From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Learning objectives
From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Learning objectives
When we look at how we need to achieve a given compliance requirement, there's a few different ways to evaluate the security posture of the organization and then recommend technical strategies to manage the organization's risk. In this lesson of module 2, we'll look at evaluating the security benchmarks, Defender for Cloud, the secure score and our cloud workloads. We'll also discuss how landing zones can help with designing for security, how to interpret threat intelligence and how to mitigate any identified risks.
Contents
-
-
-
-
-
-
-
(Locked)
Learning objectives42s
-
(Locked)
Evaluate security using benchmarks1m 1s
-
(Locked)
Evaluate security using Defender2m 36s
-
(Locked)
Evaluate security using Secure Score41s
-
(Locked)
Evaluate security of cloud workloads57s
-
(Locked)
Design security with landing zones1m 53s
-
(Locked)
Interpret threat intelligence35s
-
(Locked)
Mitigate identified risks1m 8s
-
(Locked)
-
-
-
-
-