SC-100T00 - Microsoft Cybersecurity Architect

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate-level certification in the security, compliance, and identity portfolio (such as AZ-500, SC-200, or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

INR 60000 + tax

Date : 06 Aug 2024

Code: sc-100t00

Duration: 4.0 days

other dates

Schedule

Virtual ILT | 06 Aug 2024 - 09 Aug 2024
Virtual ILT | 23 Sep 2024 - 26 Sep 2024
Virtual ILT | 21 Oct 2024 - 24 Oct 2024
Virtual ILT | 25 Nov 2024 - 28 Nov 2024
Virtual ILT | 10 Dec 2024 - 13 Dec 2024

Start learning today!

Click Hereto customize your Training

Objectives

  • Understand how to use best practices as a cybersecurity architect.
  • Understand the concept of Zero Trust and how it can be used to modernize an organizations cybersecurity.
  • Understand when to use different best practice frameworks like MCRA, CAF and WAF.
  • Understand the Cloud Adoption Framework and how it can be used to accelerate and secure an organizations move to the cloud.
  • Understand the Well-Architected Framework and how it can be used to design solutions in the cloud that adhere to sound design principles including security.
  • Understand how to use Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) to design more secure solutions.
  • Understand common cyberthreats like ransomware.
  • Understand how to support business resiliency.
  • Design configurations for secure backup and restore.
  • Design solutions for managing security updates.
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Translate compliance requirements into a security solution
  • Address compliance requirements with Microsoft Purview
  • Design a solution to address privacy requirements with Microsoft Priva
  • Design Azure Policy solutions to address security and compliance requirements
  • Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Design cloud, hybrid and multicloud access strategies
  • Design a solution for Azure Active Directory (Azure AD), part of Microsoft Entra
  • Design a solution for external identities
  • Design modern authentication and authorization strategies
  • Specify requirements to secure Active Directory Domain Services
  • Design a solution to manage secrets, keys, and certificates
  • Understand privileged access and the Enterprise Access Model
  • Design identity governance solutions
  • Design a solution for securing administration of cloud tenants
  • Design for cloud infrastructure entitlement management
  • Design security operations capabilities in hybrid and multicloud environments.
  • Design centralized logging and auditing.
  • Design Security Information and Event Management (SIEM) solutions.
  • Design a solution for detection and response that includes Extended Detection and Response (XDR).
  • Design a solution for security orchestration, automation, and response (SOAR).
  • Design security workflows.
  • Design and evaluate threat detection with the MITRE ATT&CK framework.
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft Defender XDR solution
  • Design configurations and operational practices for Microsoft 365
  • Evaluate security posture of existing application portfolios
  • Evaluate threats to business-critical applications by using threat modeling
  • Design and implement a full lifecycle strategy for application security
  • Design and implement standards and practices for securing the application development process
  • Design a solution for workload identity to authenticate and access Azure cloud resources
  • Design a solution for API management and security
  • Design a solution for secure access to applications
  • Design a solution for data discovery and classification using Microsoft Purview
  • Specify priorities for mitigating threats to data
  • Design a solution for protection of data at rest, data in motion, and data in use
  • Design a security solution for data in Azure workloads
  • Design a security solution for data in Azure Storage
  • Design a security solution that includes Microsoft Defender for SQL and Microsoft Defender for Storage
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions
  • Specify security baselines for SaaS, PaaS, and IaaS services
  • Specify security requirements for IoT workloads
  • Specify security requirements for web workloads
  • Specify security requirements for containers and container orchestration
  • Evaluate security posture by using Microsoft Cloud Security Benchmark, Microsoft Defender for Cloud, and Secure Scores
  • Design integrated security posture management and workload protection solutions in hybrid and multicloud environments
  • Design cloud workload protection solutions that use Microsoft Defender for Cloud
  • Specify security requirements for servers
  • Specify security requirements for mobile devices and clients
  • Specify security requirements for IoT devices and embedded systems
  • Design a solution for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
  • Specify security baselines for server and client endpoints
  • Design a solution for secure remote access
  • Design solutions for network segmentation
  • Design solutions for filtering traffic with network security groups
  • Design solutions for network posture measurement
  • Design solutions for network monitoring
  • How to analyze business requirements
  • How to match technical capabilities to meet those needs
  • How to design cohesive solutions that incorporate all of the required functions

Content

1. Design solutions that align with security best practices and priorities

You learn how to use critical Microsoft security best practices such as the Cloud Adoption Framework (CAF), Well-Architected Framework (WAF), Microsoft Cybersecurity Reference Architecture (MCRA) to improve an organizations security posture, apply zero trust principles and minimize risk from emerging attacks.

Click here to know more

2. Design security operations, identity, and compliance capabilities

You learn how to design solutions for security operations (SecOps), identity & access management, privileged access, and regulatory compliance.

Click here to know more

3. Design security solutions for applications and data

Learn how to design solutions to secure data and applications, including: Microsoft 365, application development, existing application portfolios, data discovery and classification with Microsoft Purview and data security for Azure workloads.

Click here to know more

4. Design security solutions for infrastructure

You learn how to design for infrastructure security, including specifying requirements for different cloud models, designing solutions for posture management in hybrid and multicloud environments, and securing endpoints.

Click here to know more

Audience

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

Prerequisites

Please review the prerequisites listed for each module in the course content and click on the provided links for more information.

Certification

product-certification

Skills measured

  • Design solutions that align with security best practices and priorities
  • Design security operations, identity, and compliance capabilities
  • Design security solutions for infrastructure
  • Design security solutions for applications and data

Course Benefits

product-benefits
  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

Microsoft Popular Courses

ms-700t00

The Managing Microsoft Teams course is designed for those aspiring to be Microsoft 365 Teams Administrators to deploy, configure and manage Office 365 workloads

az-900t00

This course is a high-level overview of Azure. The course will provide foundational level knowledge of cloud services and how those services are provided with M

sc-900t00

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

mb-335t00

MB-335T00 is a course code that refers to a specific training program or course offered by Microsoft. Unfortunately, as of my knowledge cutoff in September 2021
Enquire Now
Uyc1a9
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy