MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023)

Gain a competitive edge with MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023), featuring real certification questions from past exams.

Ethan Howard
Contributor
4.1
55
10 months ago
Preview (16 of 730 Pages)
100%
Log in to unlock

Page 1

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 1 preview image

Loading page ...

Page 2

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 2 preview image

Loading page ...

Page 3

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 3 preview image

Loading page ...

Table of ContentsCoverTitle PageCopyrightDedicationAcknowledgmentsAbout the AuthorsAbout the Technical EditorIntroductionWhat Is Azure?About the SC-100 Certification ExamWhy Become a Certified Microsoft Azure CybersecurityArchitect?Preparing to Become a Certified Microsoft CybersecurityArchitectHow to Become a Certified Microsoft Cybersecurity ArchitectWho Should Buy This BookHow This Book Is OrganizedBonus Digital ContentsConventions Used in This BookUsing This BookSC-100 Exam ObjectivesHow to Contact the PublisherAssessment TestAnswers to Assessment TestChapter 1: Define and Implement an Overall Security Strategy andArchitectureBasics of Cloud Computing

Page 4

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 4 preview image

Loading page ...

Introduction to CybersecurityCybersecurity DomainsGetting Started with Zero TrustDesign Integration Points in an ArchitectureDesign Security Needs to Be Based on Business GoalsDecode Security Requirements to Technical AbilitiesDesign Security for a Resiliency ApproachIdentify the Security Risks Associated with Hybrid and Multi-Tenant EnvironmentsPlan Traffic Filtering and Segmentation Technical andGovernance StrategiesSummaryExam EssentialsReview QuestionsChapter 2: Define a Security Operations StrategyFoundation of Security Operations and StrategyDesign a Logging and Auditing Strategy to Support SecurityOperationsDevelop Security Operations to Support a Hybrid or Multi-Cloud EnvironmentDesign a Strategy for SIEM and SOAREvaluate Security WorkflowsEvaluate a Security Operations Strategy for the IncidentManagement Life CycleEvaluate a Security Operations Strategy for Sharing TechnicalThreat IntelligenceSummaryExam EssentialsReview QuestionsChapter 3: Define an Identity Security StrategyDesign a Strategy for Access to Cloud Resources

Page 5

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 5 preview image

Loading page ...

Recommend an Identity Store (Tenants, B2B, B2C, Hybrid)Recommend an Authentication and Authorization StrategyDesign a Strategy for Conditional AccessDesign a Strategy for Role Assignment and DelegationDesign a Security Strategy for Privileged Role Access toInfrastructure Including Identity-Based Firewall Rules andAzure PIMDesign a Security Strategy for Privileged Activities IncludingPAM, Entitlement Management, and Cloud TenantAdministrationSummaryExam EssentialsReview QuestionsChapter 4: Identify a Regulatory Compliance StrategyInterpret Compliance Requirements and Translate intoSpecific Technical CapabilitiesEvaluate Infrastructure Compliance by Using MicrosoftDefender for CloudInterpret Compliance Scores and Recommend Actions toResolve Issues or Improve SecurityDesign and Validate Implementation of Azure PolicyDesign for Data Residency RequirementsTranslate Privacy Requirements into Requirements forSecurity SolutionsSummaryExam EssentialsReview QuestionsChapter 5: Identify Security Posture and Recommend TechnicalStrategies to Manage RiskAnalyze Security Posture by Using Azure Security BenchmarkAnalyze Security Posture by Using Microsoft Defender for

Page 6

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 6 preview image

Loading page ...

CloudAssess the Security Hygiene of Cloud WorkloadsEvaluate the Security Posture of Cloud WorkloadsDesign Security for an Azure Landing ZoneEvaluate Security Postures by Using Secure ScoresIdentify Technical Threats and Recommend MitigationMeasuresRecommend Security Capabilities or Controls to MitigateIdentified RisksSummaryExam EssentialsReview QuestionsChapter 6: Define a Strategy for Securing InfrastructurePlan and Deploy a Security Strategy Across TeamsDeploy a Process for Proactive and Continuous Evolution of aSecurity StrategySpecify Security Baselines for Server and Client EndpointsSpecify Security Baselines for the Server, Including MultiplePlatforms and Operating SystemsSpecify Security Requirements for Mobile Devices andClients, Including Endpoint Protection, Hardening, andConfigurationSpecify Requirements for Securing Active Directory DomainServicesDesign a Strategy to Manage Secrets, Keys, and CertificatesDesign a Strategy for Secure Remote AccessDesign a Strategy for Securing Privileged AccessSummaryExam EssentialsReview QuestionsChapter 7: Define a Strategy and Requirements for Securing PaaS,

Page 7

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 7 preview image

Loading page ...

IaaS, and SaaS ServicesEstablish Security Baselines for SaaS, PaaS, and IaaS ServicesEstablish Security Requirements for IoT WorkloadsEstablish Security Requirements for Data Workloads,Including SQL Server, Azure SQL, Azure Synapse, and AzureCosmos DBDefine the Security Requirements for Web WorkloadsDetermine the Security Requirements for Storage WorkloadsDefine Container Security RequirementsDefine Container Orchestration Security RequirementsSummaryExam EssentialsReview QuestionsChapter 8: Define a Strategy and Requirements for Applicationsand DataKnowing the Application Threat Intelligence ModelSpecify Priorities for Mitigating Threats to ApplicationsSpecify a Security Standard for Onboarding a NewApplicationSpecify a Security Strategy for Applications and APIsSpecify Priorities for Mitigating Threats to DataDesign a Strategy to Identify and Protect Sensitive DataSpecify an Encryption Standard for Data at Rest and inMotionSummaryExam EssentialsReview QuestionsChapter 9: Recommend Security Best Practices and PrioritiesRecommend Best Practices for Cybersecurity Capabilities andControlsRecommend Best Practices for Protecting from Insider and

Page 8

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 8 preview image

Loading page ...

External AttacksRecommend Best Practices for Zero Trust SecurityRecommend Best Practices for Zero Trust RapidModernization PlanRecommend a DevSecOps ProcessRecommend a Methodology for Asset ProtectionRecommend Strategies for Managing and Minimizing RiskPlan for Ransomware Protection and Extortion-BasedAttacksProtect Assets from Ransomware AttacksRecommend Microsoft Ransomware Best PracticesSummaryExam EssentialsReview QuestionsAppendix: Answers to Review QuestionsChapter 1: Define and Implement an Overall SecurityStrategy and ArchitectureChapter 2: Define a Security Operations StrategyChapter 3: Define an Identity Security StrategyChapter 4: Identify a Regulatory Compliance StrategyChapter 5: Identify Security Posture and RecommendTechnical Strategies to Manage RiskChapter 6: Define a Strategy for Securing InfrastructureChapter 7: Define a Strategy and Requirements for SecuringPaaS, IaaS, and SaaS ServicesChapter 8: Define a Strategy and Requirements forApplications and DataChapter 9: Recommend Security Best Practices and PrioritiesIndexEnd User License Agreement

Page 9

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 9 preview image

Loading page ...

List of TablesChapter 2TABLE 2.1 Azure LogsTABLE 2.2 Security LogsChapter 3TABLE 3.1 Authentication MethodsTABLE 3.2 PersonasChapter 4TABLE 4.1 Azure ComplianceTABLE 4.2 Operational compliance problems and solutionsTABLE 4.3 Azure Policy GlossaryTABLE 4.4 Azure Policy's configuration maximumChapter 6TABLE 6.1 Sample MetricsTABLE 6.2 Best PracticesTABLE 6.3 BenefitsChapter 7TABLE 7.1 Azure Cloud Services and Azure SecurityBenchmarkTABLE 7.2 App Service Mapping to the Microsoft CloudSecurity BenchmarkTABLE 7.3 Microsoft Windows Virtual Machine MappingTABLE 7.4 Roles and Security RequirementsTABLE 7.5 Steps to Identify DataChapter 8TABLE 8.1 Questions to Ask

Page 10

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 10 preview image

Loading page ...

TABLE 8.2 Microsoft Threat Modeling Tool MitigationsTABLE 8.3 Risky ApplicationsTABLE 8.4 DevOps Phases and TasksTABLE 8.5 Security Strategy ComponentsTABLE 8.6 Method to Protect DataTABLE 8.7 Data ClassificationTABLE 8.8 Purview CapabilitiesTABLE 8.9 Data Protection CapabilitiesTABLE 8.10 Purview Data Life-Cycle ManagementCapabilitiesTABLE 8.11 Records ManagementChapter 9TABLE 9.1 Microsoft Azure Security Benchmark Keybestpratices across various...TABLE 9.2 Microsoft Security benchmark for Incidentresponse and logging per...TABLE 9.3 Best Practices for Identity Management,Privileged Access, and Net...TABLE 9.4 Protecting Against RansomwareTABLE 9.5 Securing Your Backup InfrastructureTABLE 9.6 Protecting from RansomwareTABLE 9.7 Protecting Organization DataTABLE 9.8 Privileged Access PerspectiveTABLE 9.9 Deployment ChecklistTABLE 9.10 Detection and Response Time PerspectiveTABLE 9.11 Deployment ChecklistTABLE 9.12 Remote Access Perspective

Page 11

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 11 preview image

Loading page ...

TABLE 9.13 Deployment ChecklistTABLE 9.14 Email and Collaboration PerspectiveTABLE 9.15 Deployment ChecklistTABLE 9.16 Endpoints PerspectiveTABLE 9.17 Deployment ChecklistTABLE 9.18 Accounts PerspectiveTABLE 9.19 Deployment ChecklistList of IllustrationsChapter 1FIGURE 1.1 Microsoft Zero Trust architectureFIGURE 1.2 High-level Microsoft Cybersecurity ReferenceArchitectureFIGURE 1.3 High-level Microsoft Cybersecurity ReferenceArchitecture SOC bui...FIGURE 1.4 High-level Microsoft Cybersecurity ReferenceArchitecture SaaS bu...FIGURE 1.5 High-level Microsoft Cybersecurity ReferenceArchitecture Hybrid ...FIGURE 1.6 High-level Microsoft Cybersecurity ReferenceArchitecture Endpoin...FIGURE 1.7 High-level Microsoft Cybersecurity ReferenceArchitecture Informa...FIGURE 1.8 High-level Microsoft Cybersecurity ReferenceArchitecture Identit...FIGURE 1.9 High-level Microsoft Cybersecurity ReferenceArchitecture People ...FIGURE 1.10 High-level Microsoft Cybersecurity ReferenceArchitecture IOT an...

Page 12

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 12 preview image

Loading page ...

FIGURE 1.11 Microsoft Cloud Adoption FrameworkFIGURE 1.12 Cybersecurity business alignment anddisciplinesFIGURE 1.13 Security resiliency managing riskFIGURE 1.14 Hybrid security identity environmentFIGURE 1.15 Deploying a secure hybrid networkChapter 2FIGURE 2.1 SOC operating modelFIGURE 2.2 Microsoft unified operationsFIGURE 2.3 References architecture for Microsoft Sentineland Defender for C...Chapter 3FIGURE 3.1 Enterprise access solution based on Zero TrustFIGURE 3.2 Microsoft identity governance method tomanage identities and acc...FIGURE 3.3 Microsoft Azure AD password hashsynchronization reference archit...FIGURE 3.4 Microsoft Azure AD pass-throughauthentication reference architec...FIGURE 3.5 Microsoft federated authentication referencearchitectureFIGURE 3.6 Microsoft authentication method decision treeFIGURE 3.7 Microsoft recommends end-to-end security.Chapter 4FIGURE 4.1 Microsoft's five cybersecurity disciplines of cloudgovernanceFIGURE 4.2 Microsoft Defender for CloudFIGURE 4.3 Azure policy logical view

Page 13

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 13 preview image

Loading page ...

Chapter 5FIGURE 5.1 Overall security governanceFIGURE 5.2 Security posture management rapidmodernization planFIGURE 5.3 Security posture management pillarsFIGURE 5.4 Microsoft Defender for Cloud regulatorycomplianceFIGURE 5.5 Microsoft Defender for Cloud DashboardFIGURE 5.6 Security hygiene recommendation remediationFIGURE 5.7 Security hygiene remediation workflowFIGURE 5.8 Microsoft Defender for Cloud—security hygieneof workloadsFIGURE 5.9 Microsoft Defender for Cloud Score dashboardFIGURE 5.10 Microsoft Defender for Cloud recommendationdashboardFIGURE 5.11 Building block CTI in SIEMFIGURE 5.12 Azure AD Identity Protection risk detectionFIGURE 5.13 Risk management frameworkFIGURE 5.14 Security control secure management dashboardFIGURE 5.15 Security encrypt data in transit dashboardChapter 6FIGURE 6.1 Microsoft-defined security roles andresponsibilitiesFIGURE 6.2 Microsoft approach to continuous assessmentFIGURE 6.3 Microsoft Defender for Cloud ASB OSB baselinefor Windows and Lin...FIGURE 6.4 Detailed view about remediationFIGURE 6.5 Microsoft approach to continuous assessment

Page 14

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 14 preview image

Loading page ...

FIGURE 6.6 Microsoft Defender for Identity with AD FSFIGURE 6.7 Microsoft Certified Authority integratedFIGURE 6.8 Microsoft Certified Authority and Key VaultintegratedFIGURE 6.9 Site-to-site VPNFIGURE 6.10 Microsoft Azure multisite S2S VPNFIGURE 6.11 Point-to-site VPNFIGURE 6.12 Microsoft Azure connectivityFIGURE 6.13 Microsoft Azure Remote connectivityFIGURE 6.14 Microsoft Azure privileged access securitystrategy guidelineChapter 7FIGURE 7.1 Microsoft Defender for IoTFIGURE 7.2 Security best practicesFIGURE 7.3 Security posture management for dataFIGURE 7.4 Microsoft Defender for Azure SQL databaseserversFIGURE 7.5 Security recommendations for SQL databasesFIGURE 7.6 Defender for Storage two-action viewFIGURE 7.7 Microsoft Defender for ContainersFIGURE 7.8 Azure Kubernetes Service clustersChapter 9FIGURE 9.1 Microsoft Cybersecurity Reference ArchitectureFIGURE 9.2 Prepare-enter-traverse-executeFIGURE 9.3 Technical-oriented program

Page 15

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 15 preview image

Loading page ...

MCEMicrosoft®Certified ExpertCybersecurity Architect StudyGuideExam SC-100Kathiravan UdayakumarPuthiyavan Udayakumar

Page 16

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 (2023) - Page 16 preview image

Loading page ...

Preview Mode

This document has 730 pages. Sign in to access the full document!