Prochaines sessions
Programme
1. Design a Zero Trust strategy and architecture
- Build overall security strategy and architecture
- Design a security operations strategy
- Design an identity security strategy
2. Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Evaluate a regulatory compliance strategy
- Evaluate security posture and recommend technical strategies to manage risk
3. Design security for infrastructure
- Understand architecture best practices and how they are changing with the Cloud
- Designing a strategy for securing server and client endpoints
- Design a strategy for securing PaaS, IaaS and SaaS services
4. Design a strategy for data and applications
- Specify security requirements for applications
- Design a strategy for securing data
5. Recommend security best practices
- Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks
- Recommend a secure methodology using the Cloud Adoption Framework (CAF)
- Recommend a ransomware strategy by using Microsoft Security Best Practices