Cargando…

MICROSOFT CYBERSECURITY ARCHITECT EXAM REF SC-100 : get certified with ease while learning how to ... develop highly effective cybersecurity strategies /

Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges Key Features Gain a deep understanding of all topics covered in the SC-100 exam Benefit from practical examples that will help you put your new knowledge to work Design a zero-trust architect...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Natwick, Dwayne
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : PACKT Publishing Limited, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1356251549
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 230103s2023 xx o 000 0 eng d
040 |a YDX  |b eng  |c YDX  |d ORMDA  |d UKMGB  |d N$T  |d EBLCP  |d UKAHL  |d OCLCF  |d IEEEE 
015 |a GBC305824  |2 bnb 
016 7 |a 020857612  |2 Uk 
019 |a 1356006293 
020 |a 9781803244877  |q (electronic bk.) 
020 |a 1803244879  |q (electronic bk.) 
020 |z 1803242396 
020 |z 9781803242392 
029 1 |a AU@  |b 000073289694 
029 1 |a UKMGB  |b 020857612 
035 |a (OCoLC)1356251549  |z (OCoLC)1356006293 
037 |a 9781803242392  |b O'Reilly Media 
037 |a 10162751  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230110 
049 |a UAMI 
100 1 |a Natwick, Dwayne. 
245 1 0 |a MICROSOFT CYBERSECURITY ARCHITECT EXAM REF SC-100 :  |b get certified with ease while learning how to ... develop highly effective cybersecurity strategies /  |c Dwayne Natwick. 
260 |a [Place of publication not identified] :  |b PACKT Publishing Limited,  |c 2023. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges Key Features Gain a deep understanding of all topics covered in the SC-100 exam Benefit from practical examples that will help you put your new knowledge to work Design a zero-trust architecture and strategies for data, applications, access management, identity, and infrastructure Book Description Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you'll have everything you need to pass the SC-100 exam. This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you'll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions. By the end of this book, you'll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors. What you will learn Design a zero-trust strategy and architecture Evaluate GRC technical strategies and security operations strategies Design security for infrastructure Develop a strategy for data and applications Understand everything you need to pass the SC-100 exam with ease Use mock exams and sample questions to prepare for the structure of the exam Who this book is for This book is for a wide variety of cybersecurity professionals - from security engineers and cybersecurity architects to Microsoft 365 administrators, user and identity administrators, infrastructure administrators, cloud security engineers, and other IT professionals preparing to take the SC-100 exam. It's also a good resource for those designing cybersecurity architecture without preparing for the exam. To get started, you'll need a solid understanding of the fundamental services within Microsoft 365, and Azure, along with knowledge of security, compliance, and identity capabilities in Microsoft and hybrid architectures. 
505 0 |a Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: The Evolution of Cybersecurity in the Cloud -- Chapter 1: Cybersecurity in the Cloud -- What is cybersecurity? -- Evolution of cybersecurity from on-premises to the cloud -- Defense-in-depth security strategy -- Building a defense-in-depth security posture -- Shared responsibility in cloud security -- Cybersecurity architecture use cases -- Security operations -- Understanding the stages of a cyber attack -- Understanding the scope of cybersecurity in the cloud 
505 8 |a Shared responsibility scope -- Principles of the zero-trust methodology -- Common threats and attacks -- Internal threats -- External threats -- Summary -- Part 2: Designing a Zero-Trust Strategy and Architecture -- Chapter 2: Building an Overall Security Strategy and Architecture -- Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture -- How are the MCRA used? -- What are the components of the MCRA? -- Translating business goals into security requirements -- Threat analysis 
505 8 |a Translating security requirements into technical capabilities -- Physical -- Identity and access -- Perimeter security -- Network security -- Compute -- Applications -- Data -- Designing security for a resiliency strategy -- Integrating a hybrid or multi-tenant environment into a security strategy -- Developing a technical and governance strategy for traffic filtering and segmentation -- Summary -- Chapter 3: Designing a Security Operations Strategy -- Designing a logging and auditing strategy to support security operations -- Security operations overview -- Microsoft security operations tools 
505 8 |a Logging and auditing for threat and vulnerability detection -- Developing security operations to support a hybrid or multi-cloud environment -- Designing a strategy for SIEM and SOAR -- Evaluating security workflows -- Security strategies for incident management and response -- Security workflows -- Evaluating a security operations strategy for the incident management life cycle -- Evaluating a security operations strategy for sharing technical threat intelligence -- Summary -- Chapter 4: Designing an Identity Security Strategy -- Zero Trust for identity and access management 
505 8 |a Designing a strategy for access to cloud resources -- Recommending an identity store -- Azure AD tenant synchronization with SCIM -- B2B -- B2C -- Recommending an authentication and authorization strategy -- Hybrid identity infrastructure -- Secure authorization methods -- Designing a strategy for CA -- Designing a strategy for role assignment and delegation -- Designing a security strategy for privileged role access -- Azure AD PIM -- Designing a security strategy for privileged activities -- Privileged access reviews -- Entitlement management (aka permission management) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
610 2 0 |a Microsoft Corporation  |x Examinations  |v Study guides. 
610 2 7 |a Microsoft Corporation.  |2 fast  |0 (OCoLC)fst00608442 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 7 |a Computer networks  |x Security measures  |x Examinations.  |2 fast  |0 (OCoLC)fst00872343 
650 7 |a Computer security  |x Examinations.  |2 fast  |0 (OCoLC)fst00872489 
650 7 |a Examinations.  |2 fast  |0 (OCoLC)fst00917492 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
655 7 |a Study guides.  |2 lcgft 
776 0 8 |i Print version:  |z 1803242396  |z 9781803242392  |w (OCoLC)1330689444 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803242392/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 303960251 
938 |a EBSCOhost  |b EBSC  |n 3508299 
938 |a Askews and Holts Library Services  |b ASKH  |n AH40296666 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30297424 
994 |a 92  |b IZTAP