TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
Microsoft
SC-100: Microsoft Cybersecurity Architect
Curriculum
10 Sections
116 Lessons
12 Hours
Expand all sections
Collapse all sections
01. Designing Security Solutions for Infrastructure
18
1.1
Introduction to SC-100
1.2
How to Set Up Defender for Cloud Governance Rules
1.3
Defender for Cloud Workflow Automation
1.4
How to Set Up Defender for Cloud Workflow Automation
1.5
What is Defender for Cloud Governance Rules
1.6
Email Notification in Defender for Cloud
1.7
How to Assign Compliance Standards in Defender for Cloud
1.8
How to Create an Azure Management Group
1.9
How to Create an Azure Management Group What is Regulatory Compliance in Defender for Cloud
1.10
What Are Azure Management Groups
1.11
What is the Azure Security Benchmark
1.12
Walkthrough of Microsoft Defender for Cloud
1.13
What is Microsoft Defender for Cloud
1.14
Securing Endpoints and Servers
1.15
Integration with Third-Party Cloud Providers
1.16
Posture Management Process
1.17
What Are Adaptive Application Controls
1.18
Microsoft Secure Score
02. Detection, Identity Basics & Zero-Trust Roles
12
2.1
Microsoft Entra Identity Protection
2.2
Looking at CIS Benchmarks
2.3
What is B2B Collaboration in Microsoft Entra ID
2.4
Managing Guest Access and Policies in Microsoft Entra ID
2.5
Lifecycle Management Provisioning and Deprovisioning
2.6
Cross-Tenant Access Settings in Microsoft Entra
2.7
Role-Based Access Control (RBAC)
2.8
Microsoft Entra ID vs. On-Premises Active Directory
2.9
Microsoft Entra Roles in a Zero Trust Architecture
2.10
Core Identity Types in Microsoft Entra ID
2.11
What is Microsoft Entra ID
2.12
Detection & Response (XDR, SIEM)
03. Entitlement & Access Lifecycle Management
11
3.1
Managing Access to Your Log Analytics Workspace
3.2
Microsoft Log Analytics Workspace
3.3
How to Create a Log Analytics Workspace
3.4
Protect and Govern Service Principals & Managed Identities
3.5
Managed Identities (System-Assigned vs. User-Assigned)
3.6
Walkthrough of Access Reviews (Microsoft Entra)
3.7
Microsoft Entra Workload Identities
3.8
Access Packages Grouping Apps, Groups, and Resources
3.9
Request Workflows and Access Expiration
3.10
MyAccess Portal for End-User Self-Service
3.11
Entitlement Management & Access Reviews in Microsoft Entra
04. Sentinel Deployment & Automation Foundations
12
4.1
Microsoft Sentinel Azure Activity
4.2
Assign Microsoft Sentinel RBAC
4.3
Microsoft Sentinel Analytics Rules
4.4
What Are Sentinel Playbooks
4.5
Microsoft Sentinel Blades Explained
4.6
Microsoft Sentinel Data Connectors
4.7
Create Automation Rule in Microsoft Sentinel
4.8
Best Practices for Deploying Microsoft Sentinel
4.9
Automation in Incident Response
4.10
How to Set Up Microsoft Sentinel
4.11
Microsoft Sentinel
4.12
Microsoft Sentinel Workbooks
05. Cloud-Native Security Integrations & Network Controls
12
5.1
Review Conditional Access Policy Templates
5.2
When to Apply Policy Templates
5.3
Conditional Access and Zero Trust
5.4
Old Way of Using Microsoft Entra Identity Protection
5.5
Set Up a Conditional Access Policy from Scratch
5.6
Design Conditional Access Policies
5.7
Designing Identity Solutions for Cloud & Hybrid Environments
5.8
Threat Hunting & Incident Handling
5.9
What Are Application Security Groups
5.10
What is Azure Traffic Manager
5.11
Integrate Microsoft Sentinel with Defender for Cloud
5.12
Using Microsoft Defender for Cloud with Sentinel
06. Advanced Conditional Access & Privileged Identity Management
12
6.1
How to View Audit History in Microsoft Entra Privileged Identity Management (PIM)
6.2
How to Assign Roles in PIM
6.3
How to Configure PIM Role Settings
6.4
What Are PIM Role Settings
6.5
What is Privileged Identity Management (PIM)
6.6
Secure B2B Access with Conditional Access
6.7
What Are Role-Assignable Groups
6.8
Configure Authentication Strength (MFA, FIDO2)
6.9
How to Deploy Microsoft Entra Privileged Identity Management (PIM)
6.10
Applying Authentication Context for Granular Control
6.11
Review Conditional Access Policies with PIM
6.12
How to Structure Policy Tiers for Zero Trust Enforcement
07. Designing Solutions Aligned with Compliance and Best Practices
12
7.1
Cybersecurity Reference Architectures & Frameworks
7.2
Zero Trust Conditional Access Policy
7.3
Review Azure Policy Compliant Resources
7.4
How to Deploy Azure Policy Initiatives
7.5
How to Deploy an Azure Policy
7.6
How to Create a Custom Azure Policy
7.7
How to Create a Custom Azure Policy
7.8
How to Deploy an Azure Policy
7.9
Zero Trust and Azure Policies
7.10
What is Azure Policy
7.11
How to Create Azure Management Groups and RBAC
7.12
Overview of Microsoft Purview
08. Securing Applications
7
8.1
Walkthrough Microsoft 365 Admin Center
8.2
Anti-Phishing Policies in Microsoft 365 Defender
8.3
Microsoft Copilot for Microsoft 365 Services
8.4
Microsoft Cloud App Security
8.5
Securing Microsoft 365 Environments
8.6
What is Microsoft 365 Admin Center
8.7
Securing Applications in the Cloud
09. Data Protection & Encryption
14
9.1
How to Setup Auditing for Azure SQL Database
9.2
Using Azure Policies with Azure SQL Database
9.3
Setup Microsoft Entra Authentication
9.4
How to Create an Azure SQL Database
9.5
What Are Azure SQL Databases
9.6
Azure Storage Account – Shared Access Signature
9.7
How to Enable Storage Account Authorization Through Entra
9.8
Azure Storage Account – Access Keys
9.9
How to Manage Disk Encryption
9.10
How to Create a Storage Account
9.11
What is Azure Storage Encryption
9.12
Key Management with Azure Key Vault
9.13
Data Encryption Concepts and Implementation
9.14
Introduction to Organizational Data Protection
10. Data Governance & Classification
6
10.1
Best Practices for Organizational Data Security
10.2
Securing Data with Microsoft Purview & Sentinel
10.3
Data Discovery & Classification with Microsoft Purview
10.4
Using Microsoft Purview for Discovery & Classification
10.5
Purview Information Protection
10.6
Microsoft Purview – Data Discovery, Classification, Protection, and Monitoring
This content is protected, please
login
and
enroll
in the course to view this content!