SC-100: Microsoft Cybersecurity Architect


Learn new skills and discover the power of Microsoft Azure with step-by-step guidance.

Demand for Cloud Skills

Learn core Azure services and cloud concepts for career success. Start from the basics and progress to cloud expertise.

Hands-On Learning

Understanding Azure allows you to leverage technology to stay ahead of competitors and adapt to market changes.

Learn from Azure Experts

Build a solid foundation in cloud computing with Azure and lead in an increasingly digital business landscape.

  • Instructor-led
  • Official Courseware
  • Flexible Schedule
  • Guaranteed To Run

The Microsoft SC-100 certification focuses on advanced cybersecurity concepts and solutions. It helps professionals demonstrate their ability to design security strategies, architect security solutions, and ensure governance and compliance using various Microsoft security tools and services. You will gain a deep understanding of security solutions across the Microsoft ecosystem, including Microsoft Defender, Azure Security Center, Microsoft Sentinel, and more.

This course helps you develop the expertise to work with both cloud and on-premises environments and to lead organizations in designing secure infrastructure.

Course Overview
  • Course : SC-100: Microsoft Cybersecurity Architect
  • Level : Advanced
  • Type : Instructor led Live online or Classroom
  • Length : 4 days
  • Labs : Included
  • Practice Test : Included
Who should take this course
  • Cybersecurity Architects
  • Security Engineers and Professionals
  • Azure Professionals
  • IT Professionals
Prerequisites
  • Familiarity with Azure services and cloud concepts is important, as this certification focuses heavily on Azure’s security tools and services.
What you'll learn
  • Designing and Implementing Cybersecurity Solutions
  • Securing Identity and Access
  • Implementing Platform Protection
  • Securing Data and Applications
  • Governance, Risk, and Compliance
  • Incident Response and Recovery
Training Mode

Instructor-led Virtual online live Training.

  • Weekend Classes
  • Evening Classes
  • Weekdays Classes

Course Outline


Module 1: Introduction to Zero Trust and best practice frameworks

  • Zero Trust initiatives
  • Zero Trust technology pillars part 1
  • Zero Trust technology pillars part 2

Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

  • Define a security strategy
  • Cloud Adoption Framework secure methodology
  • Design security with Azure Landing Zones
  • The Well-Architected Framework security pillar

Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

  • Design solutions with best practices for capabilities and controls
  • Design solutions with best practices for attack protection

Module 4: Design a resiliency strategy for common cyberthreats like ransomware

  • Common cyberthreats and attack patterns
  • Support business resiliency
  • Ransomware protection
  • Configurations for secure backup and restore
  • Security updates

Module 5: Case study: Design solutions that align with security best practices and priorities

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Module 6: Design solutions for regulatory compliance

  • Translate compliance requirements into a security solution
  • Address compliance requirements with Microsoft Purview
  • Address privacy requirements with Microsoft Priva
  • Address security and compliance requirements with Azure policy
  • Evaluate infrastructure compliance with Defender for Cloud

Module 7: Design solutions for identity and access management

  • Design cloud, hybrid and multicloud access strategies (including Microsoft Entra ID)
  • Design a solution for external identities
  • Design modern authentication and authorization strategies
  • Align conditional access and Zero Trust
  • Specify requirements to secure Active Directory Domain Services (AD DS)
  • Design a solution to manage secrets, keys, and certificates

Module 8: Design solutions for securing privileged access

  • The enterprise access model
  • Design identity governance solutions
  • Design a solution to secure tenant administration
  • Design a solution for cloud infrastructure entitlement management (CIEM)
  • Design a solution for privileged access workstations and bastion services

Module 9: Design solutions for security operations

  • Design security operations capabilities in hybrid and multicloud environments
  • Design centralized logging and auditing
  • Design security information and event management (SIEM) solutions
  • Design solutions for detection and response
  • Design a solution for security orchestration, automation, and response (SOAR)
  • Design security workflows
  • Design threat detection coverage

Module 10: Case study: Design security operations, identity and compliance capabilities

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Module 11: Design solutions for securing Microsoft 365

  • Evaluate security posture for collaboration and productivity workloads
  • Design a Microsoft Defender XDR solution
  • Design configurations and operational practices for Microsoft 365

Module 12: Design solutions for securing applications

  • Design and implement standards to secure application development
  • Evaluate security posture of existing application portfolios
  • Evaluate application threats with threat modeling
  • Design security lifecycle strategy for applications
  • Secure access for workload identities
  • Design a solution for API management and security
  • Design a solution for secure access to applications

Module 13: Design solutions for securing an organization's data

  • Design a solution for data discovery and classification using Microsoft Purview
  • Design a solution for data protection
  • Design data security for Azure workloads
  • Design security for Azure Storage
  • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage

Module 14: Case study: Design security solutions for applications and data

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Module 15: Specify requirements for securing SaaS, PaaS, and IaaS services

  • Specify security baselines for SaaS, PaaS, and IaaS services
  • Specify security requirements for web workloads
  • Specify security requirements for containers and container orchestration

Module 16: Design solutions for security posture management in hybrid and multicloud environments

  • Evaluate security posture by using Microsoft Cloud Security Benchmark
  • Design integrated posture management and workload protection
  • Evaluate security posture by using Microsoft Defender for Cloud
  • Posture evaluation with Microsoft Defender for Cloud secure score
  • Design cloud workload protection with Microsoft Defender for Cloud
  • Integrate hybrid and multicloud environments with Azure Arc
  • Design a solution for external attack surface management

Module 17: Design solutions for securing server and client endpoints

  • Specify server security requirements
  • Specify requirements for mobile devices and clients
  • Specify internet of things (IoT) and embedded device security requirements
  • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
  • Specify security baselines for server and client endpoints
  • Design a solution for secure remote access

Module 18: Design solutions for network security

  • Design solutions for network segmentation
  • Design solutions for traffic filtering with network security groups
  • Design solutions for network posture management
  • Design solutions for network monitoring

Module 19: Case study: Design security solutions for infrastructure

  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough

Best Value offer

  • Official Courseware
  • Instructor-led live online / Classroom
  • Flexible Schedule
  • Course Completion Certification


US$ 1995


Buy now, pay later with PayPal



  • Apr 21
  • Monday
  • 10:00 AM - 6:00 PM CST
  • Instructor-led Live Online

Guaranteed to run

  • May 12
  • Monday
  • 10:00 AM - 6:00 PM CST
  • Instructor-led Live Online

Guaranteed to run

  • May 26
  • Monday
  • 10:00 AM - 6:00 PM CST
  • Instructor-led Live Online

Guaranteed to run

  • June 2
  • Monday
  • 10:00 AM - 6:00 PM CST
  • Instructor-led Live Online

Guaranteed to run

  • June 23
  • Monday
  • 10:00 AM - 6:00 PM CST
  • Instructor-led Live Online

Guaranteed to run

  • July 7
  • Monday
  • 10:00 AM - 6:00 PM CST
  • Instructor-led Live Online

Guaranteed to run

  • July 21
  • Monday
  • 10:00 AM - 6:00 PM CST
  • Instructor-led Live Online

Guaranteed to run


Still Have Questions?



We’re Here to Assist You

4 days

Advanced

5 days

Intermediate

4 days

Advanced

What are the prerequisites for the training?

Some courses may require basic knowledge of IT infrastructure. Check the specific course details for prerequisites.

Can I start even if I am new to Cloud computing?

Yes, our expert instructor will help you from scratch, the course is designed in a way that you will get understanding of Cloud.

Can I get support after course?

Sure, we would happy to assist you. Please direct your queries to info@infoventure.com

AWS Authorized Partner

Microsoft Authorized Partner

CompTIA Authorized Partner

EC-Council Authorized Partner

PECB Authorized Partner

Quick links

Info@infoventure.com

+1 905 625 2727

www.infoventure.com

Mississauga, CANADA

Newsletter

Technology moves fast. Make sure you are up to speed with IT Trainings.