Chapter 1: Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices-Design a security strategy to support business resiliency goals, including identifying and prioritizing threats to business-critical assets
Chapter 2: Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices-Design solutions for business continuity and disaster recovery (BCDR), including secure backup and restore for hybrid and multicloud environments
Chapter 3: Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices-Design solutions for mitigating ransomware attacks, including prioritization of BCDR and privileged access
Chapter 4: Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices-Evaluate solutions for security updates
Chapter 6: Design solutions that align with the Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft cloud security benchmark (MCSB)-Design solutions that align with best practices for protecting against insider, external, and supply chain attacks
Chapter 8: Architected Framework-Design a new or evaluate an existing strategy for security and governance based on the Microsoft Cloud Adoption Framework (CAF) for Azure and the Microsoft Azure Well-Architected Framework
Chapter 9: Architected Framework-Recommend solutions for security and governance based on the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework
Chapter 12: Design a solution for detection and response that includes extended detection and response (XDR) and security information and event management (SIEM)
Chapter 13: Design security operations, identity, and compliance capabilities -Design solutions for security operations-Design a solution for centralized logging and auditing, including Microsoft Purview Audit
Chapter 15: Design security operations, identity, and compliance capabilities -Design solutions for security operations-Design a solution for security orchestration automated response (SOAR), including Microsoft Sentinel and Microsoft Defender XDR
Chapter 17: Design and evaluate threat detection coverage by using MITRE ATT&CK matrices, including Cloud, Enterprise, Mobile, and industrial control systems (ICS)
Chapter 18: Design a solution for access to software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), hybrid/on-premises, and multicloud resources, including identity, networking, and application controls
Chapter 20: Design security operations, identity, and compliance capabilities -Design solutions for identity and access management-Design a solution for external identities, including business-to-business (B2B), business-to-customer (B2C), and decentralized identity
Chapter 21: Design a modern authentication and authorization strategy, including Conditional Access, continuous access evaluation, risk scoring, and protected actions
Chapter 26: Evaluate the security and governance of Microsoft Entra ID, including Microsoft Entra Privileged Identity Management (PIM), entitlement management, and access reviews
Chapter 33: Design security operations, identity, and compliance capabilities -Design solutions for regulatory compliance-Design a solution to address compliance requirements by using Microsoft Purview
Chapter 34: Design security operations, identity, and compliance capabilities -Design solutions for regulatory compliance-Design a solution to address privacy requirements, including Microsoft Priva
Chapter 36: Design security operations, identity, and compliance capabilities -Design solutions for regulatory compliance-Evaluate and validate alignment with regulatory standards and benchmarks by using Microsoft Defender for Cloud
Chapter 38: Design security solutions for infrastructure -Design solutions for security posture management in hybrid and multicloud environments-Evaluate security posture by using Microsoft Secure Score
Chapter 40: Design security solutions for infrastructure -Design solutions for security posture management in hybrid and multicloud environments-Select cloud workload protection solutions in Microsoft Defender for Cloud
Chapter 43: Specify requirements and priorities for a posture management process that uses Microsoft Security Exposure Management attack paths, attack surface reduction, security insights, and initiatives
Chapter 44: Specify requirements for securing server and client endpoints-Specify security requirements for servers, including multiple platforms and operating systems
Chapter 45: Specify requirements for securing server and client endpoints-Specify security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration
Chapter 47: Design security solutions for infrastructure -Specify requirements for securing server and client endpoints-Evaluate solutions for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
Chapter 56: Evaluate solutions for network security and Security Service Edge (SSE)-Evaluate network designs to align with security requirements and best practices
Chapter 57: Evaluate solutions for network security and Security Service Edge (SSE)-Evaluate solutions that use Microsoft Entra Internet Access as a secure web gateway
Chapter 58: Evaluate solutions for network security and Security Service Edge (SSE)-Evaluate solutions that use Microsoft Entra Internet Access to access Microsoft 365, including cross-tenant configurations
Chapter 60: Design security solutions for applications and data -Evaluate solutions for securing Microsoft 365-Evaluate security posture for productivity and collaboration workloads by using metrics, including Microsoft Secure Score
Chapter 61: Design security solutions for applications and data -Evaluate solutions for securing Microsoft 365-Evaluate solutions that include Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps
Chapter 62: Design security solutions for applications and data -Evaluate solutions for securing Microsoft 365-Evaluate device management solutions that include Microsoft Intune
Chapter 63: Design security solutions for applications and data -Evaluate solutions for securing Microsoft 365-Evaluate solutions for securing data in Microsoft 365 by using Microsoft Purview
Chapter 64: Design security solutions for applications and data -Evaluate solutions for securing Microsoft 365-Evaluate data security and compliance controls in Microsoft Copilot for Microsoft 365 services
Chapter 65: Design security solutions for applications and data -Design solutions for securing applications-Evaluate the security posture of existing application portfolios
Chapter 66: Design security solutions for applications and data -Design solutions for securing applications-Evaluate threats to business-critical applications by using threat modeling
Chapter 67: Design security solutions for applications and data -Design solutions for securing applications-Design and implement a full lifecycle strategy for application security
Chapter 68: Design security solutions for applications and data -Design solutions for securing applications-Design and implement standards and practices for securing the application development process
Chapter 69: Design security solutions for applications and data -Design solutions for securing applications-Map technologies to application security requirements
Chapter 70: Design security solutions for applications and data -Design solutions for securing applications-Design a solution for workload identity to authenticate and access Azure cloud resources
Chapter 71: Design security solutions for applications and data -Design solutions for securing applications-Design a solution for API management and security
Chapter 72: Design security solutions for applications and data -Design solutions for securing applications-Design solutions that secure applications by using Azure Web Application Firewall (WAF)
Chapter 73: Design security solutions for applications and data -Design solutions for securing an organization's data-Evaluate solutions for data discovery and classification
Chapter 74: Design security solutions for applications and data -Design solutions for securing an organization's data-Specify priorities for mitigating threats to data
Chapter 75: Design security solutions for applications and data -Design solutions for securing an organization's data-Evaluate solutions for encryption of data at rest and in transit, including Azure Key Vault and infrastructure encryption
Chapter 76: Design security solutions for applications and data -Design solutions for securing an organization's data-Design a security solution for data in Azure workloads, including Azure SQL, Azure Synapse Analytics, and Azure Cosmos DB
Chapter 77: Design security solutions for applications and data -Design solutions for securing an organization's data-Design a security solution for data in Azure Storage
Chapter 78: Design security solutions for applications and data -Design solutions for securing an organization's data-Design a security solution that includes Microsoft Defender for Storage and Microsoft Defender for Databases