Microsoft 365

Cybersecurity Architect

Ihr Nutzen

In diesem Seminar erlernen Sie Cybersicherheitsstrategien in den folgenden Bereichen zu entwerfen und zu bewerten: Zero Trust, Governance Risk Compliance (GRC), Security Operations (SecOps) sowie Daten und Anwendungen. Außerdem lernen Sie, wie man Lösungen unter Verwendung von Zero-Trust-Prinzipien entwirft und gestaltet und Sicherheitsanforderungen für Cloud-Infrastrukturen in verschiedenen Servicemodellen (SaaS, PaaS, IaaS) spezifiziert.

Zielgruppe

IT Professional

Voraussetzungen

Microsoft 365, AdministrationMicrosoft 365, Administration

Dauer und Investition

Seminardauer: 4 Tag(e)
€ 2.550,- pro Teilnehmer excl. MwSt.
Individuelle Firmenseminare
Frühbucher-Bonus möglich
Mehr Teilnehmer?
Punktekarte

Termine
  • 13.11.23 in Innsbruck
  • 11.03.24 in Innsbruck
  • 11.03.24 als Online-Webinar
  • 18.11.24 in Innsbruck
  • 18.11.24 als Online-Webinar
Hinweis

SC-100T00, Dieses Seminar dient zu Vorbereitung zur Zertifizierung Microsoft Certified: Cybersecurity Architect Expert

Original-Seminar

SC-100T00 mit digitalen Seminarunterlagen.

InhalteAlle Details anzeigen

    1. Tag

    • Build an overall security strategy and architecture
    • Zero Trust overview
    • Develop Integration points in an architecture
    • Develop security requirements based on business goals
    • Translate security requirements into technical capabilities
    • Design security for a resiliency strategy
    • Design a security strategy for hybrid and multi-tenant environments
    • Design strategies for traffic filtering and segmentation
    • Understand security for protocols
    • Design a security operations strategy
    • Security operations frameworks, processes, and procedures
    • Design a logging and auditing security strategy
    • Develop security operations for hybrid and multi-cloud environments
    • Design a strategy for SIEM and Security Orchestration
    • Evaluate security workflows
    • Review security strategies for incident management
    • Security operations strategy for sharing technical threat intelligence
    • Monitor sources for insights on threats and mitigations
    • Design an identity security strategy
    • Secure access to cloud resources
    • Recommend an identity store for security
    • Secure authentication and security authorization strategies
    • Secure conditional access
    • Design a strategy for role assignment and delegation
    • Identity governance for access reviews and entitlement management
    • Design a security strategy for privileged role access to infrastructure
    • Design a security strategy for privileged activities
    • Understand security for protocols

    2. Tag

    • Evaluate a regulatory compliance strategy
    • Interpret compliance requirements and their technical capabilities
    • Evaluate infrastructure compliance by using Defender for Cloud
    • Interpret compliance scores and recommend actions
    • Design and validate implementation of Azure Policy
    • Design for data residency Requirements
    • Privacy requirements and requirements for security solutions
    • Interpret compliance requirements and their technical capabilities
    • Security posture and technical strategies to manage risk
    • Evaluate security postures by using benchmarks
    • Evaluate security postures by using Microsoft Defender for Cloud
    • Evaluate security postures by using Secure Scores
    • Evaluate security hygiene of Cloud Workloads
    • Design security for an Azure Landing Zone
    • Interpret technical threat intelligence
    • Security controls to mitigate identified risks

    3. Tag

    • Understand architecture best practices for the Cloud
    • Plan and implement a security strategy across teams
    • Strategy and process for proactive and continuous evolution
    • Network protocols for network segmentation and traffic filtering
    • Design a strategy for securing server and client endpoints
    • Specify security baselines for server and client endpoints
    • Specify security requirements for servers
    • Specify security requirements for mobile devices and clients
    • Specify requirements for securing Active Directory Domain Services
    • Design a strategy to manage secrets, keys, and certificates
    • Design a strategy for secure remote access
    • Understand deep forensics procedures by resource type

    4. Tag

    • Design a strategy for securing PaaS, IaaS, and SaaS services
    • Specify security baselines for PaaS, IaaS, SaaS services
    • Specify security requirements for IoT, data and web workloads
    • Specify security requirements for storage workloads
    • Specify security requirements for containers and container orchestration
    • Specify security requirements for applications
    • Understand application threat modeling
    • Specify priorities for mitigating threats to applications
    • Specify a security standard for onboarding a new application
    • Specify a security strategy for applications and APIs
    • Prioritize mitigating threats to data
    • Design a strategy to identify and protect sensitive data
    • Specify an encryption standard for data at rest and in motion

    Beschreibung

    Die Microsoft Cloud Lösungen haben ein vielfältiges Portfolio im Sicherheitsumfeld für Compliance, Identity, Risikomanagement und Detection.