SC-100T00 – Microsoft Cybersecurity Architect

  • Duration: 5 days
Categories:

The SC-100 certification course focuses on building comprehensive security strategies and architectures, with a primary emphasis on a zero-trust approach. It teaches how to design robust cybersecurity strategies across various domains, starting with security operations (SecOps) and identity management, ensuring that every part of an organization’s infrastructure is well protected. The course includes learning how to evaluate and manage regulatory compliance and security posture, as well as recommending technical strategies for mitigating risks.

It also explores architecture best practices, including the impact of cloud computing, and provides guidance on securing endpoints, cloud services (PaaS, IaaS, and SaaS), and applications. The course goes further to specify strategies for securing data and applying security best practices using tools like Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks. Additionally, it includes methodologies for secure cloud adoption and ransomware protection using Microsoft’s best practices. By the end of the course, participants will be equipped to help organizations implement effective cybersecurity strategies across various services and platforms.

1. Build an overall security strategy and architecture

Learn how to build an overall security strategy and architecture with zero trust in mind.

Click here to know more

2. Design a security operations strategy

Learn how to design a cybersecurity strategy for security operations (SecOps).

Click here to know more

3. Design an identity security strategy

Learn how to design a cybersecurity strategy for identity management.

Click here to know more

4. Evaluate a regulatory compliance strategy

Learn how to evaluate a cybersecurity strategy for regulatory compliance.

Click here to know more

5. Evaluate security posture and recommend technical strategies to manage risk

Learn how to evaluate an organization’s security posture and recommend technical strategies to manage risk.

Click here to know more

6. Understand architecture best practices and how they are changing with the Cloud

Learn best practices for cybersecurity architecture and how they have been affected by cloud computing.

Click here to know more

7. Design a strategy for securing server and client endpoints

Learn how to design a cybersecurity strategy to secure server and client endpoints.

Click here to know more

8. Design a strategy for securing PaaS, IaaS, and SaaS services

Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models.

Click here to know more

9. Specify security requirements for applications

Learn how to specify cybersecurity requirements for applications.

Click here to know more

10. Design a strategy for securing data

Learn how to design a cybersecurity strategy to secure data.

Click here to know more

11. Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks

You’ll learn how to use guidance in Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks to help an organization apply Zero Trust principles and secure their infrastructure.

Click here to know more

12. Recommend a secure methodology using the Cloud Adoption Framework (CAF)

You’ll learn how to use the Cloud Adoption Framework to recommend security best practices that help an organization move to the cloud while improving overall security posture.

Click here to know more

13. Recommend a ransomware strategy by using Microsoft Security Best Practices

You’ll learn how to execute the three important phases of ransomware protection: create a recovery plan, limit the scope of damage, make it hard to get in.

Click here to know more

Leave feedback about this