Cargando…

MICROSOFT CYBERSECURITY ARCHITECT EXAM REF SC-100 : get certified with ease while learning how to ... develop highly effective cybersecurity strategies /

Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges Key Features Gain a deep understanding of all topics covered in the SC-100 exam Benefit from practical examples that will help you put your new knowledge to work Design a zero-trust architect...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Natwick, Dwayne
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : PACKT Publishing Limited, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: The Evolution of Cybersecurity in the Cloud
  • Chapter 1: Cybersecurity in the Cloud
  • What is cybersecurity?
  • Evolution of cybersecurity from on-premises to the cloud
  • Defense-in-depth security strategy
  • Building a defense-in-depth security posture
  • Shared responsibility in cloud security
  • Cybersecurity architecture use cases
  • Security operations
  • Understanding the stages of a cyber attack
  • Understanding the scope of cybersecurity in the cloud
  • Shared responsibility scope
  • Principles of the zero-trust methodology
  • Common threats and attacks
  • Internal threats
  • External threats
  • Summary
  • Part 2: Designing a Zero-Trust Strategy and Architecture
  • Chapter 2: Building an Overall Security Strategy and Architecture
  • Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture
  • How are the MCRA used?
  • What are the components of the MCRA?
  • Translating business goals into security requirements
  • Threat analysis
  • Translating security requirements into technical capabilities
  • Physical
  • Identity and access
  • Perimeter security
  • Network security
  • Compute
  • Applications
  • Data
  • Designing security for a resiliency strategy
  • Integrating a hybrid or multi-tenant environment into a security strategy
  • Developing a technical and governance strategy for traffic filtering and segmentation
  • Summary
  • Chapter 3: Designing a Security Operations Strategy
  • Designing a logging and auditing strategy to support security operations
  • Security operations overview
  • Microsoft security operations tools
  • Logging and auditing for threat and vulnerability detection
  • Developing security operations to support a hybrid or multi-cloud environment
  • Designing a strategy for SIEM and SOAR
  • Evaluating security workflows
  • Security strategies for incident management and response
  • Security workflows
  • Evaluating a security operations strategy for the incident management life cycle
  • Evaluating a security operations strategy for sharing technical threat intelligence
  • Summary
  • Chapter 4: Designing an Identity Security Strategy
  • Zero Trust for identity and access management
  • Designing a strategy for access to cloud resources
  • Recommending an identity store
  • Azure AD tenant synchronization with SCIM
  • B2B
  • B2C
  • Recommending an authentication and authorization strategy
  • Hybrid identity infrastructure
  • Secure authorization methods
  • Designing a strategy for CA
  • Designing a strategy for role assignment and delegation
  • Designing a security strategy for privileged role access
  • Azure AD PIM
  • Designing a security strategy for privileged activities
  • Privileged access reviews
  • Entitlement management (aka permission management)