ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies

دانلود کتاب مایکروسافت Cybersecurity Architect Exam Ref SC-100: با یادگیری نحوه توسعه استراتژی های امنیت سایبری بسیار موثر، به راحتی گواهینامه دریافت کنید

Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies

مشخصات کتاب

Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 1803242396, 9781803242392 
ناشر: Packt Publishing 
سال نشر: 2023 
تعداد صفحات: 272 
زبان: English 
فرمت فایل : RAR (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 26 Mb 

قیمت کتاب (تومان) : 41,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مایکروسافت Cybersecurity Architect Exam Ref SC-100: با یادگیری نحوه توسعه استراتژی های امنیت سایبری بسیار موثر، به راحتی گواهینامه دریافت کنید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مایکروسافت Cybersecurity Architect Exam Ref SC-100: با یادگیری نحوه توسعه استراتژی های امنیت سایبری بسیار موثر، به راحتی گواهینامه دریافت کنید


توضیحاتی درمورد کتاب به خارجی

Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges

Key Features

  • Gain a deep understanding of all topics covered in the SC-100 exam
  • Benefit from practical examples that will help you put your new knowledge to work
  • Design a zero-trust architecture and strategies for data, applications, access management, identity, and infrastructure

Book Description

Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you'll have everything you need to pass the SC-100 exam.

This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you'll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions.

By the end of this book, you'll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors.

What you will learn

  • Design a zero-trust strategy and architecture
  • Evaluate GRC technical strategies and security operations strategies
  • Design security for infrastructure
  • Develop a strategy for data and applications
  • Understand everything you need to pass the SC-100 exam with ease
  • Use mock exams and sample questions to prepare for the structure of the exam

Who this book is for

This book is for a wide variety of cybersecurity professionals – from security engineers and cybersecurity architects to Microsoft 365 administrators, user and identity administrators, infrastructure administrators, cloud security engineers, and other IT professionals preparing to take the SC-100 exam. It's also a good resource for those designing cybersecurity architecture without preparing for the exam. To get started, you'll need a solid understanding of the fundamental services within Microsoft 365, and Azure, along with knowledge of security, compliance, and identity capabilities in Microsoft and hybrid architectures.

Table of Contents

  1. Cybersecurity in the Cloud
  2. Building an Overall Security Strategy and Architecture
  3. Designing a Security Operations Strategy
  4. Designing an Identity Security Strategy
  5. Designing a Regulatory Compliance Strategy
  6. Evaluating the Security Posture and Recommending Technical Strategies to Manage Risk
  7. Designing a Strategy for Securing Server and Client Endpoints
  8. Designing a Strategy for Securing SaaS, PaaS, and IaaS
  9. Specifying Security Requirements for Applications
  10. Designing a Strategy for Securing Data
  11. Case Study Responses and Final Assessment/Mock Exam
  12. Appendix: Preparing for Your Microsoft Exam


فهرست مطالب

Cover
Title Page
Copyright and Credits
Foreword
Contributors
Table of Contents
Preface
Part 1: The Evolution of Cybersecurity in the Cloud
Chapter 1: Cybersecurity in the Cloud
	What is cybersecurity?
	Evolution of cybersecurity from on-premises to the cloud
		Defense-in-depth security strategy
		Building a defense-in-depth security posture
		Shared responsibility in cloud security
	Cybersecurity architecture use cases
		Security operations
		Understanding the stages of a cyber attack
	Understanding the scope of cybersecurity in the cloud
		Shared responsibility scope
		Principles of the zero-trust methodology
		Common threats and attacks
		Internal threats
		External threats
	Summary
Part 2: Designing a Zero-Trust Strategy and Architecture
Chapter 2: Building an Overall Security Strategy and Architecture
	Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture
		How are the MCRA used?
		What are the components of the MCRA?
	Translating business goals into security requirements
		Threat analysis
	Translating security requirements into technical capabilities
		Physical
		Identity and access
		Perimeter security
		Network security
		Compute
		Applications
		Data
	Designing security for a resiliency strategy
	Integrating a hybrid or multi-tenant environment into a security strategy
	Developing a technical and governance strategy for traffic filtering and segmentation
	Summary
Chapter 3: Designing a Security Operations Strategy
	Designing a logging and auditing strategy to support security operations
		Security operations overview
		Microsoft security operations tools
		Logging and auditing for threat and vulnerability detection
	Developing security operations to support a hybrid or multi-cloud environment
	Designing a strategy for SIEM and SOAR
	Evaluating security workflows
		Security strategies for incident management and response
		Security workflows
	Evaluating a security operations strategy for the incident management life cycle
	Evaluating a security operations strategy for sharing technical threat intelligence
	Summary
Chapter 4: Designing an Identity Security Strategy
	Zero Trust for identity and access management
	Designing a strategy for access to cloud resources
	Recommending an identity store
		Azure AD tenant synchronization with SCIM
		B2B
		B2C
	Recommending an authentication and authorization strategy
		Hybrid identity infrastructure
		Secure authorization methods
	Designing a strategy for CA
	Designing a strategy for role assignment and delegation
	Designing a security strategy for privileged role access
		Azure AD PIM
	Designing a security strategy for privileged activities
		Privileged access reviews
		Entitlement management (aka permission management)
		Cloud tenant administration
	Case study – designing a Zero Trust architecture
	Summary
Part 3: Evaluating Governance, Risk, and Compliance (GRC) Technical Strategies and Security Operations Strategies
Chapter 5: Designing a Regulatory Compliance Strategy
	Interpreting compliance requirements and translating them into specific technical capabilities
	Evaluating infrastructure compliance by using Microsoft Defender for Cloud
	Interpreting compliance scores and recommending actions to resolve issues or improve security
	Designing the implementation of Azure Policy
	Designing for data residency requirements
	Translating privacy requirements into requirements for security solutions
	Case study – designing for regulatory compliance
	Summary
Chapter 6: Evaluating the Security Posture and Recommending Technical Strategies to Manage Risk
	Evaluating the security posture by using benchmarks
	Evaluating the security posture by using Microsoft Defender for Cloud
	Evaluating the security posture by using Secure Scores
	Evaluating the security posture of cloud workloads
	Designing security for an Azure Landing Zone
	Interpreting technical threat intelligence and recommending risk mitigations
	Recommending security capabilities or controls to mitigate identified risks
	Case study – evaluating the security posture
	Summary
Part 4: Designing Security for Infrastructure
Chapter 7: Designing a Strategy for Securing Server and Client Endpoints
	Planning and implementing a security strategy across teams
	Specifying security baselines for server and client endpoints
	Specifying security requirements for servers, including multiple platforms and operating systems
	Specifying security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration
	Specifying requirements to secure AD DS
	Designing a strategy to manage secrets, keys, and certificates
	Designing a strategy for secure remote access
	Understanding security operations frameworks, processes, and procedures
	Case study – designing a secure architecture for endpoints
	Summary
Chapter 8: Designing a Strategy for Securing SaaS, PaaS, and IaaS
	Specifying security baselines for SaaS, PaaS, and IaaS services
		Security baselines for SaaS
		Security baselines for IaaS
		Security baselines for PaaS
	Specifying security requirements for IoT workloads
	Specifying security requirements for data workloads, including SQL, Azure SQL Database, Azure Synapse, and Azure Cosmos DB
	Specifying security requirements for storage workloads, including Azure Storage
	Specifying security requirements for web workloads, including Azure App Service
	Specifying security requirements for containers
	Specifying security requirements for container orchestration
	Case study – security requirements for IaaS, PaaS, and SaaS
	Summary
Part 5: Designing a Strategy for Data and Applications
Chapter 9: Specifying Security Requirements for Applications
	Specifying priorities for mitigating threats to applications
		Identity and secrets handling and use
		Segmentation and configuration
		Static and dynamic testing
		Data handling and access
		Security posture management and workload protection
	Specifying a security standard for onboarding a new application
	Specifying a security strategy for applications and APIs
	Case study – security requirements for applications
	Summary
Chapter 10: Designing a Strategy for Securing Data
	Specifying priorities for mitigating threats to data
		Managing the risk to data
		Ransomware protection and recovery
	Designing a strategy to identify and protect sensitive data
	Specifying an encryption standard for data at rest and in motion
		Encryption at rest
		Encryption in transit
		Identity and secrets handling and use
	Case study – designing a strategy to secure data
	Summary
Chapter 11: Case Study Responses and Final Assessment/Mock Exam
	Case study sample responses
		Chapter 4 – designing a zero-trust architecture
		Chapter 5 – designing for regulatory compliance
		Chapter 6 – evaluating the security posture
		Chapter 7 – designing a secure architecture for endpoints
		Chapter 8 – security requirements for IaaS, PaaS, and SaaS
		Chapter 9 – security requirements for applications
		Chapter 10 – designing a strategy to secure data
	Mock exam practice questions
		Questions
	Mock exam answers and chapter reference
	Summary
Appendix: Preparing for Your Microsoft Exam
	Technical requirements
	Preparing for a Microsoft exam
		Resources to prepare for the exam
		Access to a subscription
		Where to take the exam
		Exam format
	Resources available and accessing Microsoft Learn
		Accessing Microsoft Learn
		Finding content on Microsoft Learn
		Exam pages on Microsoft Learn
	Creating a Microsoft 365 trial subscription
		Office 365 or Microsoft 365 trial subscription
		Enterprise Mobility + Security subscription
	Setting up a free month of Azure services
	Exam objectives
	Who should take the SC-100 exam?
	Summary
Index
Other Books You May Enjoy




نظرات کاربران