Vendors

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate-level certification in the security, compliance, and identity portfolio (such as AZ-500, SC-200, or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

img-course-overview.jpg

What You'll Learn

  • Understand how to use best practices as a cybersecurity architect.
  • Understand the concept of Zero Trust and how it can be used to modernize an organizations cybersecurity.
  • Understand when to use different best practice frameworks like MCRA, CAF and WAF.
  • Understand the Cloud Adoption Framework and how it can be used to accelerate and secure an organizations move to the cloud.
  • Understand the Well-Architected Framework and how it can be used to design solutions in the cloud that adhere to sound design principles including security.
  • Understand how to use Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) to design more secure solutions.
  • Understand common cyberthreats like ransomware.
  • Understand how to support business resiliency.
  • Design configurations for secure backup and restore.
  • Design solutions for managing security updates.
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Translate compliance requirements into a security solution
  • Address compliance requirements with Microsoft Purview
  • Design a solution to address privacy requirements with Microsoft Priva
  • Design Azure Policy solutions to address security and compliance requirements
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Design cloud, hybrid and multicloud access strategies
  • Design a solution for Azure Active Directory (Azure AD), part of Microsoft Entra
  • Design a solution for external identities
  • Design modern authentication and authorization strategies
  • Specify requirements to secure Active Directory Domain Services
  • Design a solution to manage secrets, keys, and certificates
  • Understand privileged access and the Enterprise Access Model
  • Design identity governance solutions
  • Design a solution for securing administration of cloud tenants
  • Design for cloud infrastructure entitlement management
  • Design security operations capabilities in hybrid and multicloud environments.
  • Design centralized logging and auditing.
  • Design Security Information and Event Management (SIEM) solutions.
  • Design a solution for detection and response that includes Extended Detection and Response (XDR).
  • Design a solution for security orchestration, automation, and response (SOAR).
  • Design security workflows.
  • Design and evaluate threat detection with the MITRE ATT&CK framework.
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft Defender XDR solution
  • Design configurations and operational practices for Microsoft 365
  • Evaluate security posture of existing application portfolios
  • Evaluate threats to business-critical applications by using threat modeling
  • Design and implement a full lifecycle strategy for application security
  • Design and implement standards and practices for securing the application development process
  • Design a solution for workload identity to authenticate and access Azure cloud resources
  • Design a solution for API management and security
  • Design a solution for secure access to applications
  • Design a solution for data discovery and classification using Microsoft Purview
  • Specify priorities for mitigating threats to data
  • Design a solution for protection of data at rest, data in motion, and data in use
  • Design a security solution for data in Azure workloads
  • Design a security solution for data in Azure Storage
  • Design a security solution that includes Microsoft Defender for SQL and Microsoft Defender for Storage
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Specify security baselines for SaaS, PaaS, and IaaS services
  • Specify security requirements for IoT workloads
  • Specify security requirements for web workloads
  • Specify security requirements for containers and container orchestration
  • Evaluate security posture by using Microsoft Cloud Security Benchmark, Microsoft Defender for Cloud, and Secure Scores
  • Design integrated security posture management and workload protection solutions in hybrid and multicloud environments
  • Design cloud workload protection solutions that use Microsoft Defender for Cloud
  • Specify security requirements for servers
  • Specify security requirements for mobile devices and clients
  • Specify security requirements for IoT devices and embedded systems
  • Design a solution for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
  • Specify security baselines for server and client endpoints
  • Design a solution for secure remote access
  • Design solutions for network segmentation
  • Design solutions for filtering traffic with network security groups
  • Design solutions for network posture measurement
  • Design solutions for network monitoring
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions

Who Should Attend

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

img-who-should-learn.png

Prerequisites

Please review the prerequisites listed for each module in the course content and click on the provided links for more information.

Learning Journey

Want to boost your career in Microsoft? Click on the roles below to see the learning pathways, specially designed to give you the skills to succeed.

1. Design solutions that align with security best practices and priorities

You learn how to use critical Microsoft security best practices such as the Cloud Adoption Framework (CAF), Well-Architected Framework (WAF), Microsoft Cybersecurity Reference Architecture (MCRA) to improve an organizations security posture, apply zero trust principles and minimize risk from emerging attacks.

Click here to know more

2. Design security operations, identity, and compliance capabilities

You learn how to design solutions for security operations (SecOps), identity & access management, privileged access, and regulatory compliance.

Click here to know more

3. Design security solutions for applications and data

Learn how to design solutions to secure data and applications, including: Microsoft 365, application development, existing application portfolios, data discovery and classification with Microsoft Purview and data security for Azure workloads.

Click here to know more

4. Design security solutions for infrastructure

You learn how to design for infrastructure security, including specifying requirements for different cloud models, designing solutions for posture management in hybrid and multicloud environments, and securing endpoints.

Click here to know more

Skills measured

  • Design solutions that align with security best practices and priorities
  • Design security operations, identity, and compliance capabilities
  • Design security solutions for infrastructure
  • Design security solutions for applications and data

Frequently Asked Questions (FAQs)

  • Why get Microsoft certified?

    Microsoft certifications validate your skills and expertise in Microsoft technologies and solutions, demonstrating your ability to design, implement, and manage cutting-edge technologies.

    These certifications are globally recognized and highly sought after by employers, as they signify your proficiency in using Microsoft products and services to drive innovation and solve business challenges.

    Microsoft-certified professionals are in high demand, opening doors to new career opportunities and higher earning potential.

  • What to expect for the examination?

    Microsoft certification exams are designed to assess your knowledge and skills in specific Microsoft technologies and solutions.

    Exams typically consist of multiple-choice, multiple-select, and case study questions, and some may include lab simulations to evaluate your practical skills.

    Note: Certification requirements and policies may be updated by Microsoft from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is Microsoft certification valid for?

    Most Microsoft role-based and specialty certifications are valid for one year from the date of passing the exam.

    To maintain your certification, you will need to renew it annually by passing a free online assessment on Microsoft Learn.

    However, Microsoft Applied Skills credentials and Fundamentals certifications do not expire.

    Note: Certification requirements and policies may be updated by Microsoft from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 16 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for

Inquiry Details

By providing your contact details, you agree to our Privacy Policy.