SC-100T00 - Microsoft Cybersecurity Architect

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate-level certification in the security, compliance, and identity portfolio (such as AZ-500, SC-200, or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

INR 60000 + tax

Date : 06 May 2024

Code: sc-100t00

Duration: 4.0 days

other dates

Schedule

Virtual ILT | 06 May 2024 - 09 May 2024
Virtual ILT | 03 Jun 2024 - 06 Jun 2024
Virtual ILT | 22 Jul 2024 - 25 Jul 2024
Virtual ILT | 06 Aug 2024 - 09 Aug 2024
Virtual ILT | 23 Sep 2024 - 26 Sep 2024
Virtual ILT | 21 Oct 2024 - 24 Oct 2024
Virtual ILT | 25 Nov 2024 - 28 Nov 2024
Virtual ILT | 10 Dec 2024 - 13 Dec 2024

Start learning today!

Click Hereto customize your Training

Objectives

  • Develop Integration points in an architecture
  • Develop security requirements based on business goals
  • Translate security requirements into technical capabilities
  • Design security for a resiliency strategy
  • Design security strategy for hybrid and multi-tenant environments
  • Design technical and governance strategies for traffic filtering and segmentation
  • Design a logging and auditing security strategy.
  • Develop security operations for hybrid and multi-cloud environments.
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR).
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats and mitigations.
  • Recommend an identity store for security.
  • Recommend secure authentication and security authorization strategies.
  • Secure conditional access.
  • Design a strategy for role assignment and delegation.
  • Define Identity governance for access reviews and entitlement management.
  • Design a security strategy for privileged role access to infrastructure.
  • Design a security strategy for privileged access.
  • Interpret compliance requirements and their technical capabilities.
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud.
  • Interpret compliance scores and recommend actions to resolve issues or improve security.
  • Design and validate the implementation of Azure Policy.
  • Design for data residency Requirements.
  • Translate privacy requirements into requirements for security solutions.
  • Evaluate security postures by using benchmarks.
  • Evaluate security postures by using Microsoft Defender for Cloud.
  • Evaluate security postures by using Secure Scores.
  • Evaluate security hygiene of Cloud Workloads.
  • Design security for an Azure Landing Zone.
  • Interpret technical threat intelligence and recommend risk mitigations.
  • Recommend security capabilities or controls to mitigate identified risks.
  • Plan and implement a security strategy across teams.
  • Establish a strategy and process for the proactive and continuous evolution of a security strategy.
  • Design a logging and auditing security strategy.
  • Develop security operations for hybrid and multi-cloud environments.
  • Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR).
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats and mitigations.
  • Specify security baselines for SaaS, PaaS, and IaaS services.
  • Specify security requirements for web, storage, data, and IoT workloads.
  • Specify security requirements for containers and container orchestration.
  • Specify priorities for mitigating threats to applications.
  • Specify a security standard for onboarding a new application.
  • Specify a security strategy for applications and APIs.
  • Specify priorities for mitigating threats to data.
  • Design a strategy to identify and protect sensitive data.
  • Specify an encryption standard for data at rest and in motion.

Content

1. Build an overall security strategy and architecture

Learn how to build an overall security strategy and architecture with zero trust in mind.

Click here to know more

2. Design a security operations strategy

Learn how to design a cybersecurity strategy for security operations (SecOps).

Click here to know more

3. Design an identity security strategy

Learn how to design a cybersecurity strategy for identity management.

Click here to know more

4. Evaluate a regulatory compliance strategy

Learn how to evaluate a cybersecurity strategy for regulatory compliance.

Click here to know more

5. Evaluate security posture and recommend technical strategies to manage risk

Learn how to evaluate an organization's security posture and recommend technical strategies to manage risk.

Click here to know more

6. Understand architecture best practices and how they are changing with the Cloud

Learn best practices for cybersecurity architecture and how they have been affected by cloud computing.

Click here to know more

7. Design a strategy for securing server and client endpoints

Learn how to design a cybersecurity strategy to secure server and client endpoints.

Click here to know more

8. Design a strategy for securing PaaS, IaaS, and SaaS services

Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models.

Click here to know more

9. Specify security requirements for applications

Learn how to specify cybersecurity requirements for applications.

Click here to know more

10. Design a strategy for securing data

Learn how to design a cybersecurity strategy to secure data.

Click here to know more

11. Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks

You'll learn how to use guidance in Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks to help an organization apply Zero Trust principles and secure their infrastructure.

Click here to know more

12. Recommend a secure methodology using the Cloud Adoption Framework (CAF)

You'll learn how to use the Cloud Adoption Framework to recommend security best practices that help an organization move to the cloud while improving overall security posture.

Click here to know more

13. Recommend a ransomware strategy by using Microsoft Security Best Practices

You'll learn how to execute the three important phases of ransomware protection: create a recovery plan, limit the scope of damage, make it hard to get in.

Click here to know more

Audience

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

Prerequisites

Before attending this course, students must have:

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data, and securing applications.

  • Experience with hybrid and cloud implementations.

Certification

product-certification

Skills Measured

  • Design a Zero Trust strategy and architecture (30-35%)
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies (10-15%)
  • Design security for infrastructure (10-15%)
  • Design a strategy for data and applications (15-20%)
  • Recommend security best practices and priorities (20-25%)

Course Benefits

product-benefits
  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

Microsoft Popular Courses

ms-700t00

The Managing Microsoft Teams course is designed for those aspiring to be Microsoft 365 Teams Administrators to deploy, configure and manage Office 365 workloads

az-900t00

This course is a high-level overview of Azure. The course will provide foundational level knowledge of cloud services and how those services are provided with M

sc-900t00

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

mb-335t00

MB-335T00 is a course code that refers to a specific training program or course offered by Microsoft. Unfortunately, as of my knowledge cutoff in September 2021
Enquire Now
gasFz4
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy