Book description
Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges
Key Features
- Gain a deep understanding of all topics covered in the SC-100 exam
- Benefit from practical examples that will help you put your new knowledge to work
- Design a zero-trust architecture and strategies for data, applications, access management, identity, and infrastructure
Book Description
Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you’ll have everything you need to pass the SC-100 exam.
This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you’ll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions.
By the end of this book, you’ll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors.
What you will learn
- Design a zero-trust strategy and architecture
- Evaluate GRC technical strategies and security operations strategies
- Design security for infrastructure
- Develop a strategy for data and applications
- Understand everything you need to pass the SC-100 exam with ease
- Use mock exams and sample questions to prepare for the structure of the exam
Who this book is for
This book is for a wide variety of cybersecurity professionals – from security engineers and cybersecurity architects to Microsoft 365 administrators, user and identity administrators, infrastructure administrators, cloud security engineers, and other IT professionals preparing to take the SC-100 exam. It’s also a good resource for those designing cybersecurity architecture without preparing for the exam. To get started, you’ll need a solid understanding of the fundamental services within Microsoft 365, and Azure, along with knowledge of security, compliance, and identity capabilities in Microsoft and hybrid architectures.
Table of contents
- Microsoft Cybersecurity Architect Exam Ref SC-100
- Foreword
- Contributors
- About the author
- About the reviewers
- Preface
- Part 1: The Evolution of Cybersecurity in the Cloud
- Chapter 1: Cybersecurity in the Cloud
- Part 2: Designing a Zero-Trust Strategy and Architecture
-
Chapter 2: Building an Overall Security Strategy and Architecture
- Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture
- Translating business goals into security requirements
- Translating security requirements into technical capabilities
- Designing security for a resiliency strategy
- Integrating a hybrid or multi-tenant environment into a security strategy
- Developing a technical and governance strategy for traffic filtering and segmentation
- Summary
-
Chapter 3: Designing a Security Operations Strategy
- Designing a logging and auditing strategy to support security operations
- Developing security operations to support a hybrid or multi-cloud environment
- Designing a strategy for SIEM and SOAR
- Evaluating security workflows
- Evaluating a security operations strategy for the incident management life cycle
- Evaluating a security operations strategy for sharing technical threat intelligence
- Summary
-
Chapter 4: Designing an Identity Security Strategy
- Zero Trust for identity and access management
- Designing a strategy for access to cloud resources
- Recommending an identity store
- Recommending an authentication and authorization strategy
- Designing a strategy for CA
- Designing a strategy for role assignment and delegation
- Designing a security strategy for privileged role access
- Designing a security strategy for privileged activities
- Case study – designing a Zero Trust architecture
- Summary
- Part 3: Evaluating Governance, Risk, and Compliance (GRC) Technical Strategies and Security Operations Strategies
-
Chapter 5: Designing a Regulatory Compliance Strategy
- Interpreting compliance requirements and translating them into specific technical capabilities
- Evaluating infrastructure compliance by using Microsoft Defender for Cloud
- Interpreting compliance scores and recommending actions to resolve issues or improve security
- Designing the implementation of Azure Policy
- Designing for data residency requirements
- Translating privacy requirements into requirements for security solutions
- Case study – designing for regulatory compliance
- Summary
-
Chapter 6: Evaluating the Security Posture and Recommending Technical Strategies to Manage Risk
- Evaluating the security posture by using benchmarks
- Evaluating the security posture by using Microsoft Defender for Cloud
- Evaluating the security posture by using Secure Scores
- Evaluating the security posture of cloud workloads
- Designing security for an Azure Landing Zone
- Interpreting technical threat intelligence and recommending risk mitigations
- Recommending security capabilities or controls to mitigate identified risks
- Case study – evaluating the security posture
- Summary
- Part 4: Designing Security for Infrastructure
-
Chapter 7: Designing a Strategy for Securing Server and Client Endpoints
- Planning and implementing a security strategy across teams
- Specifying security baselines for server and client endpoints
- Specifying security requirements for servers, including multiple platforms and operating systems
- Specifying security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration
- Specifying requirements to secure AD DS
- Designing a strategy to manage secrets, keys, and certificates
- Designing a strategy for secure remote access
- Understanding security operations frameworks, processes, and procedures
- Case study – designing a secure architecture for endpoints
- Summary
-
Chapter 8: Designing a Strategy for Securing SaaS, PaaS, and IaaS
- Specifying security baselines for SaaS, PaaS, and IaaS services
- Specifying security requirements for IoT workloads
- Specifying security requirements for data workloads, including SQL, Azure SQL Database, Azure Synapse, and Azure Cosmos DB
- Specifying security requirements for storage workloads, including Azure Storage
- Specifying security requirements for web workloads, including Azure App Service
- Specifying security requirements for containers
- Specifying security requirements for container orchestration
- Case study – security requirements for IaaS, PaaS, and SaaS
- Summary
- Part 5: Designing a Strategy for Data and Applications
- Chapter 9: Specifying Security Requirements for Applications
- Chapter 10: Designing a Strategy for Securing Data
-
Chapter 11: Case Study Responses and Final Assessment/Mock Exam
-
Case study sample responses
- Chapter 4 – designing a zero-trust architecture
- Chapter 5 – designing for regulatory compliance
- Chapter 6 – evaluating the security posture
- Chapter 7 – designing a secure architecture for endpoints
- Chapter 8 – security requirements for IaaS, PaaS, and SaaS
- Chapter 9 – security requirements for applications
- Chapter 10 – designing a strategy to secure data
- Mock exam practice questions
- Mock exam answers and chapter reference
- Summary
-
Case study sample responses
- Appendix: Preparing for Your Microsoft Exam
- Index
- Other Books You May Enjoy
Product information
- Title: Microsoft Cybersecurity Architect Exam Ref SC-100
- Author(s):
- Release date: January 2023
- Publisher(s): Packt Publishing
- ISBN: 9781803242392
You might also like
book
Exam Ref SC-100 Microsoft Cybersecurity Architect
Prepare for Microsoft Exam SC-100 and demonstrate your real-world mastery of skills and knowledge needed to …
video
Microsoft Cybersecurity Architect - SC-100 Exam Prep
In this comprehensive course, you will learn how to design and implement a robust strategy for …
book
Exam Ref AZ-104 Microsoft Azure Administrator Certification and Beyond - Second Edition
Navigate Microsoft Azure cloud services like storage, security, networking, and compute cloud capabilities with ease and …
book
Exam Ref AZ-104 Microsoft Azure Administrator
Prepare for Microsoft Exam AZ-104 and help demonstrate your real-world mastery of implementing and deploying Microsoft …