SC-100T00 – Microsoft Cybersecurity Architect

  • Duration: 10 weeks
Categories:

1. Build an overall security strategy and architecture

Learn how to build an overall security strategy and architecture with zero trust in mind.

Click here to know more

2. Design a security operations strategy

Learn how to design a cybersecurity strategy for security operations (SecOps).

Click here to know more

3. Design an identity security strategy

Learn how to design a cybersecurity strategy for identity management.

Click here to know more

4. Evaluate a regulatory compliance strategy

Learn how to evaluate a cybersecurity strategy for regulatory compliance.

Click here to know more

5. Evaluate security posture and recommend technical strategies to manage risk

Learn how to evaluate an organization’s security posture and recommend technical strategies to manage risk.

Click here to know more

6. Understand architecture best practices and how they are changing with the Cloud

Learn best practices for cybersecurity architecture and how they have been affected by cloud computing.

Click here to know more

7. Design a strategy for securing server and client endpoints

Learn how to design a cybersecurity strategy to secure server and client endpoints.

Click here to know more

8. Design a strategy for securing PaaS, IaaS, and SaaS services

Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models.

Click here to know more

9. Specify security requirements for applications

Learn how to specify cybersecurity requirements for applications.

Click here to know more

10. Design a strategy for securing data

Learn how to design a cybersecurity strategy to secure data.

Click here to know more

11. Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks

You’ll learn how to use guidance in Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks to help an organization apply Zero Trust principles and secure their infrastructure.

Click here to know more

12. Recommend a secure methodology using the Cloud Adoption Framework (CAF)

You’ll learn how to use the Cloud Adoption Framework to recommend security best practices that help an organization move to the cloud while improving overall security posture.

Click here to know more

13. Recommend a ransomware strategy by using Microsoft Security Best Practices

You’ll learn how to execute the three important phases of ransomware protection: create a recovery plan, limit the scope of damage, make it hard to get in.

Click here to know more

Leave feedback about this