当前位置:网站首页 > 更多 > 玩电脑 > 正文

[玩转系统] SC-100 考试学习指南:Microsoft 网络安全架构师

作者:精品下载站 日期:2024-12-14 06:42:10 浏览:16 分类:玩电脑

SC-100 考试学习指南:Microsoft 网络安全架构师


欢迎阅读我的SC-100 考试学习指南(Microsoft 网络安全架构师考试)。本学习指南的目的是帮助您学习并获得参加和通过 SC-100 考试所需的经验,并获得 Microsoft 认证:网络安全架构师专家认证。您将在下面找到各种学习材料和可靠的学习路径,以帮助您计划和参加 SC-100 考试。

关于 SC-100 考试

SC-100 Microsoft 网络安全架构师考试面向在 Microsoft 安全不同领域拥有广泛知识并能够设计和实施安全解决方案的考生。您还需要熟悉混合和纯云环境及实施。该考试是专家级别的考试,因此并不容易。您可以在此处阅读 Microsoft 考试页面上的完整考试说明。

SC-100 考试有多难?

SC-100 考试是一项专家级考试,面向那些在保护 Microsoft Paas、Iaas 和混合环境方面拥有丰富经验的人士。通过完成此考试(以及 1 项先决考试),您将获得微软认证:网络安全架构师专家的头衔,所以您可以看到,专家的名字就在...

您应该为 SC-100 考试学习多长时间?

您应该为这次考试提供至少 1 个月的扎实学习时间。这取决于您是否在设计 Azure 安全解决方案方面经验丰富。如上所述,该考试被认为相当困难,尽管实际上考试并没有涉及大量的技术细节,但您仍然需要很好地了解 Azure 解决方案如何与安全性集成。

目标是每天学习 1.5 小时左右。如果您在一个月内错过了任何一天,请将其带入下个月,这样您就不会错过任何学习时间,只有在有信心时才参加考试。

SC-100 考试中有实验室吗?

SC-100 考试中没有实验室。

如何成为微软认证:网络安全架构师专家

参加 SC-100 Microsoft 网络安全架构师考试并不是成为 Microsoft 认证:网络安全架构师专家的唯一要求。您还必须通过一项先决考试,其中有 4 项考试可供选择:

  • 微软认证:安全运营分析师助理
  • Microsoft 认证:身份和访问管理员助理
  • Microsoft 认证:Azure 安全工程师助理
  • 微软认证:安全管理员助理

[玩转系统] SC-100 考试学习指南:Microsoft 网络安全架构师

Microsoft 学习路径和资源

Microsoft Learn 是学习的最佳起点之一。 Microsoft 现已发布了 SC-100 考试的官方学习路径,我专门为 SC-100 考试编写了一系列 Microsoft 学习路径,您可以在下面找到它们的链接以及其他资源:

  • SC-100 Microsoft 精益路径
  • 微软讲师指导的课程

Microsoft 文档:SC-100 考试学习指南

设计零信任策略和架构 (30-35%)

构建整体安全策略和架构

  • 使用 Microsoft 网络安全参考架构 (MCRA) 识别架构中的集成点

    • https://docs.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra
  • 将业务目标转化为安全需求

    • https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy
  • 将安全需求转化为技术能力,包括安全服务、安全产品、安全流程
  • 设计弹性策略的安全性
  • 将混合或多租户环境集成到安全策略中

    • https://docs.microsoft.com/en-us/security/zero-trust/deploy/infrastructure
  • 制定流量过滤和分段的技术和治理策略
  • 设计安全运营策略

    • 设计日志记录和审核策略以支持安全操作

      • https://docs.microsoft.com/en-us/azure/security/fundamentals/log-audit
    • https://docs.microsoft.com/en-us/security/benchmark/azure/security-control-logging-monitoring
  • 开发安全操作以支持混合或多云环境

    • https://docs.microsoft.com/en-us/azure/sentinel/design-your-workspace-architecture
  • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/arc-enabled-security-baseline
  • 设计 SIEM 和 SOAR 策略

    • https://docs.microsoft.com/en-us/azure/sentinel/overview
  • https://docs.microsoft.com/en-us/azure/sentinel/design-your-workspace-architecture
  • 评估安全工作流程

    • https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-posture-vulnerability-management
  • https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-governance-strategy
  • 评估事件管理生命周期的安全运营策略

    • https://docs.microsoft.com/en-us/azure/security/fundamentals/operational-best-practices#prevent-detect-and-respond-to-threats
  • 评估共享技术威胁情报的安全运营策略

    • https://docs.microsoft.com/en-us/security/benchmark/azure/security-control-incident-response
  • 设计身份安全策略
    注:包括混合云和多云设计访问云资源的策略

    • 推荐身份存储(租户、B2B、B2C、混合)

      • https://docs.microsoft.com/en-us/azure/active-directory/external-identities/external-identities-overview
  • 推荐身份验证策略

    • https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods
  • 推荐授权策略

    • https://docs.microsoft.com/en-us/azure/architecture/framework/security/design-identity-authorization
  • https://docs.microsoft.com/en-us/azure/security/fundamentals/identity-management-best-practices
  • 设计条件访问策略

    • https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access
  • https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-policy-common
  • https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-continuous-access-evaluation
  • 设计角色分配和委派策略

    • https://docs.microsoft.com/en-us/azure/active-directory/roles/best-practices
  • https://docs.microsoft.com/en-us/azure/active-directory/roles/security-planning
  • https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-security-wizard
  • 设计特权角色访问基础设施的安全策略,包括基于身份的防火墙规则、Azure PIM

    • https://docs.microsoft.com/en-us/azure/active-directory/roles/security-planning?toc=/azure/active-directory/privileged-identity-management/toc.json
  • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/firewall-manager-security-baseline
  • 为特权活动设计安全策略,包括 PAM、权利管理、云租户管理

    • https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/environment-overview
  • https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview
  • https://docs.microsoft.com/en-us/azure/security/fundamentals/identity-management-best-practices
  • 评估治理风险合规性 (GRC) 技术策略和安全运营策略 (20-25%)

    NOT:信息保护或 DLP

    设计监管合规策略

    • 解释合规性要求并转化为特定的技术能力(新的或现有的)

      • https://docs.microsoft.com/en-us/azure/defender-for-cloud/security-center-planning-and-operations-guide
    • https://docs.microsoft.com/en-us/azure/defender-for-cloud/regulatory-compliance-dashboard
  • 使用 Microsoft Defender for Cloud 评估基础设施合规性

    • https://docs.microsoft.com/en-us/azure/defender-for-cloud/regulatory-compliance-dashboard
  • 解释合规性分数并建议解决问题或提高安全性的措施

    • https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-access-and-track
  • https://docs.microsoft.com/en-us/azure/defender-for-cloud/regulatory-compliance-dashboard
  • Azure Policy的设计实现

    • https://docs.microsoft.com/en-gb/learn/modules/build-cloud-governance-strategy-azure/6-control-audit-resources-azure-policy
  • https://docs.microsoft.com/en-gb/azure/governance/policy/tutorials/create-and-manage
  • 数据驻留要求的设计

    • https://azure.microsoft.com/en-us/global-infrastruct/data-residency/#overview
  • 将隐私要求转化为安全解决方案的要求

    • https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-overview
  • https://docs.microsoft.com/en-us/azure/governance/
  • 评估安全状况并提出管理风险的技术策略

    • 使用基准评估安全态势(包括 Azure 安全基准、ISO 2701 等)

      • https://docs.microsoft.com/en-us/security/benchmark/azure/
    • https://docs.microsoft.com/en-us/security/benchmark/azure/overview
  • 使用 Microsoft Defender for Cloud 评估安全状况

    • https://docs.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages
  • https://docs.microsoft.com/en-us/azure/defender-for-cloud/regulatory-compliance-dashboard
  • 使用安全分数评估安全状况

    • https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls
  • https://docs.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference
  • 评估云工作负载的安全状况

    • https://docs.microsoft.com/en-us/azure/defender-for-cloud/regulatory-compliance-dashboard
  • Azure Landing Zone 的设计安全性

    • https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/ready/landing-zone/design-area/security
  • 解释技术威胁情报并建议风险缓解措施

    • https://docs.microsoft.com/en-us/azure/security/fundamentals/threat-detection
  • https://docs.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence
  • 推荐安全功能或控制措施以减轻已识别的风险

    • https://docs.microsoft.com/en-us/azure/security/fundamentals/technical-capability
  • 基础设施设计安全 (20-25%)

    设计保护服务器和客户端端点的策略

    • 指定服务器和客户端端点的安全基线

      • https://docs.microsoft.com/en-us/mem/intune/protect/security-baselines
    • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/security-center-security-baseline
  • 指定服务器的安全要求,包括多平台和操作系统

    • https://docs.microsoft.com/en-us/azure/security/fundamentals/iaas
  • https://social.technet.microsoft.com/wiki/contents/articles/3808.security-considerations-for-infrastruct-as-a-service-iaas.aspx
  • 指定移动设备和客户端的安全要求,包括端点保护、强化和配置

    • https://docs.microsoft.com/en-us/mem/intune/fundamentals/policy-map-access-requirements
  • https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started
  • https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/identity-access-policies?view=o365-worldwide
  • 指定保护 Active Directory 域服务的要求

    • https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
  • 设计管理秘密、密钥和证书的策略

    • https://docs.microsoft.com/en-us/azure/key-vault/general/best-practices
  • https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/secure/best-practices/manage-secrets
  • 设计安全远程访问策略

    • https://docs.microsoft.com/en-us/azure/active-directory-domain-services/secure-remote-vm-access#:~:text=To%20secure%20remote%20access%20to,access%20through %20%20RDS%20环境。
  • https://docs.microsoft.com/en-us/azure/security/fundamentals/management
  • https://azure.microsoft.com/en-us/services/azure-bastion/#overview
  • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/vpn-gateway-security-baseline
  • 设计保护 SaaS、PaaS 和 IaaS 服务的策略
    注意:包括混合云和多云

    • 指定 SaaS、PaaS 和 IaaS 服务的安全基线
      项目编写者注意:仅服务配置,而不是产品内用户安全设置

      • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/cloud-services-security-baseline
  • 指定 IoT 工作负载的安全要求

    • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/iot-hub-security-baseline
  • https://www.microsoft.com/security/blog/2021/05/05/how-to-apply-a-zero-trust-approach-to-your-iot-solutions/
  • 指定数据工作负载的安全要求,包括 SQL、Azure SQL 数据库、Azure Synapse 和 Azure Cosmos DB

    • https://docs.microsoft.com/en-us/azure/azure-sql/database/security-overview
  • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/synapse-analytics-security-baseline
  • https://docs.microsoft.com/en-us/azure/cosmos-db/database-security?tabs=sql-api
  • 指定 Web 工作负载(包括 Azure 应用服务)的安全要求

    • https://docs.microsoft.com/en-us/azure/app-service/overview-security
  • 指定存储工作负载(包括 Azure 存储)的安全要求

    • https://docs.microsoft.com/en-us/learn/modules/secure-azure-storage-account/
  • https://docs.microsoft.com/en-us/azure/storage/blobs/security-recommendations
  • https://docs.microsoft.com/en-us/azure/architecture/framework/services/storage/storage-accounts/security
  • 指定容器的安全要求

    • https://docs.microsoft.com/en-us/azure/container-instances/container-instances-image-security
  • 指定容器编排的安全要求

    • https://docs.microsoft.com/en-us/azure/container-instances/container-instances-orchestrator-relationship
  • https://docs.microsoft.com/en-us/azure/architecture/microservices/design/orchestration
  • 设计数据和应用程序策略 (20-25%)

    指定应用程序的安全要求

    • 指定减轻应用程序威胁的优先级

      • https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/what-is-access-management
    • https://docs.microsoft.com/en-us/azure/security/fundamentals/threat-detection
    • https://docs.microsoft.com/en-us/azure/security/fundamentals/network-overview
    • https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity
  • 指定新应用程序启动的安全标准

    • https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/what-is-access-management
  • 指定应用程序和 API 的安全策略

    • https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/api-management-security-baseline
  • 设计保护数据的策略

    • 指定减轻数据威胁的优先级

      • https://docs.microsoft.com/en-us/azure/security/fundamentals/data-encryption-best-practices
    • https://docs.microsoft.com/en-us/azure/security/fundamentals/operational-best-practices
  • 设计识别和保护敏感数据的策略

    • https://docs.microsoft.com/en-us/azure/security/fundamentals/data-encryption-best-practices
  • https://docs.microsoft.com/en-us/azure/security/fundamentals/operational-checklist
  • 指定静态和动态数据的加密标准

    • https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest
  • https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-models
  • https://docs.microsoft.com/en-us/azure/security/fundamentals/data-encryption-best-practices
  • 概括

    感谢您抽出时间阅读我的 SC-100 考试学习指南。希望现在读完本指南后,您已经做好通过 SC-100 Microsoft 网络安全架构师考试的准备。如果您有疑问,请在下面留下,我会尽力尽快回复。

    您需要 登录账户 后才能发表评论

    取消回复欢迎 发表评论:

    关灯