SC-100: Microsoft Cybersecurity Architect
Learn new skills and discover the power of Microsoft Azure with step-by-step guidance.
Demand for Cloud Skills
Learn core Azure services and cloud concepts for career success. Start from the basics and progress to cloud expertise.
Hands-On Learning
Understanding Azure allows you to leverage technology to stay ahead of competitors and adapt to market changes.
Learn from Azure Experts
Build a solid foundation in cloud computing with Azure and lead in an increasingly digital business landscape.
Instructor-led
Official Courseware
Flexible Schedule
Guaranteed To Run
The Microsoft SC-100 certification focuses on advanced cybersecurity concepts and solutions. It helps professionals demonstrate their ability to design security strategies, architect security solutions, and ensure governance and compliance using various Microsoft security tools and services. You will gain a deep understanding of security solutions across the Microsoft ecosystem, including Microsoft Defender, Azure Security Center, Microsoft Sentinel, and more.
This course helps you develop the expertise to work with both cloud and on-premises environments and to lead organizations in designing secure infrastructure.
Course : SC-100: Microsoft Cybersecurity Architect
Level : Advanced
Type : Instructor led Live online or Classroom
Length : 4 days
Labs : Included
Practice Test : Included
Cybersecurity Architects
Security Engineers and Professionals
Azure Professionals
IT Professionals
Familiarity with Azure services and cloud concepts is important, as this certification focuses heavily on Azure’s security tools and services.
Designing and Implementing Cybersecurity Solutions
Securing Identity and Access
Implementing Platform Protection
Securing Data and Applications
Governance, Risk, and Compliance
Incident Response and Recovery
Instructor-led Virtual online live Training.
Weekend Classes
Evening Classes
Weekdays Classes
Course Outline
Module 1: Introduction to Zero Trust and best practice frameworks
Zero Trust initiatives
Zero Trust technology pillars part 1
Zero Trust technology pillars part 2
Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Define a security strategy
Cloud Adoption Framework secure methodology
Design security with Azure Landing Zones
The Well-Architected Framework security pillar
Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
Design solutions with best practices for capabilities and controls
Design solutions with best practices for attack protection
Module 4: Design a resiliency strategy for common cyberthreats like ransomware
Common cyberthreats and attack patterns
Support business resiliency
Ransomware protection
Configurations for secure backup and restore
Security updates
Module 5: Case study: Design solutions that align with security best practices and priorities
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Module 6: Design solutions for regulatory compliance
Translate compliance requirements into a security solution
Address compliance requirements with Microsoft Purview
Address privacy requirements with Microsoft Priva
Address security and compliance requirements with Azure policy
Evaluate infrastructure compliance with Defender for Cloud
Module 7: Design solutions for identity and access management
Design cloud, hybrid and multicloud access strategies (including Microsoft Entra ID)
Design a solution for external identities
Design modern authentication and authorization strategies
Align conditional access and Zero Trust
Specify requirements to secure Active Directory Domain Services (AD DS)
Design a solution to manage secrets, keys, and certificates
Module 8: Design solutions for securing privileged access
The enterprise access model
Design identity governance solutions
Design a solution to secure tenant administration
Design a solution for cloud infrastructure entitlement management (CIEM)
Design a solution for privileged access workstations and bastion services
Module 9: Design solutions for security operations
Design security operations capabilities in hybrid and multicloud environments
Design centralized logging and auditing
Design security information and event management (SIEM) solutions
Design solutions for detection and response
Design a solution for security orchestration, automation, and response (SOAR)
Design security workflows
Design threat detection coverage
Module 10: Case study: Design security operations, identity and compliance capabilities
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Module 11: Design solutions for securing Microsoft 365
Evaluate security posture for collaboration and productivity workloads
Design a Microsoft Defender XDR solution
Design configurations and operational practices for Microsoft 365
Module 12: Design solutions for securing applications
Design and implement standards to secure application development
Evaluate security posture of existing application portfolios
Evaluate application threats with threat modeling
Design security lifecycle strategy for applications
Secure access for workload identities
Design a solution for API management and security
Design a solution for secure access to applications
Module 13: Design solutions for securing an organization's data
Design a solution for data discovery and classification using Microsoft Purview
Design a solution for data protection
Design data security for Azure workloads
Design security for Azure Storage
Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
Module 14: Case study: Design security solutions for applications and data
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Module 15: Specify requirements for securing SaaS, PaaS, and IaaS services
Specify security baselines for SaaS, PaaS, and IaaS services
Specify security requirements for web workloads
Specify security requirements for containers and container orchestration
Module 16: Design solutions for security posture management in hybrid and multicloud environments
Evaluate security posture by using Microsoft Cloud Security Benchmark
Design integrated posture management and workload protection
Evaluate security posture by using Microsoft Defender for Cloud
Posture evaluation with Microsoft Defender for Cloud secure score
Design cloud workload protection with Microsoft Defender for Cloud
Integrate hybrid and multicloud environments with Azure Arc
Design a solution for external attack surface management
Module 17: Design solutions for securing server and client endpoints
Specify server security requirements
Specify requirements for mobile devices and clients
Specify internet of things (IoT) and embedded device security requirements
Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
Specify security baselines for server and client endpoints
Design a solution for secure remote access
Module 18: Design solutions for network security
Design solutions for network segmentation
Design solutions for traffic filtering with network security groups
Design solutions for network posture management
Design solutions for network monitoring
Module 19: Case study: Design security solutions for infrastructure
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Best Value offer
Official Courseware
Instructor-led live online / Classroom
Flexible Schedule
Course Completion Certification
US$ 1995
Still Have Questions?

We’re Here to Assist You
Some courses may require basic knowledge of IT infrastructure. Check the specific course details for prerequisites.
Yes, our expert instructor will help you from scratch, the course is designed in a way that you will get understanding of Cloud.
Sure, we would happy to assist you. Please direct your queries to info@infoventure.com
AWS Authorized Partner
Microsoft Authorized Partner
CompTIA Authorized Partner
EC-Council Authorized Partner
PECB Authorized Partner
Newsletter
Technology moves fast. Make sure you are up to speed with IT Trainings.
All rights reserved. © 2016 - 2025 - Infoventure Technologies Inc.

The expert in anything was once a beginner.
—Helen Hayes
Fill the Form
We HATE spam. Your email will never be shared
Preferred class : "Learning should never be limited by financial constraints. There are always ways to access education and gain knowledge, no matter your financial situation."
Save more,Learn more.
Take advantage of these opportunities and don't let financial constraints limit your education."
AWS Official Courseware
AWS Authorized Instructor
Course Completion Certification

We HATE spam. Your email address is 100% secure
Self paced Digital Training
After submitting, review your inbox and junk mail.