CBTNuggets - Microsoft Certified Cybersecurity Architect Expert (SC-100) Online Training 2023-2
File List
- 2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 108.3 MB
- 3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 60.8 MB
- 10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 59.4 MB
- 6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 56.2 MB
- 7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 51.1 MB
- 3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 51.0 MB
- 10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 50.9 MB
- 3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 49.8 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 48.1 MB
- 6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 47.4 MB
- 9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 46.1 MB
- 2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 45.7 MB
- 2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 45.6 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 44.9 MB
- 4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 44.1 MB
- 2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 44.1 MB
- 10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 42.5 MB
- 5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 41.0 MB
- 7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 40.8 MB
- 4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 40.3 MB
- 9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/3. Security Requirements for Data Workloads - Microsoft Certifi-1.mp4 39.1 MB
- 8. Designing a Strategy for Securing Server and Client Endpoints/1. Security Baselines for Servers and Client Endpoints - Micros-1.mp4 39.0 MB
- 3. Designing Security Strategies/1. Designing Security for a Resiliency Strategy - Microsoft Cer.mp4 38.4 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/1. Examining the Microsoft Cybersecurity Reference Architecture-1.mp4 38.1 MB
- 6. Designing a Regulatory Compliance Strategy/1. Translating Compliance Requirements - Microsoft Certified Cy-1.mp4 37.8 MB
- 10. Design a security strategy for data and applications/6. Encryption Standards for Data at Rest and In Motion - Micros-1.mp4 37.6 MB
- 8. Designing a Strategy for Securing Server and Client Endpoints/3. Security Requirements for Mobile Devices and Clients - Micro.mp4 37.2 MB
- 4. Designing a Security Operations Strategy/2. Frameworks, Processes, and Procedures - Microsoft Certified .mp4 37.2 MB
- 10. Design a security strategy for data and applications/2. Onboarding New Applications - Microsoft Certified Cybersecur-1.mp4 36.2 MB
- 8. Designing a Strategy for Securing Server and Client Endpoints/5. Strategy to Manage Secrets, Keys, and Certificates - Microso-1.mp4 36.0 MB
- 8. Designing a Strategy for Securing Server and Client Endpoints/2. Security Requirements for Servers - Microsoft Certified Cybe.mp4 35.7 MB
- 8. Designing a Strategy for Securing Server and Client Endpoints/4. Requirements to Secure Active Directory Domain Services - Mi-1.mp4 33.9 MB
- 9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/6. Security Requirements for Containers and Orchestration - Mic-1.mp4 32.8 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/9. Other Resources - Microsoft Certified Cybersecurity Architec.mp4 31.9 MB
- 5. Designing an Identity Security Strategy/4. Strategy for Conditional Access - Microsoft Certified Cybers.mp4 31.7 MB
- 6. Designing a Regulatory Compliance Strategy/2. Compliance and Defender for Cloud - Microsoft Certified Cybe-1.mp4 31.5 MB
- 10. Design a security strategy for data and applications/5. Identify and Protect Sensitive Data - Microsoft Certified Cy.mp4 31.4 MB
- 4. Designing a Security Operations Strategy/1. Security Operations Strategy Overview - Microsoft Certified .mp4 31.4 MB
- 2. Translating Security Requirements/5. Azure Security Top 10 - Microsoft Certified Cybersecurity Ar.mp4 31.2 MB
- 6. Designing a Regulatory Compliance Strategy/5. Data Residency Requirements - Microsoft Certified Cybersecur.mp4 30.9 MB
- 7. Evaluating and Managing Security Postures/5. Interpret Technical Threat Intelligence - Microsoft Certifie-1.mp4 30.0 MB
- 2. Translating Security Requirements/1. Guiding Principals of Zero Trust - Microsoft Certified Cyber.mp4 29.8 MB
- 7. Evaluating and Managing Security Postures/1. Evaluating Security Postures by Using Benchmarks - Microsoft-1.mp4 29.4 MB
- 9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/5. Security Requirements for Storage Workloads - Microsoft Cert-1.mp4 28.6 MB
- 5. Designing an Identity Security Strategy/7. Strategy for Privileged Activities - Microsoft Certified Cyb.mp4 28.5 MB
- 5. Designing an Identity Security Strategy/6. Privileged Role Access to Infrastructure - Microsoft Certifi-1.mp4 28.0 MB
- 8. Designing a Strategy for Securing Server and Client Endpoints/6. Strategy for Securing Remote Access - Microsoft Certified Cy.mp4 27.6 MB
- 4. Designing a Security Operations Strategy/6. Evaluating Security Workflows - Microsoft Certified Cybersec-1.mp4 27.4 MB
- 6. Designing a Regulatory Compliance Strategy/3. Compliance Scores and Recommendations - Microsoft Certified -1.mp4 27.4 MB
- 5. Designing an Identity Security Strategy/5. Role Assignment and Delegation - Microsoft Certified Cyberse-1.mp4 26.7 MB
- 7. Evaluating and Managing Security Postures/2. Evaluating Security Postures by Using Defender for Cloud - M-1.mp4 26.2 MB
- 9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/2. Security Requirements for IoT Workloads - Microsoft Certifie.mp4 26.0 MB
- 9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/4. Security Requirements for Web Workloads - Microsoft Certifie.mp4 25.5 MB
- 4. Designing a Security Operations Strategy/8. Strategy for Sharing Technical Threat Intelligence - Microso.mp4 24.2 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/6. Information Protection - Microsoft Certified Cybersecurity A.mp4 23.9 MB
- 5. Designing an Identity Security Strategy/3. Authentication and Authorization Strategy - Microsoft Certif-1.mp4 23.4 MB
- 7. Evaluating and Managing Security Postures/3. Evaluate Security Posture of Cloud Workloads - Microsoft Cer-1.mp4 22.9 MB
- 10. Design a security strategy for data and applications/7. Azure Data Security and Encryption Best Practices - Microsof.mp4 21.3 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/3. SaaS & Identity Protection - Microsoft Certified Cybersecuri.mp4 20.5 MB
- 3. Designing Security Strategies/3. Multi-tenant Environmental Security Strategies - Microsoft C.mp4 20.1 MB
- 5. Designing an Identity Security Strategy/2. Identity Store Strategy - Microsoft Certified Cybersecurity .mp4 18.7 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/7. IoT and Operational Technology (OT) - Microsoft Certified Cy-1.mp4 16.6 MB
- 4. Designing a Security Operations Strategy/4. SecOps for a Hybrid or Multi-cloud Environment - Microsoft C-1.mp4 16.0 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/8. People Security - Microsoft Certified Cybersecurity Architec.mp4 15.9 MB
- 1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/4. Endpoints and Devices - Microsoft Certified Cybersecurity Ar-1.mp4 15.8 MB
- 4. Designing a Security Operations Strategy/7. Incident Management - Microsoft Certified Cybersecurity Arch.mp4 15.8 MB
- 2. Translating Security Requirements/4. Technical Solutions Basics - Microsoft Certified Cybersecuri.mp4 15.6 MB
- Read me.txt 164 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.