Curso Microsoft Cybersecurity Architect

  • Redes & Infraestrutura de TI

Curso Microsoft Cybersecurity Architect

24h
Visão Geral

Este é um curso avançado de nível especializado . Embora não seja obrigatório comparecer, os alunos são fortemente incentivados a obter e passar por outra certificação de nível associado no portfólio de segurança, conformidade e identidade (como AZ-500, SC-200 ou SC-300) antes de frequentar esta aula. Este curso prepara os alunos com experiência para projetar e avaliar estratégias de segurança cibernética nas seguintes áreas: Zero Trust, Governance Risk Compliance (GRC), operações de segurança (SecOps) e dados e aplicações. Os alunos também aprenderão como projetar e arquitetar soluções usando princípios de confiança zero e especificar requisitos de segurança para infraestrutura em nuvem em diferentes modelos de serviço (SaaS, PaaS, IaaS).

Publico Alvo
  • Este curso é para engenheiros de segurança em nuvem experientes que obtiveram uma certificação anterior no portfólio de segurança, conformidade e identidade. Especificamente, os alunos devem ter experiência e conhecimento avançados em uma ampla variedade de áreas de engenharia de segurança, incluindo identidade e acesso, proteção de plataforma, operações de segurança, proteção de dados e proteção de aplicativos. Eles também devem ter experiência com implementações híbridas e em nuvem. Os alunos iniciantes devem fazer o curso SC-900: Microsoft Security, Compliance, and Identity Fundamentals.
Pre-Requisitos
Materiais
Inglês/Português/Lab Pratico
Conteúdo Programatico

 Introduction to Zero Trust and best practice frameworks

  1. Zero Trust initiatives
  2. Zero Trust technology pillars part 1
  3. Zero Trust technology pillars part 2

Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

  1. Define a security strategy
  2. Cloud Adoption Framework secure methodology
  3. Design security with Azure Landing Zones
  4. The Well-Architected Framework security pillar

Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

  1. Design solutions with best practices for capabilities and controls
  2. Design solutions with best practices for attack protection

Design a resiliency strategy for common cyberthreats like ransomware

  1. Common cyberthreats and attack patterns
  2. Support business resiliency
  3. Ransomware protection
  4. Configurations for secure backup and restore
  5. Security updates

Design solutions that align with security best practices and priorities

  1. Case study description
  2. Case study answers
  3. Conceptual walkthrough
  4. Technical walkthrough

Design solutions for regulatory compliance

  1. Translate compliance requirements into a security solution
  2. Address compliance requirements with Microsoft Purview
  3. Address privacy requirements with Microsoft Priva
  4. Address security and compliance requirements with Azure policy
  5. Evaluate infrastructure compliance with Defender for Cloud

Design solutions for identity and access management

  1. Design cloud, hybrid and multicloud access strategies (including Azure AD)
  2. Design a solution for external identities
  3. Design modern authentication and authorization strategies
  4. Align conditional access and Zero Trust
  5. Specify requirements to secure Active Directory Domain Services (AD DS)
  6. Design a solution to manage secrets, keys, and certificates

Design solutions for securing privileged access

  1. The enterprise access model
  2. Design identity governance solutions
  3. Design a solution to secure tenant administration
  4. Design a solution for cloud infrastructure entitlement management (CIEM)
  5. Design a solution for privileged access workstations and bastion services

Design solutions for security operations

  1. Design security operations capabilities in hybrid and multicloud environments
  2. Design centralized logging and auditing
  3. Design security information and event management (SIEM) solutions
  4. Design solutions for detection and response
  5. Design a solution for security orchestration, automation, and response (SOAR)
  6. Design security workflows
  7. Design threat detection coverage

Design security operations, identity and compliance capabilities

  1. Case study description
  2. Case study answers
  3. Conceptual walkthrough
  4. Technical walkthrough

Design solutions for securing Microsoft 365

  1. Evaluate security posture for collaboration and productivity workloads
  2. Design a Microsoft 365 Defender solution
  3. Design configurations and operational practices for Microsoft 365

Design solutions for securing applications

  1. Design and implement standards to secure application development
  2. Evaluate security posture of existing application portfolios
  3. Evaluate application threats with threat modeling
  4. Design security lifecycle strategy for applications
  5. Secure access for workload identities
  6. Design a solution for API management and security
  7. Design a solution for secure access to applications

Design solutions for securing an organization's data

  1. Design a solution for data discovery and classification using Microsoft Purview
  2. Design a solution for data protection
  3. Design data security for Azure workloads
  4. Design security for Azure Storage
  5. Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage

Design security solutions for applications and data

  1. Case study description
  2. Case study answers
  3. Conceptual walkthrough
  4. Technical walkthrough

Specify requirements for securing SaaS, PaaS, and IaaS services

  1. Specify security baselines for SaaS, PaaS, and IaaS services
  2. Specify security requirements for web workloads
  3. Specify security requirements for containers and container orchestration

Design solutions for security posture management in hybrid and multicloud environments

  1. Evaluate security posture by using Microsoft Cloud Security Benchmark
  2. Design integrated posture management and workload protection
  3. Evaluate security posture by using Microsoft Defender for Cloud
  4. Posture evaluation with Microsoft Defender for Cloud secure score
  5. Design cloud workload protection with Microsoft Defender for Cloud
  6. Integrate hybrid and multicloud environments with Azure Arc
  7. Design a solution for external attack surface management

Design solutions for securing server and client endpoints

  1. Specify server security requirements
  2. Specify requirements for mobile devices and clients
  3. Specify internet of things (IoT) and embedded device security requirements
  4. Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
  5. Specify security baselines for server and client endpoints
  6. Design a solution for secure remote access

Design solutions for network security

  1. Design solutions for network segmentation
  2. Design solutions for traffic filtering with network security groups
  3. Design solutions for network posture management
  4. Design solutions for network monitoring

Design security solutions for infrastructure

  1. Case study description
  2. Case study answers
  3. Conceptual walkthrough
  4. Technical walkthrough
TENHO INTERESSE

Cursos Relacionados

Curso CISCO CCNA Exame CCNA 200-125

40 horas

Curso SAP BASIS S4hana - Administração e Infraestrutura

40 horas

Curso MCSA Networking with Windows Server 2016

40 horas

Curso CCNP Route 300-101 Preparatório Para Certificação

40 horas

Curso Cloudera Cientista de Dados

32 horas

Curso VMware Instalando Configurando e Gerenciando vSphere

32 horas

Curso de Redes TCP/IP - Protocolo de Redes de Computadores

40 horas

Curso Cisco Switched Networks 300-115

40 horas

Curso Wireless LAN Foundations

16 horas

Curso Certified Network Defender Certification

40 horas