SC-100: Design Security Operations, Identity, and Compliance
This course teaches you the essential skills for the SC-100: Microsoft Cybersecurity Architect exam. Gain foundational knowledge in designing secure solutions for security operations, identity management, and regulatory compliance.
What you'll learn
In this course, SC-100: Design Security Operations, Identity, and Compliance, you’ll learn to become proficient in designing and implementing security solutions required for the Microsoft Cybersecurity Architect certification exam. First, you’ll explore enhancing security operations for hybrid and multi-cloud environments. Next, you’ll discover how to design identity and access management solutions, including implementing Microsoft Entra ID and securing Active Directory Domain Services (AD DS). Finally, you’ll learn how to address regulatory compliance using Microsoft Purview and evaluate infrastructure compliance with Microsoft Defender for Cloud. When you’re finished with this course, you’ll have the skills and knowledge needed to confidently pass the SC-100 exam and advance your career as a Microsoft Cybersecurity Architect.
Table of contents
- Overview 1m
- The Hybrid Cloud/Multi-cloud Scenario 2m
- Centralize Logging and Auditing 1m
- Implement SIEM with Microsoft Sentinel 1m
- Microsoft Sentinel Implementation Steps 1m
- Introducing Microsoft Defender XDR 1m
- The Microsoft Defender XDR Product Family 2m
- Microsoft Sentinel Playbooks 1m
- The MITRE ATT&CK Framework 2m
- Kusto Query Language (KQL) 2m
- Demo: Forward Azure Resource Diagnostic Settings to Microsoft Sentinel 11m
- Demo: Tour the Microsoft Defender XDR Web Administration Console 4m
- Demo: Tour Microsoft Defender for Cloud (MDC) 2m
- Summary 2m
- Overview 1m
- Microsoft Access Solutions for Diverse Environments 2m
- Microsoft Entra ID Integrations 2m
- Managing External Identities in Microsoft Azure 2m
- Designing Secure Authentication 2m
- Authorization Strategies 2m
- Zero Trust with Entra ID Conditional Access 1m
- Proven Practices for Securing Active Directory Domain Services (AD DS) 1m
- Secure Secret and Key Management with Azure Key Vault 2m
- Case Study: Globomantics 1m
- Demo: Tour Microsoft Defender for Identity 3m
- Demo: Tour Entra ID Conditional Access 7m
- Demo: Tour Entra ID Password Protection 4m
- Summary 1m
- Overview 1m
- Microsoft Enterprise Access Model 2m
- Design an Identity Governance Solution 3m
- Secure Hybrid Cloud/Multi-cloud Tenants 2m
- Microsoft Entra Permissions Management (EPM) 2m
- Microsoft Entra Entitlement Management 2m
- Privileged Access Workstation (PAW) 1m
- Azure Bastion 1m
- Demo: Configure Entra ID Privileged Identity Management (PIM) 6m
- Demo: Test Just-in-Time (JIT) Azure Role Activation 7m
- Demo: Tour Entra Identity Governance 3m
- Summary 1m
- Overview 1m
- Steps to Translate Compliance into Security Solutions 2m
- Microsoft Purview 1m
- Microsoft Priva 1m
- Microsoft Purview and Microsoft Priva - A Unified Solution 1m
- Azure Policy 1m
- Demo: Understand Azure Policy in Microsoft Defender for Cloud 3m
- Demo: Log Search with Kusto 1m
- Demo: Tour Microsoft Purview 5m
- Summary 1m