MICROSOFT CYBERSECURITY ARCHITECT EXAM REF SC-100 : get certified with ease while learning how to ... develop highly effective cybersecurity strategies /
Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges Key Features Gain a deep understanding of all topics covered in the SC-100 exam Benefit from practical examples that will help you put your new knowledge to work Design a zero-trust architect...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
PACKT Publishing Limited,
2023.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: The Evolution of Cybersecurity in the Cloud
- Chapter 1: Cybersecurity in the Cloud
- What is cybersecurity?
- Evolution of cybersecurity from on-premises to the cloud
- Defense-in-depth security strategy
- Building a defense-in-depth security posture
- Shared responsibility in cloud security
- Cybersecurity architecture use cases
- Security operations
- Understanding the stages of a cyber attack
- Understanding the scope of cybersecurity in the cloud
- Shared responsibility scope
- Principles of the zero-trust methodology
- Common threats and attacks
- Internal threats
- External threats
- Summary
- Part 2: Designing a Zero-Trust Strategy and Architecture
- Chapter 2: Building an Overall Security Strategy and Architecture
- Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture
- How are the MCRA used?
- What are the components of the MCRA?
- Translating business goals into security requirements
- Threat analysis
- Translating security requirements into technical capabilities
- Physical
- Identity and access
- Perimeter security
- Network security
- Compute
- Applications
- Data
- Designing security for a resiliency strategy
- Integrating a hybrid or multi-tenant environment into a security strategy
- Developing a technical and governance strategy for traffic filtering and segmentation
- Summary
- Chapter 3: Designing a Security Operations Strategy
- Designing a logging and auditing strategy to support security operations
- Security operations overview
- Microsoft security operations tools
- Logging and auditing for threat and vulnerability detection
- Developing security operations to support a hybrid or multi-cloud environment
- Designing a strategy for SIEM and SOAR
- Evaluating security workflows
- Security strategies for incident management and response
- Security workflows
- Evaluating a security operations strategy for the incident management life cycle
- Evaluating a security operations strategy for sharing technical threat intelligence
- Summary
- Chapter 4: Designing an Identity Security Strategy
- Zero Trust for identity and access management
- Designing a strategy for access to cloud resources
- Recommending an identity store
- Azure AD tenant synchronization with SCIM
- B2B
- B2C
- Recommending an authentication and authorization strategy
- Hybrid identity infrastructure
- Secure authorization methods
- Designing a strategy for CA
- Designing a strategy for role assignment and delegation
- Designing a security strategy for privileged role access
- Azure AD PIM
- Designing a security strategy for privileged activities
- Privileged access reviews
- Entitlement management (aka permission management)