This is an advanced, expert-level course. This Microsoft Cybersecurity Architect (SC-100) course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Although not required to attend, students are strongly encouraged to have taken and passed another associate-level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class.
Microsoft Cybersecurity Architect Course Delivery Methods
Microsoft Cybersecurity Architect Course Information
In this course, you will learn how to:
- Design a Zero Trust strategy and architecture.
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies.
- Design security for infrastructure.
- Design a strategy for data and applications.
Before attending this SC-100 course, students must have:
- Highly recommended to have attended and passed one of the associate-level certifications in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300).
- Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
- Experience with hybrid and cloud implementations.
This course can help you prepare for the following Microsoft role-based certification exam — Microsoft Exam SC-100: Microsoft Cybersecurity Architect.
Microsoft Cybersecurity Architect Course Outline
- Overview of Zero Trust principles
- Best practice frameworks for cybersecurity
- Aligning with Microsoft Cloud Adoption Framework for Azure
- Utilizing the Microsoft Azure Well-Architected Framework
- Implementing Microsoft Cybersecurity Reference Architectures (MCRA)
- Utilizing Microsoft Cloud Security Benchmarks (MCSB)
- Creating a strategy based on Microsoft Security Best Practices
- Ransomware strategy employing Microsoft Security Best Practices
- Strategies for designing solutions that comply with regulations
- Designing robust identity security strategies
- Strategies for securing privileged access
- Planning and implementing security operations strategies
- Strategies specifically focusing on securing Microsoft 365
- Security requirements for applications
- Designing strategies for securing organizational data
- Specifying and implementing requirements for securing these services
- Designing solutions for managing security posture in complex environments
- Strategies for securing server and client endpoints
- Designing network security solutions