SC-100T00 – Microsoft Cybersecurity Architect

This Course Includes

Videos & Lectures

Quizzes & Assessments

Mobile access

Certificate of Completion

Introduction

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Audience Profile

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

Prerequisites

Before attending this course, students must have:

Onsite Training?

If you need training for three or more people, ask us about training at your site. You can enjoy the convenience of reduced travel cost and time, as well as a familiar environment for your staff. Additionally, we can customise the course for your business needs.

Module 1: Introduction to Zero Trust and best practice frameworks

You learn what best practices are and how cybersecurity architects use them as well as some key best practice frameworks for Microsoft cybersecurity capabilities. You also learn about the concept of Zero Trust, and how to get started with Zero Trust in an organization.

Learning objectives

By the end of this module, you’ll be able to:

You’ll learn about the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) and how you can use them to design more secure solutions.

Learning objectives

Upon completion of this module, the learner will be able to:

You learn about the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) and how you can use them to design more secure solutions.

Learning objectives

By the end of this module, you are able to:

You’ll learn about common cyberthreats like ransomware and what kinds of attack patterns an organization must be prepared for.

Learning objectives

By the end of this module, you’ll be able to:

Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity and compliance. You will analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Learning objectives

You learn:

You’ll learn how to interpret and translate regulatory requirements into technical solutions. You’ll also learn how to use capabilities found in Microsoft Purview, Microsoft Priva, and Defender for Cloud for compliance.

Learning objectives

Upon completion of this module, the learner will be able to:

You learn about various strategies for managing identities and access to resources, including hybrid and multicloud scenarios, external identities, and conditional access.

Learning objectives

By the end of this module, you are able to:

You learn advanced techniques for designing solutions that manage privileged access effectively.

Learning objectives

By the end of this module, you are able to:

You learn techniques to design security operations capabilities including logging, auditing, Security Event Management (SIEM), Security Orchestration and Automated Response (SOAR), and security workflows.

Learning objectives

By the end of this module, you are able to:

Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Learning objectives

You learn:

You learn how to design security solutions for Exchange, Sharepoint, OneDrive and Teams.

Learning objectives

By the end of this module, you are able to:

You learn how to secure applications, APIs and the development process using techniques like posture management, threat modeling, and secure access for workload identities.

Learning objectives

By the end of this module, you’re able to:

You learn about designing solutions that secure an organization’s data using capabilities like Microsoft Purview, Defender for SQL, Defender for Storage.

Learning objectives

By the end of this module, you are able to:

Apply your cybersecurity architect skills on a real business scenario in the area of securing applications and data. You will analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Learning objectives

You learn:

You learn how to analyze security requirements for different cloud offerings (SaaS, PaaS, and IaaS), IoT workloads, web workloads and containers.

Learning objectives

By the end of this module, you are able to:

You learn how to design security posture management solutions that integrate into hybrid and multicloud scenarios using capabilities in Microsoft Defender for Cloud, Azure Arc and Microsoft Cloud Security Benchmark (MCSB).

Learning objectives

By the end of this module, you’re able to:

You learn how to analyze the security requirements for different types of endpoints including servers, clients, IoT, OT, mobile, and embedded devices. These requirements will take into account different platforms and operating systems and set standards for endpoint protection, hardening and configuration.

Learning objectives

By the end of this module, you are able to:

You learn how to design secure network solutions using techniques like network segmentation, traffic filtering, network monitoring and posture management.

Learning objectives

By the end of this module, you are able to:

Apply your cybersecurity architect skills on a real business scenario in the area of infrastructure security. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Learning objectives

You learn:

Requirements

Material Included

Course Brochure

Price:

$

Code:

SC-100T00

Duration:

Days

Location:

Virtual Classroom

Schedule:

Coming Soon

Send us your question now

You can reach us through our contact form, by email, or by phone. We will get back to you within 1 business day.

Submit your question