouse? - Azure Lighthouse | Microsoft Learn
- Azure Lighthouse in enterprise scenarios - Azure Lighthouse | Microsoft Learn
- Microsoft Entra Permissions Management - Microsoft Entra Permissions Management | Microsoft Learn
- Why are privileged access devices important - Privileged access | Microsoft Learn
- About Azure Bastion | Microsoft Learn
Module 8
- Cloud SOC functions - Cloud Adoption Framework | Microsoft Learn
- Unified operations for hybrid, multicloud, and edge - Cloud Adoption Framework | Microsoft Learn
- Azure Monitor overview - Azure Monitor | Microsoft Learn
- Workspace architecture best practices for Microsoft Sentinel | Microsoft Learn
- Introduction to automation in Microsoft Sentinel | Microsoft Learn
- Evaluate and pilot Microsoft Defender XDR security, an XDR solution that unifies threat data so you can take action. | Microsoft Learn
- Understand threat intelligence in Microsoft Sentinel | Microsoft Learn
- Hunting capabilities in Microsoft Sentinel | Microsoft Learn
- View MITRE coverage for your organization from Microsoft Sentinel | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect
Module 9
- Zero Trust deployment plan with Microsoft 365 | Microsoft Learn
- Integrate Azure and Microsoft Defender XDR security services - Azure Architecture Center | Microsoft Learn
- Office 365 Security including Microsoft Defender for Office 365 and Exchange Online Protection | Microsoft Learn
- Assess your security posture through Microsoft Secure Score | Microsoft Learn
Module 10
- DevSecOps controls - Cloud Adoption Framework | Microsoft Learn
- OWASP Top Ten | OWASP Foundation
- OWASP Developer Guide | Zed Attack Proxy | OWASP Foundation
- Azure API Management - Overview and key concepts | Microsoft Learn
- Azure security baseline for API Management | Microsoft Learn
- Virtual network integrated serverless microservices - Azure Architecture Center | Microsoft Learn
- Introduction to Azure Web Application Firewall | Microsoft Learn
- What is Azure Web Application Firewall on Azure Application Gateway? - Azure Web Application Firewall | Microsoft Learn
- What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
- What is Azure web application firewall on Azure CDN? | Microsoft Learn
- Azure Front Door | Microsoft Learn
- What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
- What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
- Tutorial: Create a WAF policy for Azure Front Door - Azure portal | Microsoft Learn
- What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
- What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
- Application lifecycle management in Azure Container Apps | Microsoft Learn
Module 11
- https://web.purview.azure.com/resource/
- How to search the Data Catalog | Microsoft Learn
- Understand Insights reports in Microsoft Purview | Microsoft Learn
- Understand Insights reports in Microsoft Purview | Microsoft Learn
- Azure Storage in-place data sharing with Microsoft Purview (preview) | Microsoft Learn
- Data security and encryption best practices - Microsoft Azure | Microsoft Learn
- Encryption strategy recommendations - Microsoft Azure Well-Architected Framework | Microsoft Learn
- Data Discovery & Classification - Azure SQL Database & Azure SQL Managed Instance & Azure Synapse Analytics | Microsoft Learn
- Microsoft Defender for Storage - the benefits and features - Microsoft Defender for Cloud | Microsoft Learn
- Azure Storage encryption for data at rest | Microsoft Learn
- Microsoft Defender for Azure SQL - the benefits and features - Microsoft Defender for Cloud | Microsoft Learn
- Microsoft uses threat intelligence to protect, detect, and respond to threats - Inside Track Blog
- Protect your Azure storage accounts using Microsoft Defender for Cloud - Azure Storage | Microsoft Learn
Module 12
- Shared responsibility in the cloud - Microsoft Azure | Microsoft Learn
- Best practices for secure PaaS deployments - Microsoft Azure | Microsoft Learn
- Azure Resource Manager overview - Azure Resource Manager | Microsoft Learn
- Availability sets overview - Azure Virtual Machines | Microsoft Learn
- Microsoft Antimalware for Azure | Microsoft Learn
- What is Microsoft Defender for Cloud? - Microsoft Defender for Cloud | Microsoft Learn
- Enable Azure Disk Encryption for Linux VMs - Azure Virtual Machines | Microsoft Learn
- dm-crypt - Wikipedia
- BitLocker Drive Encryption Overview | Microsoft Learn
- Azure Key Vault documentation | Microsoft Learn
- Overview - Azure App Service | Microsoft Learn
- What is Azure Cloud Services (classic) | Microsoft Learn
- Azure DDoS Protection Overview | Microsoft Learn
- Penetration testing | Microsoft Learn
- Azure security baseline for App Service | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect
- Azure security baseline for Azure Kubernetes Service (AKS) | Microsoft Learn
- Security best practices for IaaS workloads in Azure | Microsoft Learn
Module 13
- Introduction to hybrid and multicloud - Cloud Adoption Framework | Microsoft Learn
- Cloud Security Posture Management (CSPM) - Microsoft Defender for Cloud | Microsoft Learn
- Secure score in Microsoft Defender for Cloud - Microsoft Defender for Cloud | Microsoft Learn
- Plan a Defender for Servers deployment to protect on-premises and multicloud servers - Microsoft Defender for Cloud | Microsoft Learn
- Microsoft Defender for App Service - the benefits and features - Microsoft Defender for Cloud | Microsoft Learn
- How to enable Microsoft Defender for SQL servers on machines - Microsoft Defender for Cloud | Microsoft Learn
- Introduction to Azure Arc landing zone accelerator for hybrid and multicloud - Cloud Adoption Framework | Microsoft Learn
- Visio Drawing: Azure Arc Landing zone accelerator
- Microsoft Defender for Cloud integration with Defender External attack surface management (EASM) - Microsoft Defender for Cloud | Microsoft Learn
- Defender EASM Overview
- SC-100-Microsoft-Cybersecurity-Architect
Module 14
- Azure security baseline for Virtual Machines - Windows Virtual Machines | Microsoft Learn
- What is Microsoft Intune | Microsoft Learn
- Tutorial - Walkthrough the Microsoft Intune admin center - Microsoft Intune | Microsoft Learn
- Guardian modules - Azure Sphere | Microsoft Learn
- What is Azure IoT Edge | Microsoft Learn
- Edge Secured-core Certification Requirements | Microsoft Learn
- IoT Hub | Microsoft Azure
- Default configuration of Intune's Windows security baselines - Microsoft Intune | Microsoft Learn
- Use Microsoft Defender for Endpoint in Microsoft Intune | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect
Module 15
MCSB Controls
- Microsoft cloud security benchmark - Network Security | Microsoft Learn
- Microsoft cloud security benchmark - Identity Management | Microsoft Learn
- Microsoft cloud security benchmark - Privileged Access | Microsoft Learn
- Microsoft cloud security benchmark - Data protection | Microsoft Learn
- Microsoft cloud security benchmark - Asset Management | Microsoft Learn
- Microsoft cloud security benchmark - Logging and threat detection | Microsoft Learn
- Microsoft cloud security benchmark - Incident Response | Microsoft Learn
- Microsoft cloud security benchmark - Posture and Vulnerability Management | Microsoft Learn
- Microsoft cloud security benchmark - Endpoint security | Microsoft Learn
- Microsoft cloud security benchmark - Backup and recovery | Microsoft Learn
- Microsoft cloud security benchmark - DevOps Security | Microsoft Learn
- Microsoft cloud security benchmark - Governance and Strategy | Microsoft Learn
- SC-100: LP2 SecOps identity and Compliance
- SC-100: LP3 Applications and Data
- SC-100: LP4 Infrastructure
- SC-100: LP1 Best Practices
- Utbildning | Microsoft Learn
- SC-100-Microsoft-Cybersecurity-Architect