Microsoft Cybersecurity Architect
- Home
- Cloud Computing
- Microsoft Cybersecurity Architect
Introduction
This course prepares participants to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk and Compliance (GRC), Security Operations (SecOps), and data and applications.
Objectives
Participants will learn how to design solutions using Zero Trust principles and to specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Participant Profile
This course is aimed at experienced cloud security engineers with prior certifications in security, compliance, and identity management.
Participants should have experience and knowledge across a broad range of security engineering areas, including identity and access management, platform protection, security operations, data security, and application security.
They should also have experience with hybrid cloud implementations.
Beginners in these areas should start with the SC-900 course: Microsoft Security, Compliance, and Identity Fundamentals.
Prerequisites
Before taking this course, participants should:
- It is highly recommended to have completed or be certified in at least one associate-level security course (such as AZ-500, SC-200, or SC-300).
- Have experience and knowledge in identities and accesses, platform protection, security operations, data security, and application security.
- Have experience with hybrid clouds and their implementation.
Course Materials
Participants will receive a digital copy of each course related to this exam.
Certifications and Evaluation
This course is certified by Microsoft®.
The terms of additional certification services are subject to those established by the license owner or the authorized certification body.
Accreditation
A Certificate of Attendance for the SC-100 course will only be issued to participants with an attendance above 75%.
Contents
-
- Module 1 – Zero Trust: Build an overall security strategy and architecture.
- Module 2 – Zero Trust: Design a security operations strategy.
- Module 3 – Zero Trust: Design an identity security strategy.
- Module 4 – GRC: Evaluate a regulatory compliance strategy.
- Module 5 – GRC: Evaluate security posture and recommend technical strategies to manage risk.
- Module 6 – Infrastructure Security: Comprehend architecture best practices.
- Module 7 – Infrastructure Security: Design a strategy for securing server and client endpoints.
- Module 8 – Infrastructure Security: Design a strategy for securing PaaS, IaaS, and SaaS services.
- Module 9 – Design data and application strategy: Security requirements for applications.
- Module 10 – Design data and application strategy: Design strategy for securing data.
- Module 11 – Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks.
- Module 12 – Recommend a secure methodology using the Cloud Adoption Framework (CAF).
- Module 13 – Recommend a ransomware strategy by using Microsoft Security Best Practices.
SC100
Referencia
Precio
Duración
Modo de entrega
Certificación