- Duration: 5 days
The SC-100 certification course focuses on building comprehensive security strategies and architectures, with a primary emphasis on a zero-trust approach. It teaches how to design robust cybersecurity strategies across various domains, starting with security operations (SecOps) and identity management, ensuring that every part of an organization’s infrastructure is well protected. The course includes learning how to evaluate and manage regulatory compliance and security posture, as well as recommending technical strategies for mitigating risks.
It also explores architecture best practices, including the impact of cloud computing, and provides guidance on securing endpoints, cloud services (PaaS, IaaS, and SaaS), and applications. The course goes further to specify strategies for securing data and applying security best practices using tools like Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks. Additionally, it includes methodologies for secure cloud adoption and ransomware protection using Microsoft’s best practices. By the end of the course, participants will be equipped to help organizations implement effective cybersecurity strategies across various services and platforms.
1. Build an overall security strategy and architecture
Learn how to build an overall security strategy and architecture with zero trust in mind.
Click here to know more
2. Design a security operations strategy
Learn how to design a cybersecurity strategy for security operations (SecOps).
Click here to know more
3. Design an identity security strategy
Learn how to design a cybersecurity strategy for identity management.
Click here to know more
4. Evaluate a regulatory compliance strategy
Learn how to evaluate a cybersecurity strategy for regulatory compliance.
Click here to know more
5. Evaluate security posture and recommend technical strategies to manage risk
Learn how to evaluate an organization’s security posture and recommend technical strategies to manage risk.
Click here to know more
6. Understand architecture best practices and how they are changing with the Cloud
Learn best practices for cybersecurity architecture and how they have been affected by cloud computing.
Click here to know more
7. Design a strategy for securing server and client endpoints
Learn how to design a cybersecurity strategy to secure server and client endpoints.
Click here to know more
8. Design a strategy for securing PaaS, IaaS, and SaaS services
Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models.
Click here to know more
9. Specify security requirements for applications
Learn how to specify cybersecurity requirements for applications.
Click here to know more
10. Design a strategy for securing data
Learn how to design a cybersecurity strategy to secure data.
Click here to know more
11. Recommend security best practices using Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft Cloud Security Benchmarks
You’ll learn how to use guidance in Microsoft Cybersecurity Reference Architectures and Microsoft Cloud Security Benchmarks to help an organization apply Zero Trust principles and secure their infrastructure.
Click here to know more
12. Recommend a secure methodology using the Cloud Adoption Framework (CAF)
You’ll learn how to use the Cloud Adoption Framework to recommend security best practices that help an organization move to the cloud while improving overall security posture.
Click here to know more
13. Recommend a ransomware strategy by using Microsoft Security Best Practices
You’ll learn how to execute the three important phases of ransomware protection: create a recovery plan, limit the scope of damage, make it hard to get in.
Click here to know more
Leave feedback about this
You must be logged in to post a comment.