Course SC-100T00: Microsoft Cybersecurity Architect (SC-100)
Curriculum
- 10 Sections
- 76 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Module 1: Build an overall security strategy and architectureLearn how to build an overall security strategy and architecture.10
- 2.1Introduction
- 2.2Zero Trust overview
- 2.3Develop Integration points in an architecture
- 2.4Develop security requirements based on business goals
- 2.5Translate security requirements into technical capabilities
- 2.6Design security for a resiliency strategy
- 2.7Design a security strategy for hybrid and multi-tenant environments
- 2.8Design technical and governance strategies for traffic filtering and segmentation
- 2.9Understand security for protocols
- 2.10Exercise: Build an overall security strategy and architecture
- Module 2: Design a security operations strategyLearn how to design a security operations strategy.9
- 3.1Introduction
- 3.2Understand security operations frameworks, processes, and procedures
- 3.3Design a logging and auditing security strategy
- 3.4Develop security operations for hybrid and multi-cloud environments
- 3.5Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
- 3.6Evaluate security workflows
- 3.7Review security strategies for incident management
- 3.8Evaluate security operations strategy for sharing technical threat intelligence
- 3.9Monitor sources for insights on threats and mitigations
- Module 3: Design an identity security strategyLearn how to design an identity security strategy.10
- 4.1Introduction
- 4.2Secure access to cloud resources
- 4.3Recommend an identity store for security
- 4.4Recommend secure authentication and security authorization strategies
- 4.5Secure conditional access
- 4.6Define Identity governance for access reviews and entitlement management
- 4.7Design a strategy for role assignment and delegation
- 4.8Design a security strategy for privileged role access to infrastructure
- 4.9Design a security strategy for privileged activities
- 4.10Understand security for protocols
- Module 4: Evaluate a regulatory compliance strategyLearn how to evaluate a regulatory compliance strategy.7
- 5.1Introduction
- 5.2Interpret compliance requirements and their technical capabilities
- 5.3Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- 5.4Interpret compliance scores and recommend actions to resolve issues or improve security
- 5.5Design and validate implementation of Azure Policy
- 5.6Design for data residency Requirements
- 5.7Translate privacy requirements into requirements for security solutions
- Module 5: Evaluate security posture and recommend technical strategies to manage risk8
- 6.1Introduction
- 6.2Evaluate security postures by using benchmarks
- 6.3Evaluate security postures by using Microsoft Defender for Cloud
- 6.4Evaluate security postures by using Secure Scores
- 6.5Evaluate security hygiene of Cloud Workloads
- 6.6Design security for an Azure Landing Zone
- 6.7Interpret technical threat intelligence and recommend risk mitigations
- 6.7Recommend security capabilities or controls to mitigate identified risks
- Module 6: Understand architecture best practices and how they are changing with the Cloud4
- Module 7: Design a strategy for securing server and client endpoints9
- 8.1Introduction
- 8.2Specify security baselines for server and client endpoints
- 8.3Specify security requirements for servers
- 8.4Specify security requirements for mobile devices and clients
- 8.5Specify requirements for securing Active Directory Domain Services
- 8.6Design a strategy to manage secrets, keys, and certificates
- 8.7Design a strategy for secure remote access
- 8.8Understand security operations frameworks, processes, and procedures
- 8.8Understand deep forensics procedures by resource type
- Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services10
- 9.1Introduction
- 9.2Specify security baselines for PaaS services
- 9.3Specify security baselines for IaaS services
- 9.4Specify security baselines for SaaS services
- 9.5Specify security requirements for IoT workloads
- 9.6Specify security requirements for data workloads
- 9.7Specify security requirements for web workloads
- 9.8Specify security requirements for containers
- 9.8Specify security requirements for storage workloads
- 9.8Specify security requirements for container orchestration
- Module 9: Specify security requirements for applicationsLearn how to specify security requirements for applications.5
- Module 10: Design a strategy for securing dataLearn how to design a strategy for securing data.4
Zero Trust overview
Next
Modal title
Main Content