دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Dwayne Natwick
سری:
ISBN (شابک) : 1803242396, 9781803242392
ناشر: Packt Publishing
سال نشر: 2023
تعداد صفحات: 272
زبان: English
فرمت فایل : RAR (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 26 Mb
در صورت تبدیل فایل کتاب Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مایکروسافت Cybersecurity Architect Exam Ref SC-100: با یادگیری نحوه توسعه استراتژی های امنیت سایبری بسیار موثر، به راحتی گواهینامه دریافت کنید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges
Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you'll have everything you need to pass the SC-100 exam.
This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you'll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions.
By the end of this book, you'll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors.
This book is for a wide variety of cybersecurity professionals – from security engineers and cybersecurity architects to Microsoft 365 administrators, user and identity administrators, infrastructure administrators, cloud security engineers, and other IT professionals preparing to take the SC-100 exam. It's also a good resource for those designing cybersecurity architecture without preparing for the exam. To get started, you'll need a solid understanding of the fundamental services within Microsoft 365, and Azure, along with knowledge of security, compliance, and identity capabilities in Microsoft and hybrid architectures.
Cover Title Page Copyright and Credits Foreword Contributors Table of Contents Preface Part 1: The Evolution of Cybersecurity in the Cloud Chapter 1: Cybersecurity in the Cloud What is cybersecurity? Evolution of cybersecurity from on-premises to the cloud Defense-in-depth security strategy Building a defense-in-depth security posture Shared responsibility in cloud security Cybersecurity architecture use cases Security operations Understanding the stages of a cyber attack Understanding the scope of cybersecurity in the cloud Shared responsibility scope Principles of the zero-trust methodology Common threats and attacks Internal threats External threats Summary Part 2: Designing a Zero-Trust Strategy and Architecture Chapter 2: Building an Overall Security Strategy and Architecture Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture How are the MCRA used? What are the components of the MCRA? Translating business goals into security requirements Threat analysis Translating security requirements into technical capabilities Physical Identity and access Perimeter security Network security Compute Applications Data Designing security for a resiliency strategy Integrating a hybrid or multi-tenant environment into a security strategy Developing a technical and governance strategy for traffic filtering and segmentation Summary Chapter 3: Designing a Security Operations Strategy Designing a logging and auditing strategy to support security operations Security operations overview Microsoft security operations tools Logging and auditing for threat and vulnerability detection Developing security operations to support a hybrid or multi-cloud environment Designing a strategy for SIEM and SOAR Evaluating security workflows Security strategies for incident management and response Security workflows Evaluating a security operations strategy for the incident management life cycle Evaluating a security operations strategy for sharing technical threat intelligence Summary Chapter 4: Designing an Identity Security Strategy Zero Trust for identity and access management Designing a strategy for access to cloud resources Recommending an identity store Azure AD tenant synchronization with SCIM B2B B2C Recommending an authentication and authorization strategy Hybrid identity infrastructure Secure authorization methods Designing a strategy for CA Designing a strategy for role assignment and delegation Designing a security strategy for privileged role access Azure AD PIM Designing a security strategy for privileged activities Privileged access reviews Entitlement management (aka permission management) Cloud tenant administration Case study – designing a Zero Trust architecture Summary Part 3: Evaluating Governance, Risk, and Compliance (GRC) Technical Strategies and Security Operations Strategies Chapter 5: Designing a Regulatory Compliance Strategy Interpreting compliance requirements and translating them into specific technical capabilities Evaluating infrastructure compliance by using Microsoft Defender for Cloud Interpreting compliance scores and recommending actions to resolve issues or improve security Designing the implementation of Azure Policy Designing for data residency requirements Translating privacy requirements into requirements for security solutions Case study – designing for regulatory compliance Summary Chapter 6: Evaluating the Security Posture and Recommending Technical Strategies to Manage Risk Evaluating the security posture by using benchmarks Evaluating the security posture by using Microsoft Defender for Cloud Evaluating the security posture by using Secure Scores Evaluating the security posture of cloud workloads Designing security for an Azure Landing Zone Interpreting technical threat intelligence and recommending risk mitigations Recommending security capabilities or controls to mitigate identified risks Case study – evaluating the security posture Summary Part 4: Designing Security for Infrastructure Chapter 7: Designing a Strategy for Securing Server and Client Endpoints Planning and implementing a security strategy across teams Specifying security baselines for server and client endpoints Specifying security requirements for servers, including multiple platforms and operating systems Specifying security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration Specifying requirements to secure AD DS Designing a strategy to manage secrets, keys, and certificates Designing a strategy for secure remote access Understanding security operations frameworks, processes, and procedures Case study – designing a secure architecture for endpoints Summary Chapter 8: Designing a Strategy for Securing SaaS, PaaS, and IaaS Specifying security baselines for SaaS, PaaS, and IaaS services Security baselines for SaaS Security baselines for IaaS Security baselines for PaaS Specifying security requirements for IoT workloads Specifying security requirements for data workloads, including SQL, Azure SQL Database, Azure Synapse, and Azure Cosmos DB Specifying security requirements for storage workloads, including Azure Storage Specifying security requirements for web workloads, including Azure App Service Specifying security requirements for containers Specifying security requirements for container orchestration Case study – security requirements for IaaS, PaaS, and SaaS Summary Part 5: Designing a Strategy for Data and Applications Chapter 9: Specifying Security Requirements for Applications Specifying priorities for mitigating threats to applications Identity and secrets handling and use Segmentation and configuration Static and dynamic testing Data handling and access Security posture management and workload protection Specifying a security standard for onboarding a new application Specifying a security strategy for applications and APIs Case study – security requirements for applications Summary Chapter 10: Designing a Strategy for Securing Data Specifying priorities for mitigating threats to data Managing the risk to data Ransomware protection and recovery Designing a strategy to identify and protect sensitive data Specifying an encryption standard for data at rest and in motion Encryption at rest Encryption in transit Identity and secrets handling and use Case study – designing a strategy to secure data Summary Chapter 11: Case Study Responses and Final Assessment/Mock Exam Case study sample responses Chapter 4 – designing a zero-trust architecture Chapter 5 – designing for regulatory compliance Chapter 6 – evaluating the security posture Chapter 7 – designing a secure architecture for endpoints Chapter 8 – security requirements for IaaS, PaaS, and SaaS Chapter 9 – security requirements for applications Chapter 10 – designing a strategy to secure data Mock exam practice questions Questions Mock exam answers and chapter reference Summary Appendix: Preparing for Your Microsoft Exam Technical requirements Preparing for a Microsoft exam Resources to prepare for the exam Access to a subscription Where to take the exam Exam format Resources available and accessing Microsoft Learn Accessing Microsoft Learn Finding content on Microsoft Learn Exam pages on Microsoft Learn Creating a Microsoft 365 trial subscription Office 365 or Microsoft 365 trial subscription Enterprise Mobility + Security subscription Setting up a free month of Azure services Exam objectives Who should take the SC-100 exam? Summary Index Other Books You May Enjoy