|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
OR_on1356251549 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
230103s2023 xx o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|c YDX
|d ORMDA
|d UKMGB
|d N$T
|d EBLCP
|d UKAHL
|d OCLCF
|d IEEEE
|
015 |
|
|
|a GBC305824
|2 bnb
|
016 |
7 |
|
|a 020857612
|2 Uk
|
019 |
|
|
|a 1356006293
|
020 |
|
|
|a 9781803244877
|q (electronic bk.)
|
020 |
|
|
|a 1803244879
|q (electronic bk.)
|
020 |
|
|
|z 1803242396
|
020 |
|
|
|z 9781803242392
|
029 |
1 |
|
|a AU@
|b 000073289694
|
029 |
1 |
|
|a UKMGB
|b 020857612
|
035 |
|
|
|a (OCoLC)1356251549
|z (OCoLC)1356006293
|
037 |
|
|
|a 9781803242392
|b O'Reilly Media
|
037 |
|
|
|a 10162751
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230110
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Natwick, Dwayne.
|
245 |
1 |
0 |
|a MICROSOFT CYBERSECURITY ARCHITECT EXAM REF SC-100 :
|b get certified with ease while learning how to ... develop highly effective cybersecurity strategies /
|c Dwayne Natwick.
|
260 |
|
|
|a [Place of publication not identified] :
|b PACKT Publishing Limited,
|c 2023.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges Key Features Gain a deep understanding of all topics covered in the SC-100 exam Benefit from practical examples that will help you put your new knowledge to work Design a zero-trust architecture and strategies for data, applications, access management, identity, and infrastructure Book Description Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you'll have everything you need to pass the SC-100 exam. This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you'll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions. By the end of this book, you'll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors. What you will learn Design a zero-trust strategy and architecture Evaluate GRC technical strategies and security operations strategies Design security for infrastructure Develop a strategy for data and applications Understand everything you need to pass the SC-100 exam with ease Use mock exams and sample questions to prepare for the structure of the exam Who this book is for This book is for a wide variety of cybersecurity professionals - from security engineers and cybersecurity architects to Microsoft 365 administrators, user and identity administrators, infrastructure administrators, cloud security engineers, and other IT professionals preparing to take the SC-100 exam. It's also a good resource for those designing cybersecurity architecture without preparing for the exam. To get started, you'll need a solid understanding of the fundamental services within Microsoft 365, and Azure, along with knowledge of security, compliance, and identity capabilities in Microsoft and hybrid architectures.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: The Evolution of Cybersecurity in the Cloud -- Chapter 1: Cybersecurity in the Cloud -- What is cybersecurity? -- Evolution of cybersecurity from on-premises to the cloud -- Defense-in-depth security strategy -- Building a defense-in-depth security posture -- Shared responsibility in cloud security -- Cybersecurity architecture use cases -- Security operations -- Understanding the stages of a cyber attack -- Understanding the scope of cybersecurity in the cloud
|
505 |
8 |
|
|a Shared responsibility scope -- Principles of the zero-trust methodology -- Common threats and attacks -- Internal threats -- External threats -- Summary -- Part 2: Designing a Zero-Trust Strategy and Architecture -- Chapter 2: Building an Overall Security Strategy and Architecture -- Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture -- How are the MCRA used? -- What are the components of the MCRA? -- Translating business goals into security requirements -- Threat analysis
|
505 |
8 |
|
|a Translating security requirements into technical capabilities -- Physical -- Identity and access -- Perimeter security -- Network security -- Compute -- Applications -- Data -- Designing security for a resiliency strategy -- Integrating a hybrid or multi-tenant environment into a security strategy -- Developing a technical and governance strategy for traffic filtering and segmentation -- Summary -- Chapter 3: Designing a Security Operations Strategy -- Designing a logging and auditing strategy to support security operations -- Security operations overview -- Microsoft security operations tools
|
505 |
8 |
|
|a Logging and auditing for threat and vulnerability detection -- Developing security operations to support a hybrid or multi-cloud environment -- Designing a strategy for SIEM and SOAR -- Evaluating security workflows -- Security strategies for incident management and response -- Security workflows -- Evaluating a security operations strategy for the incident management life cycle -- Evaluating a security operations strategy for sharing technical threat intelligence -- Summary -- Chapter 4: Designing an Identity Security Strategy -- Zero Trust for identity and access management
|
505 |
8 |
|
|a Designing a strategy for access to cloud resources -- Recommending an identity store -- Azure AD tenant synchronization with SCIM -- B2B -- B2C -- Recommending an authentication and authorization strategy -- Hybrid identity infrastructure -- Secure authorization methods -- Designing a strategy for CA -- Designing a strategy for role assignment and delegation -- Designing a security strategy for privileged role access -- Azure AD PIM -- Designing a security strategy for privileged activities -- Privileged access reviews -- Entitlement management (aka permission management)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Microsoft Corporation
|x Examinations
|v Study guides.
|
610 |
2 |
7 |
|a Microsoft Corporation.
|2 fast
|0 (OCoLC)fst00608442
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations.
|2 fast
|0 (OCoLC)fst00872343
|
650 |
|
7 |
|a Computer security
|x Examinations.
|2 fast
|0 (OCoLC)fst00872489
|
650 |
|
7 |
|a Examinations.
|2 fast
|0 (OCoLC)fst00917492
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
776 |
0 |
8 |
|i Print version:
|z 1803242396
|z 9781803242392
|w (OCoLC)1330689444
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781803242392/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 303960251
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3508299
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40296666
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30297424
|
994 |
|
|
|a 92
|b IZTAP
|