Loading...
Microsoft
Popular
SC-100 Microsoft Cybersecurity Architect
The SC-100: Microsoft Cybersecurity Architect course is designed to provide learners with the knowledge and skills required to design and implement cybersecurity solutions using Microsoft technologies. This advanced course covers a comprehensive range of cybersecurity concepts, tools, and best practices necessary for safeguarding modern IT environments against evolving threats.
4.00 Day (32 hours)
Advanced Level
Choose your learning method
Overview Course Detail Target Audience Prerequisites Course Outline FAQs

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate-level certification in the security, compliance, and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

What's in it for you?
  • Design solutions that align with security best practices and priorities
  • Design security operations, identity, and compliance capabilities
  • Design security solutions for infrastructure
  • Design security solutions for applications and data
Who Should Attend?
  • Security Analyst
  • Security Engineer
  • Cybersecurity Specialist
Prerequisites

Required

  • Experience with hybrid and cloud implementations.
  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data, and securing applications.

Recommended

  • SC-200T00: Microsoft Security Operations Analyst
  • SC-300T00: Microsoft Identity and Access Administrator
  • AZ-500T00: Microsoft Azure Security Technologies
Microsoft Cybersecurity Architect Course Outline
Design solutions that align with security best practices and priorities
  • Introduction to Zero Trust and best practice frameworks
  • Unit: Introduction to best practices
  • Unit: Introduction to Zero Trust
  • Unit: Zero Trust RaMP initiatives
  • Unit: Zero Trust technology pillars
Design solutions that align with security best practices and priorities
  • Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Unit: Define a security strategy
  • Unit: Introduction to Cloud Adoption Framework
  • Unit: Cloud Adoption Framework―secure methodology
  • Unit: Introduction to Azure landing zones
  • Unit: Design security with Azure landing zones
  • Unit: Introduction to Well- Architected Framework
  • Unit: Well Architected Framework―security pillar
  • Unit: Solutions with CAF and WAF
Design solutions that align with security best practices and priorities
  • Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
  • Unit: Introduction to MCRA and MCSB
  • Unit: Design solutions with best practices for capabilities and controls
  • Unit: Design solutions with best practices for attack protection
Design solutions that align with security best practices and priorities
  • Design a resiliency strategy for common cyberthreats like ransomware
  • Unit: Common cyberthreats and attack patterns
  • Unit: Support business resiliency
  • Unit: Ransomware protection
  • Unit: Configurations for secure backup and restore
  • Unit: Security updates
Design security operations, identity, and compliance capabilities
  • Design solutions for regulatory compliance
  • Unit: Introduction to Regulatory compliance
  • Unit: Translate compliance requirements into a security solution
  • Unit: Address compliance requirements with Purview
  • Unit: Address privacy requirements with Priva
  • Unit: Use Azure Policy to address security and compliance requirements
Design security operations, identity, and compliance capabilities
  • Design solutions for identity and access management
  • Unit: Introduction to identity and access management
  • Unit: Design cloud, hybrid and multicloud access strategies (including Azure AD)
  • Unit: Specify requirements to secure Active Directory Domain Services (AD DS)
  • Unit: Design a solution for external identities
  • Unit: Design modern authentication and authorization strategies
  • Unit: Align conditional access and Zero Trust
  • Unit: Secure access for workload identities
  • Unit: Design a solution to manage secrets, keys, and certificates
Design security operations, identity, and compliance capabilities
  • Design solutions for securing privileged access
  • Unit: Enterprise access model
  • Unit: Introduction to privileged access
  • Unit: Identity governance in Microsoft Entra ID
  • Unit: Identity governance in on-premises Active Directory Domain Services
  • Unit: Design a solution for securing administration of cloud tenants
  • Unit: Design for cloud infrastructure entitlement management (CIEM)
  • Unit: Design a solution for privileged access workstations and bastion services
Design security operations, identity, and compliance capabilities
  • Design solutions for security operations
  • Unit: Introduction to Security operations (SecOps)
  • Unit: Design security operations capabilities in hybrid and multicloud environments
  • Unit: Design centralized logging and auditing
  • Unit: Design SIEM solutions
  • Unit: Design solutions for detection and response
  • Unit: Design a solution for SOAR
  • Unit: Design security workflows
  • Unit: Design threat detection coverage
Design security solutions for applications and data
  • Design solutions for securing Microsoft 365
  • Unit: Security for Exchange, Sharepoint, OneDrive and Teams (M365)
  • Unit: Evaluate security posture for collaboration and productivity workloads
  • Unit: Design a Microsoft Defender 365 solution
  • Unit: Design configurations and operational practices for M365
Design security solutions for applications and data
  • Design solutions for securing applications
  • Unit: Intro to App Security
  • Unit: Design and implement standards to secure application development
  • Unit: Evaluate security posture of existing application portfolios
  • Unit: Evaluate application threats with threat modeling
  • Unit: Design a solution for API management and security
  • Unit: Design a solution for secure access to applications
  • Unit: Securing containerized applications
Design security solutions for applications and data
  • Design solutions for securing an organization’s data
  • Unit: Intro to data security
  • Unit: Design a solution for data discovery and classification using Microsoft Purview
  • Unit: Design a solution for protection of data at rest, data in motion, and data in use
  • Unit: Data security in Azure workloads
  • Unit: Security for Azure Storage
  • Unit: Defender for SQL and Defender for Storage
Design security solutions for infrastructure
  • Specify requirements for securing SaaS, PaaS, and IaaS services
  • Unit: Securing SaaS, PaaS and IaaS (shared responsibility model)
  • Unit: Security baselines for cloud services
  • Unit: Specify security requirements for web workloads
Design security solutions for infrastructure
  • Design solutions for security posture management in hybrid and multicloud environments
  • Unit: Introduction to hybrid and multicloud environments
  • Unit: Posture evaluation with MCSB
  • Unit: Overview of posture evaluation with Defender for Cloud
  • Unit: Posture evaluation with Microsoft Defender for Cloud secure score
  • Unit: Design posture management and workload protection in hybrid and multicloud environments
  • Unit: Design cloud workload protection solutions that use Microsoft Defender for Cloud
  • Unit: Design a solution for integrating hybrid and multicloud environments by using Azure Arc
  • Unit: External attack surface management
  • Unit: Evaluate infrastructure compliance by using Microsoft Defender for Cloud
  • Unit: Microsoft Defender for IoT
Design security solutions for infrastructure
  • Design solutions for securing server and client endpoints
  • Unit: Introduction to endpoint security
  • Unit: Specify server security requirements and baselines
  • Unit: Specify requirements for mobile devices and clients
  • Unit: Specify IoT and embedded device security requirements
  • Unit: Specify security baselines for server and client endpoints
Design security solutions for infrastructure
  • Design solutions for network security
  • Unit: Design solutions for network segmentation
  • Unit: Design solutions for traffic filtering with network security groups
  • Unit: Design solutions for network posture management
  • Unit: Design solutions for network monitoring
  • Unit: Design a solution for secure remote access
Course FAQs
Q. Does this class help prepare me for a Microsoft Certification?

Yes, this class helps an attendee prepare for the Microsoft Exam SC-100: Microsoft Cybersecurity Architect. Q. How do I access my Microsoft Exam Voucher?

Q. Is the Microsoft Cybersecurity Architect the right certification for me?

This certification could be a great fit if you have significant experience in a wide range of security engineering areas including identity and access, platform protection, security operations, securing data, and securing applications. You should also have experience with hybrid and cloud implementations.

Q. Can you tell me more about the role of a Microsoft Cybersecurity Architect?

Microsoft cybersecurity architects have subject matter expertise in designing and evolving the cybersecurity strategy to protect an organization’s mission and business processes across all aspects of the enterprise architecture.

They design a Zero Trust strategy and architecture, including security strategies for data, applications, access management, identity, and infrastructure. They also evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies.

Cybersecurity architects continuously collaborate with leaders and practitioners in IT security, privacy, and other roles across an organization to plan and implement a cybersecurity strategy that meets the business needs of an organization.

Q. How do I know if I am prepared for the Microsoft Cybersecurity Architect certification?

Candidates for this exam should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Contact Us