Course SC-100T00: Microsoft Cybersecurity Architect (SC-100)

12
Jul
- Azure, Instructor Lead Training, Microsoft, Security
- 0 (Registered)
-
Microsoft Official Course –
Course SC-100T00: Microsoft Cybersecurity Architect (SC-100) (4 days)
Course Description
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Certification
Job role: Solution Architect
Learning Outcomes
- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications
Duration
This is a 4-day course helping you get certified in Azure Technologies.
Curriculum
- 10 Sections
- 76 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Module 1: Build an overall security strategy and architectureLearn how to build an overall security strategy and architecture.10
- 2.1Introduction
- 2.2Zero Trust overview
- 2.3Develop Integration points in an architecture
- 2.4Develop security requirements based on business goals
- 2.5Translate security requirements into technical capabilities
- 2.6Design security for a resiliency strategy
- 2.7Design a security strategy for hybrid and multi-tenant environments
- 2.8Design technical and governance strategies for traffic filtering and segmentation
- 2.9Understand security for protocols
- 2.10Exercise: Build an overall security strategy and architecture
- Module 2: Design a security operations strategyLearn how to design a security operations strategy.9
- 3.1Introduction
- 3.2Understand security operations frameworks, processes, and procedures
- 3.3Design a logging and auditing security strategy
- 3.4Develop security operations for hybrid and multi-cloud environments
- 3.5Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
- 3.6Evaluate security workflows
- 3.7Review security strategies for incident management
- 3.8Evaluate security operations strategy for sharing technical threat intelligence
- 3.9Monitor sources for insights on threats and mitigations
- Module 3: Design an identity security strategyLearn how to design an identity security strategy.10
- 4.1Introduction
- 4.2Secure access to cloud resources
- 4.3Recommend an identity store for security
- 4.4Recommend secure authentication and security authorization strategies
- 4.5Secure conditional access
- 4.6Define Identity governance for access reviews and entitlement management
- 4.7Design a strategy for role assignment and delegation
- 4.8Design a security strategy for privileged role access to infrastructure
- 4.9Design a security strategy for privileged activities
- 4.10Understand security for protocols
- Module 4: Evaluate a regulatory compliance strategyLearn how to evaluate a regulatory compliance strategy.7
- 5.1Introduction
- 5.2Interpret compliance requirements and their technical capabilities
- 5.3Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- 5.4Interpret compliance scores and recommend actions to resolve issues or improve security
- 5.5Design and validate implementation of Azure Policy
- 5.6Design for data residency Requirements
- 5.7Translate privacy requirements into requirements for security solutions
- Module 5: Evaluate security posture and recommend technical strategies to manage risk8
- 6.1Introduction
- 6.2Evaluate security postures by using benchmarks
- 6.3Evaluate security postures by using Microsoft Defender for Cloud
- 6.4Evaluate security postures by using Secure Scores
- 6.5Evaluate security hygiene of Cloud Workloads
- 6.6Design security for an Azure Landing Zone
- 6.7Interpret technical threat intelligence and recommend risk mitigations
- 6.7Recommend security capabilities or controls to mitigate identified risks
- Module 6: Understand architecture best practices and how they are changing with the Cloud4
- Module 7: Design a strategy for securing server and client endpoints9
- 8.1Introduction
- 8.2Specify security baselines for server and client endpoints
- 8.3Specify security requirements for servers
- 8.4Specify security requirements for mobile devices and clients
- 8.5Specify requirements for securing Active Directory Domain Services
- 8.6Design a strategy to manage secrets, keys, and certificates
- 8.7Design a strategy for secure remote access
- 8.8Understand security operations frameworks, processes, and procedures
- 8.8Understand deep forensics procedures by resource type
- Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services10
- 9.1Introduction
- 9.2Specify security baselines for PaaS services
- 9.3Specify security baselines for IaaS services
- 9.4Specify security baselines for SaaS services
- 9.5Specify security requirements for IoT workloads
- 9.6Specify security requirements for data workloads
- 9.7Specify security requirements for web workloads
- 9.8Specify security requirements for containers
- 9.8Specify security requirements for storage workloads
- 9.8Specify security requirements for container orchestration
- Module 9: Specify security requirements for applicationsLearn how to specify security requirements for applications.5
- Module 10: Design a strategy for securing dataLearn how to design a strategy for securing data.4
Students List
No student enrolled.