Video accessible from your Account page after purchase.
Register your product to gain access to bonus material or receive a coupon.
Almost 2 Hours of Video Instruction
Prepare for Microsoft Exam SC-100 and demonstrate your mastery of designing and evolving cybersecurity strategy
This Exam SC-100 Microsoft Cybersecurity Architect video is designed for cybersecurity architects responsible for designing and evolving the cybersecurity strategy to protect an organization's mission and business processes across all aspects of the enterprise architecture. This video focuses on the skills measured by the exam objectives:
Using his 8+ years of experience as a Microsoft Certified Trainer, Charles Pluta explains how to design a Zero Trust strategy and architecture for all components of an application: data, access management, identity, and infrastructure. By completing this course, you'll learn more about Microsoft's Zero Trust approach and understand the requirements for a secure architecture.
Skill LevelAdvanced
Who Should Take This Course
Course Requirements
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Module 1: Design a Zero Trust strategy and architecture
Lesson 1 Build an overall security strategy and architecture
Lesson 2 Design a security operations strategy
Lesson 3 Design an identity security strategy
Module 2: Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
Lesson 4 Design a regulatory compliance strategy
Lesson 5 Evaluate security posture
Lesson 6 Recommend technical strategies to manage risk
Module 3: Design security for infrastructure
Lesson 7 Design a strategy for securing server and client endpoints
Lesson 8 Design a strategy for securing SaaS services
Lesson 9 Design a strategy for securing PaaS services
Lesson 10 Design a strategy for securing IaaS services
Module 4: Design a strategy for data and applications
Lesson 11 Specify security requirements for applications
Lesson 12 Design a strategy for securing data