Bookmarks

Fältet Favoriter

SC-100

Module 1

Zero Trust Rapid Modernization Plan | Microsoft Learn
Accelerate cloud adoption with the Microsoft Cloud Adoption Framework for Azure - Training | Microsoft Learn
Use the Cloud Adoption Framework to manage organizational alignment - Training | Microsoft Learn
Microsoft Cloud Adoption Framework for Azure - Cloud Adoption Framework | Microsoft Learn
MITRE ATT&CK®
Zero Trust Guidance Center | Microsoft Learn
Knowledge check - Introduction to Zero Trust and best practice frameworks - Training | Microsoft Learn
Introduction to Zero Trust and best practice frameworks - Training | Microsoft Learn

Module 2

Azure Well-Architected Framework - Microsoft Azure Well-Architected Framework | Microsoft Learn
Security quick links - Microsoft Azure Well-Architected Framework | Microsoft Learn
Overview of the Microsoft cloud security benchmark | Microsoft Learn
Microsoft Cybersecurity Architect Knowledge Check Question
Case Study Module 2
Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) - Training | Microsoft Learn
Define a security strategy - Cloud Adoption Framework | Microsoft Learn
Assessments | Cloud Adoption Security Review
Security in the Microsoft Cloud Adoption Framework for Azure - Cloud Adoption Framework | Microsoft Learn
What is an Azure landing zone? - Cloud Adoption Framework | Microsoft Learn
Security design in Azure - Cloud Adoption Framework | Microsoft Learn
Well-Architected assessment for mission-critical workloads on Azure - Microsoft Azure Well-Architected Framework | Microsoft Learn

Module 3

Microsoft Cybersecurity Reference Architectures (MCRA) | Microsoft Learn
Security Adoption Resources | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect
Knowledge check - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark - Training | Microsoft Learn
Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) - Training | Microsoft Learn
Unified Kill Chain: Raising Resilience Against Cyber Attacks

Module 4

Design a resiliency strategy for common cyberthreats like ransomware - Training | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect
Azure Automation update management - Azure Architecture Center | Microsoft Learn
Azure Automation Update Management overview | Microsoft Learn
Security features that protect hybrid backups - Azure Backup | Microsoft Learn
Guidance and best practices - Azure Backup | Microsoft Learn
Get started quickly configuring ransomware prevention so you can stop ransomware cybercriminals from targeting your organization. | Microsoft Learn
Business resilience - Cloud Adoption Framework | Microsoft Learn
Securing privileged access overview - Privileged access | Microsoft Learn

Module 5

Introduction to regulatory compliance - Cloud Adoption Framework | Microsoft Learn
Hantering av efterlevnad i molnet
Managing compliance in the cloud
Security Baseline discipline overview - Cloud Adoption Framework | Microsoft Learn
Overview of Azure Blueprints - Azure Blueprints | Microsoft Learn
Create & deploy template specs in Bicep - Azure Resource Manager | Microsoft Learn
Create & deploy deployment stacks in Bicep - Azure Resource Manager | Microsoft Learn
Microsoft Purview Compliance Manager | Microsoft Learn
Overview of Azure Policy - Azure Policy | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect
Learn about Microsoft Priva - Microsoft Priva | Microsoft Learn
Remediate non-compliant resources - Azure Policy | Microsoft Learn
Improve regulatory compliance in Microsoft Defender for Cloud - Microsoft Defender for Cloud | Microsoft Learn
Defender for Cloud Planning and Operations Guide - Microsoft Defender for Cloud | Microsoft Learn

Module 6

Azure identity and access management design area - Cloud Adoption Framework | Microsoft Learn
Compare Active Directory to Microsoft Entra ID - Microsoft Entra | Microsoft Learn
Deploy AD DS in an Azure virtual network - Azure Architecture Center | Microsoft Learn
Secure Microsoft Entra Domain Services - Microsoft Entra ID | Microsoft Learn
Microsoft Entra External ID documentation - Microsoft Entra External ID | Microsoft Learn
Microsoft Entra External ID overview - Microsoft Entra External ID | Microsoft Learn
Continuous access evaluation in Microsoft Entra - Microsoft Entra ID | Microsoft Learn
Building a Conditional Access policy - Microsoft Entra ID | Microsoft Learn
What is Microsoft Entra ID Protection? - Microsoft Entra ID Protection | Microsoft Learn
Conditional Access design principles and dependencies - Azure Architecture Center | Microsoft Learn
Workload identities - Microsoft Entra Workload ID | Microsoft Learn
Overview of Key Management in Azure | Microsoft Learn
Best practices for using Azure Key Vault | Microsoft Learn
What is Azure Key Vault? | Microsoft Learn
Azure Key Vault Overview - Azure Key Vault | Microsoft Learn
Best practices for using Azure Key Vault | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect
Azure Key Vault soft-delete | Microsoft Learn

Module 7

Securing privileged access Enterprise access model - Privileged access | Microsoft Learn
What is Privileged Identity Management? - Microsoft Entra ID Governance | Microsoft Learn
Privileged Access Management for Active Directory Domain Services | Microsoft Learn
Learn about privileged access management | Microsoft Learn
What is entitlement management? - Microsoft Entra ID Governance | Microsoft Learn
What are access reviews? - Microsoft Entra - Microsoft Entra ID Governance | Microsoft Learn
What is Azure Lighthouse? - Azure Lighthouse | Microsoft Learn
Azure Lighthouse in enterprise scenarios - Azure Lighthouse | Microsoft Learn
Microsoft Entra Permissions Management - Microsoft Entra Permissions Management | Microsoft Learn
Why are privileged access devices important - Privileged access | Microsoft Learn
About Azure Bastion | Microsoft Learn

Module 8

Cloud SOC functions - Cloud Adoption Framework | Microsoft Learn
Unified operations for hybrid, multicloud, and edge - Cloud Adoption Framework | Microsoft Learn
Azure Monitor overview - Azure Monitor | Microsoft Learn
Workspace architecture best practices for Microsoft Sentinel | Microsoft Learn
Introduction to automation in Microsoft Sentinel | Microsoft Learn
Evaluate and pilot Microsoft Defender XDR security, an XDR solution that unifies threat data so you can take action. | Microsoft Learn
Understand threat intelligence in Microsoft Sentinel | Microsoft Learn
Hunting capabilities in Microsoft Sentinel | Microsoft Learn
View MITRE coverage for your organization from Microsoft Sentinel | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect

Module 9

Zero Trust deployment plan with Microsoft 365 | Microsoft Learn
Integrate Azure and Microsoft Defender XDR security services - Azure Architecture Center | Microsoft Learn
Office 365 Security including Microsoft Defender for Office 365 and Exchange Online Protection | Microsoft Learn
Assess your security posture through Microsoft Secure Score | Microsoft Learn

Module 10

DevSecOps controls - Cloud Adoption Framework | Microsoft Learn
OWASP Top Ten | OWASP Foundation
OWASP Developer Guide | Zed Attack Proxy | OWASP Foundation
Azure API Management - Overview and key concepts | Microsoft Learn
Azure security baseline for API Management | Microsoft Learn
Virtual network integrated serverless microservices - Azure Architecture Center | Microsoft Learn
Introduction to Azure Web Application Firewall | Microsoft Learn
What is Azure Web Application Firewall on Azure Application Gateway? - Azure Web Application Firewall | Microsoft Learn
What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
What is Azure web application firewall on Azure CDN? | Microsoft Learn
Azure Front Door | Microsoft Learn
What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
Tutorial: Create a WAF policy for Azure Front Door - Azure portal | Microsoft Learn
What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
What is Azure Web Application Firewall on Azure Front Door? | Microsoft Learn
Application lifecycle management in Azure Container Apps | Microsoft Learn

Module 11

https://web.purview.azure.com/resource/
How to search the Data Catalog | Microsoft Learn
Understand Insights reports in Microsoft Purview | Microsoft Learn
Understand Insights reports in Microsoft Purview | Microsoft Learn
Azure Storage in-place data sharing with Microsoft Purview (preview) | Microsoft Learn
Data security and encryption best practices - Microsoft Azure | Microsoft Learn
Encryption strategy recommendations - Microsoft Azure Well-Architected Framework | Microsoft Learn
Data Discovery & Classification - Azure SQL Database & Azure SQL Managed Instance & Azure Synapse Analytics | Microsoft Learn
Microsoft Defender for Storage - the benefits and features - Microsoft Defender for Cloud | Microsoft Learn
Azure Storage encryption for data at rest | Microsoft Learn
Microsoft Defender for Azure SQL - the benefits and features - Microsoft Defender for Cloud | Microsoft Learn
Microsoft uses threat intelligence to protect, detect, and respond to threats - Inside Track Blog
Protect your Azure storage accounts using Microsoft Defender for Cloud - Azure Storage | Microsoft Learn

Module 12

Shared responsibility in the cloud - Microsoft Azure | Microsoft Learn
Best practices for secure PaaS deployments - Microsoft Azure | Microsoft Learn
Azure Resource Manager overview - Azure Resource Manager | Microsoft Learn
Availability sets overview - Azure Virtual Machines | Microsoft Learn
Microsoft Antimalware for Azure | Microsoft Learn
What is Microsoft Defender for Cloud? - Microsoft Defender for Cloud | Microsoft Learn
Enable Azure Disk Encryption for Linux VMs - Azure Virtual Machines | Microsoft Learn
dm-crypt - Wikipedia
BitLocker Drive Encryption Overview | Microsoft Learn
Azure Key Vault documentation | Microsoft Learn
Overview - Azure App Service | Microsoft Learn
What is Azure Cloud Services (classic) | Microsoft Learn
Azure DDoS Protection Overview | Microsoft Learn
Penetration testing | Microsoft Learn
Azure security baseline for App Service | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect
Azure security baseline for Azure Kubernetes Service (AKS) | Microsoft Learn
Security best practices for IaaS workloads in Azure | Microsoft Learn

Module 13

Introduction to hybrid and multicloud - Cloud Adoption Framework | Microsoft Learn
Cloud Security Posture Management (CSPM) - Microsoft Defender for Cloud | Microsoft Learn
Secure score in Microsoft Defender for Cloud - Microsoft Defender for Cloud | Microsoft Learn
Plan a Defender for Servers deployment to protect on-premises and multicloud servers - Microsoft Defender for Cloud | Microsoft Learn
Microsoft Defender for App Service - the benefits and features - Microsoft Defender for Cloud | Microsoft Learn
How to enable Microsoft Defender for SQL servers on machines - Microsoft Defender for Cloud | Microsoft Learn
Introduction to Azure Arc landing zone accelerator for hybrid and multicloud - Cloud Adoption Framework | Microsoft Learn
Visio Drawing: Azure Arc Landing zone accelerator
Microsoft Defender for Cloud integration with Defender External attack surface management (EASM) - Microsoft Defender for Cloud | Microsoft Learn
Defender EASM Overview
SC-100-Microsoft-Cybersecurity-Architect

Module 14

Azure security baseline for Virtual Machines - Windows Virtual Machines | Microsoft Learn
What is Microsoft Intune | Microsoft Learn
Tutorial - Walkthrough the Microsoft Intune admin center - Microsoft Intune | Microsoft Learn
Guardian modules - Azure Sphere | Microsoft Learn
What is Azure IoT Edge | Microsoft Learn
Edge Secured-core Certification Requirements | Microsoft Learn
IoT Hub | Microsoft Azure
Default configuration of Intune's Windows security baselines - Microsoft Intune | Microsoft Learn
Use Microsoft Defender for Endpoint in Microsoft Intune | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect

Module 15

MCSB Controls

Microsoft cloud security benchmark - Network Security | Microsoft Learn
Microsoft cloud security benchmark - Identity Management | Microsoft Learn
Microsoft cloud security benchmark - Privileged Access | Microsoft Learn
Microsoft cloud security benchmark - Data protection | Microsoft Learn
Microsoft cloud security benchmark - Asset Management | Microsoft Learn
Microsoft cloud security benchmark - Logging and threat detection | Microsoft Learn
Microsoft cloud security benchmark - Incident Response | Microsoft Learn
Microsoft cloud security benchmark - Posture and Vulnerability Management | Microsoft Learn
Microsoft cloud security benchmark - Endpoint security | Microsoft Learn
Microsoft cloud security benchmark - Backup and recovery | Microsoft Learn
Microsoft cloud security benchmark - DevOps Security | Microsoft Learn
Microsoft cloud security benchmark - Governance and Strategy | Microsoft Learn

SC-100: LP2 SecOps identity and Compliance
SC-100: LP3 Applications and Data
SC-100: LP4 Infrastructure
SC-100: LP1 Best Practices
Utbildning | Microsoft Learn
SC-100-Microsoft-Cybersecurity-Architect