
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide
Exam SC-100
- English
- ePUB (mobile friendly)
- Available on iOS & Android
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide
Exam SC-100
About this book
Prep for the SC-100 exam like a pro with Sybex' latest Study Guide
In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100, a team of dedicated software architects delivers an authoritative and easy-to-follow guide to preparing for the SC-100 Cybersecurity Architect certification exam offered by Microsoft. In the book, you'll find comprehensive coverage of the objectives tested by the exam, covering the evaluation of Governance Risk Compliance technical and security operations strategies, the design of Zero Trust strategies and architectures, and data and application strategy design.
With the information provided by the authors, you'll be prepared for your first day in a new role as a cybersecurity architect, gaining practical, hands-on skills with modern Azure deployments. You'll also find:
- In-depth discussions of every single objective covered by the SC-100 exam and, by extension, the skills necessary to succeed as a Microsoft cybersecurity architect
- Critical information to help you obtain a widely sought-after credential that is increasingly popular across the industry (especially in government roles)
- Valuable online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossary of crucial technical terms
An essential roadmap to the SC-100 exam and a new career in cybersecurity architecture on the Microsoft Azure cloud platform, MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 is also ideal for anyone seeking to improve their knowledge and understanding of cloud-based management and security.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Table of Contents
- Title Page
- Copyright
- Dedication
- Acknowledgments
- About the Authors
- Introduction
- Chapter 1: Define and Implement an Overall Security Strategy and Architecture
- Chapter 2: Define a Security Operations Strategy
- Chapter 3: Define an Identity Security Strategy
- Chapter 4: Identify a Regulatory Compliance Strategy
- Chapter 5: Identify Security Posture and Recommend Technical Strategies to Manage Risk
- Chapter 6: Define a Strategy for Securing Infrastructure
- Chapter 7: Define a Strategy and Requirements for Securing PaaS, IaaS, and SaaS Services
- Chapter 8: Define a Strategy and Requirements for Applications and Data
- Chapter 9: Recommend Security Best Practices and Priorities
- Appendix: Answers to Review Questions
- Index
- End User License Agreement