Book description
Prep for the SC-100 exam like a pro with Sybex’ latest Study Guide
In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100, a team of dedicated software architects delivers an authoritative and easy-to-follow guide to preparing for the SC-100 Cybersecurity Architect certification exam offered by Microsoft. In the book, you’ll find comprehensive coverage of the objectives tested by the exam, covering the evaluation of Governance Risk Compliance technical and security operations strategies, the design of Zero Trust strategies and architectures, and data and application strategy design.
With the information provided by the authors, you’ll be prepared for your first day in a new role as a cybersecurity architect, gaining practical, hands-on skills with modern Azure deployments. You’ll also find:
- In-depth discussions of every single objective covered by the SC-100 exam and, by extension, the skills necessary to succeed as a Microsoft cybersecurity architect
- Critical information to help you obtain a widely sought-after credential that is increasingly popular across the industry (especially in government roles)
- Valuable online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossary of crucial technical terms
An essential roadmap to the SC-100 exam and a new career in cybersecurity architecture on the Microsoft Azure cloud platform, MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 is also ideal for anyone seeking to improve their knowledge and understanding of cloud-based management and security.
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- Acknowledgments
- About the Authors
-
Introduction
- What Is Azure?
- About the SC-100 Certification Exam
- Why Become a Certified Microsoft Azure Cybersecurity Architect?
- Preparing to Become a Certified Microsoft Cybersecurity Architect
- How to Become a Certified Microsoft Cybersecurity Architect
- Who Should Buy This Book
- How This Book Is Organized
- Bonus Digital Contents
- Conventions Used in This Book
- Using This Book
- SC-100 Exam Objectives
- How to Contact the Publisher
- Assessment Test
- Answers to Assessment Test
-
Chapter 1: Define and Implement an Overall Security Strategy and Architecture
- Basics of Cloud Computing
- Introduction to Cybersecurity
- Cybersecurity Domains
- Getting Started with Zero Trust
- Design Integration Points in an Architecture
- Design Security Needs to Be Based on Business Goals
- Decode Security Requirements to Technical Abilities
- Design Security for a Resiliency Approach
- Identify the Security Risks Associated with Hybrid and Multi-Tenant Environments
- Plan Traffic Filtering and Segmentation Technical and Governance Strategies
- Summary
- Exam Essentials
- Review Questions
-
Chapter 2: Define a Security Operations Strategy
- Foundation of Security Operations and Strategy
- Design a Logging and Auditing Strategy to Support Security Operations
- Develop Security Operations to Support a Hybrid or Multi-Cloud Environment
- Design a Strategy for SIEM and SOAR
- Evaluate Security Workflows
- Evaluate a Security Operations Strategy for the Incident Management Life Cycle
- Evaluate a Security Operations Strategy for Sharing Technical Threat Intelligence
- Summary
- Exam Essentials
- Review Questions
-
Chapter 3: Define an Identity Security Strategy
- Design a Strategy for Access to Cloud Resources
- Recommend an Identity Store (Tenants, B2B, B2C, Hybrid)
- Recommend an Authentication and Authorization Strategy
- Design a Strategy for Conditional Access
- Design a Strategy for Role Assignment and Delegation
- Design a Security Strategy for Privileged Role Access to Infrastructure Including Identity-Based Firewall Rules and Azure PIM
- Design a Security Strategy for Privileged Activities Including PAM, Entitlement Management, and Cloud Tenant Administration
- Summary
- Exam Essentials
- Review Questions
-
Chapter 4: Identify a Regulatory Compliance Strategy
- Interpret Compliance Requirements and Translate into Specific Technical Capabilities
- Evaluate Infrastructure Compliance by Using Microsoft Defender for Cloud
- Interpret Compliance Scores and Recommend Actions to Resolve Issues or Improve Security
- Design and Validate Implementation of Azure Policy
- Design for Data Residency Requirements
- Translate Privacy Requirements into Requirements for Security Solutions
- Summary
- Exam Essentials
- Review Questions
-
Chapter 5: Identify Security Posture and Recommend Technical Strategies to Manage Risk
- Analyze Security Posture by Using Azure Security Benchmark
- Analyze Security Posture by Using Microsoft Defender for Cloud
- Assess the Security Hygiene of Cloud Workloads
- Evaluate the Security Posture of Cloud Workloads
- Design Security for an Azure Landing Zone
- Evaluate Security Postures by Using Secure Scores
- Identify Technical Threats and Recommend Mitigation Measures
- Recommend Security Capabilities or Controls to Mitigate Identified Risks
- Summary
- Exam Essentials
- Review Questions
-
Chapter 6: Define a Strategy for Securing Infrastructure
- Plan and Deploy a Security Strategy Across Teams
- Deploy a Process for Proactive and Continuous Evolution of a Security Strategy
- Specify Security Baselines for Server and Client Endpoints
- Specify Security Baselines for the Server, Including Multiple Platforms and Operating Systems
- Specify Security Requirements for Mobile Devices and Clients, Including Endpoint Protection, Hardening, and Configuration
- Specify Requirements for Securing Active Directory Domain Services
- Design a Strategy to Manage Secrets, Keys, and Certificates
- Design a Strategy for Secure Remote Access
- Design a Strategy for Securing Privileged Access
- Summary
- Exam Essentials
- Review Questions
-
Chapter 7: Define a Strategy and Requirements for Securing PaaS, IaaS, and SaaS Services
- Establish Security Baselines for SaaS, PaaS, and IaaS Services
- Establish Security Requirements for IoT Workloads
- Establish Security Requirements for Data Workloads, Including SQL Server, Azure SQL, Azure Synapse, and Azure Cosmos DB
- Define the Security Requirements for Web Workloads
- Determine the Security Requirements for Storage Workloads
- Define Container Security Requirements
- Define Container Orchestration Security Requirements
- Summary
- Exam Essentials
- Review Questions
-
Chapter 8: Define a Strategy and Requirements for Applications and Data
- Knowing the Application Threat Intelligence Model
- Specify Priorities for Mitigating Threats to Applications
- Specify a Security Standard for Onboarding a New Application
- Specify a Security Strategy for Applications and APIs
- Specify Priorities for Mitigating Threats to Data
- Design a Strategy to Identify and Protect Sensitive Data
- Specify an Encryption Standard for Data at Rest and in Motion
- Summary
- Exam Essentials
- Review Questions
-
Chapter 9: Recommend Security Best Practices and Priorities
- Recommend Best Practices for Cybersecurity Capabilities and Controls
- Recommend Best Practices for Protecting from Insider and External Attacks
- Recommend Best Practices for Zero Trust Security
- Recommend Best Practices for Zero Trust Rapid Modernization Plan
- Recommend a DevSecOps Process
- Recommend a Methodology for Asset Protection
- Recommend Strategies for Managing and Minimizing Risk
- Plan for Ransomware Protection and Extortion-Based Attacks
- Protect Assets from Ransomware Attacks
- Recommend Microsoft Ransomware Best Practices
- Summary
- Exam Essentials
- Review Questions
-
Appendix: Answers to Review Questions
- Chapter 1: Define and Implement an Overall Security Strategy and Architecture
- Chapter 2: Define a Security Operations Strategy
- Chapter 3: Define an Identity Security Strategy
- Chapter 4: Identify a Regulatory Compliance Strategy
- Chapter 5: Identify Security Posture and Recommend Technical Strategies to Manage Risk
- Chapter 6: Define a Strategy for Securing Infrastructure
- Chapter 7: Define a Strategy and Requirements for Securing PaaS, IaaS, and SaaS Services
- Chapter 8: Define a Strategy and Requirements for Applications and Data
- Chapter 9: Recommend Security Best Practices and Priorities
- Index
- End User License Agreement
Product information
- Title: MCE Microsoft Certified Expert Cybersecurity Architect Study Guide
- Author(s):
- Release date: May 2023
- Publisher(s): Sybex
- ISBN: 9781394180219
You might also like
book
Microsoft Information Protection Administrator SC-400 Certification Guide
Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365 Key …
book
MCA Windows Server Hybrid Administrator Complete Study Guide with 400 Practice Test Questions
Your 2-exams-in-1 study guide for the next-gen Windows Server 2022 certification In MCA Windows Server Hybrid …
book
Exam Ref MS-100 Microsoft 365 Identity and Services, 2nd Edition
Prepare for the updated version of Microsoft Exam MS-100 and help demonstrate your real-world mastery of …
book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This …