Microsoft Cybersecurity Architect SC100 Overview

Microsoft Cybersecurity Architect SC100 Course Outline

Module 1: Introduction to Zero Trust and Best Practice Frameworks

  • Introduction to Zero Trust
  • Zero Trust Initiatives
  • Zero Trust Technology Pillars Part 1
  • Zero Trust Technology Pillars Part 2

Module 2: Design Solutions that Align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

  • Define a Security Strategy
  • Introduction to the Cloud Adoption Framework
  • Cloud Adoption Framework Secure Methodology
  • Introduction to Azure Landing Zones
  • Design Security with Azure Landing Zones
  • Introduction to the Well-Architected Framework
  • Well-Architected Framework Security Pillar

Module 3: Design Solutions that Align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB)

  • Introduction to Microsoft Cybersecurity Reference Architecture and Cloud Security Benchmark
  • Design solutions with Best Practices for Capabilities and Controls
  • Design solutions with Best Practices for Attack Protection

Module 4: Design a Resiliency Strategy for Common Cyberthreats Like Ransomware

  • Common Cyberthreats and Attack Patterns
  • Support Business Resiliency
  • Ransomware Protection
  • Configurations for Secure Backup and Restore
  • Security Updates

Module 5: Case study: Design solutions that align with security best practices and priorities

  • Introduction
  • Case Study Description
  • Case Study Answers
  • Conceptual Walkthrough
  • Technical Walkthrough

Module 6: Design Solutions for Regulatory Compliance

  • Introduction to Regulatory Compliance
  • Translate Compliance Requirements into a Security Solution
  • Address Compliance Requirements with Microsoft Purview
  • Address Privacy Requirements with Microsoft Priva
  • Address Security and Compliance Requirements with Azure Policy
  • Evaluate Infrastructure Compliance with Defender for Cloud

Module 7: Design Solutions for Identity and Access Management

  • Introduction to Identity and Access Management
  • Design Cloud, Hybrid and Multicloud Access Strategies
  • Design a Solution for External Identities
  • Design modern Authentication and Authorisation Strategies
  • Align Conditional access and Zero Trust
  • Specify Requirements to Secure Active Directory Domain Services
  • Design a Solution to Manage Secrets, Keys, and Certificates

Module 8: Design Solutions for Securing Privileged Access

  • Introduction to Privileged Access
  • enterprise Access Model
  • Design Identity Governance Solutions
  • Design a Solution to Secure Tenant Administration
  • Design a Solution for Cloud Infrastructure Entitlement Management
  • Design a Solution for Privileged Access Workstations and Bastion Services

Module 9: Design Solutions for Security Operations

  • Introduction to Security Operations (SecOps)
  • Design Security Operations Capabilities in Hybrid and Multicloud Environments
  • Design Centralised Logging and Auditing
  • Design Security Information and Event Management (SIEM) Solutions
  • Design Solutions for Detection and Response
  • Design a Solution for Security Orchestration, Automation, and Response (SOAR)
  • Design Security Workflows
  • Design Threat Detection Coverage

Module 10: Case study: Design Security Operations, Identity and Compliance Capabilities

  • Introduction
  • Case Study Description
  • Case Study Answers
  • Conceptual Walkthrough
  • Technical Walkthrough

Module 11: Design Solutions for Securing Microsoft 365

  • Introduction to Security for Exchange, Sharepoint, OneDrive and Teams
  • Evaluate Security Posture for Collaboration and Productivity Workloads
  • Design a Microsoft 365 Defender Solution
  • Design Configurations and Operational Practices for Microsoft 365

Module 12: Design solutions for Securing Applications

  • Introduction to Application Security
  • Design and Implement Standards to Secure Application Development
  • Evaluate Security Posture of Existing Application Portfolios
  • Evaluate Application Threats with Threat Modeling
  • Design Security Lifecycle Strategy for Applications
  • Secure Access for Workload Identities
  • Design a Solution for API Management and Security
  • Design a Solution for Secure Access to Applications

Module 13: Design Solutions for Securing an Organisation's Data

  • Introduction to Data Security
  • Design a Solution for Data Discovery and Classification Using Microsoft Purview
  • Design a Solution for Data Protection
  • Design Data Security for Azure Workloads
  • Design Security for Azure Storage
  • Design a Security Solution with Microsoft Defender for SQL and Microsoft Defender for Storage

Module 14: Case study: Design Security Solutions for Applications and Data

  • Introduction
  • Case Study Description
  • Case Study Answers
  • Conceptual Walkthrough
  • Technical Walkthrough

Module 15: Specify Requirements for Securing SaaS, PaaS, and IaaS Services

  • Introduction to Security for SaaS, PaaS, and IaaS
  • Specify Security Baselines for SaaS, PaaS, and IaaS Services
  • Specify Security Requirements for Web Workloads
  • Specify Security Requirements for Containers and Container Orchestration

Module 16: Design Solutions for Security Posture Management in Hybrid and Multicloud Environments

  • Introduction to Hybrid and Multicloud Posture Management
  • Evaluate Security Posture by Using Microsoft Cloud Security Benchmark
  • Design Integrated Posture Management and Workload Protection
  • Evaluate Security Posture by Using Microsoft Defender for Cloud
  • Posture Evaluation with Microsoft Defender for Cloud Secure Score
  • Design Cloud Workload Protection with Microsoft Defender for Cloud
  • Integrate Hybrid and Multicloud Environments with Azure Arc
  • Design a Solution for External Attack Surface Management

Module 17: Design Solutions for Securing Server and Client Endpoints

  • Introduction to Endpoint Security
  • Specify Server Security Requirements
  • Specify Requirements for Mobile Devices and Clients
  • Specify Internet of Things (IoT) and Embedded Device Security Requirements
  • Secure Operational Technology (OT) and Industrial Control Systems (ICS) with Microsoft Defender for IoT
  • Specify Security Baselines for Server and Client Endpoints
  • Design a Solution for Secure Remote Access

Module 18: Design Solutions for Network Security

  • Introduction
  • Design Solutions for Network Segmentation
  • Design Solutions for Traffic Filtering with Network Security Groups
  • Design Solutions for Network Posture Management
  • Design Solutions for Network Monitoring

Module 19: Case Study: Design Security Solutions for Infrastructure

  • Introduction
  • Case Study Description
  • Case Study Answers
  • Conceptual Walkthrough
  • Technical Walkthrough

Show moredowndown

Who should attend this Microsoft Cybersecurity Architect SC100 Training Course?

This Microsoft Cybersecurity Architect SC100 Course is beneficial for those who want to gain an in-depth understanding of Microsoft's Cybersecurity Solutions, especially for Microsoft 365 and Azure services. This course can be beneficial for a wide range of professionals, including: including:

  • Cybersecurity Analysts
  • Network Administrators
  • Systems Administrators
  • Cloud Solutions Architects
  • Compliance Officers
  • Security Consultants
  • DevSecOps Engineers

Prerequisites of the Microsoft Cybersecurity Architect SC100 Training Course

There are no formal prerequisites for attending this Microsoft Cybersecurity Architect SC100 Training Course. However, The SC-100 exam is an advanced, expert-level exam that covers a wide range of cybersecurity topics, so advanced experience and knowledge in identity and access, platform protection, security operations, securing data, and securing applications is recommended.

Microsoft Cybersecurity Architect SC100 Course Overview

The Microsoft Cybersecurity Architect SC100 Course will equip individuals with the skills and knowledge to design and implement security solutions that protect organisations against cyber threats. Its relevance in today's digital age cannot be overstated, as cyber security remains a critical concern for businesses across the globe.

Understanding and proficiency in cybersecurity architecture are crucial for IT professionals safeguarding their organisations' digital assets. This course is particularly beneficial for Cybersecurity Architects, Security Officers, and IT Professionals looking to enhance their skill set in designing and managing secure solutions by industry best practices.

The Knowledge Academy’s intensive 4-day training offers a comprehensive introduction to the principles of cybersecurity architecture within the Microsoft ecosystem. Delegates will gain hands-on experience designing security solutions that leverage Microsoft technologies to enhance organisational security posture. The course aims to empower participants with the knowledge and skills to make informed security decisions that align with business objectives.

Course Objectives:

  • To understand the cybersecurity landscape and the architect’s role in designing secure systems
  • To learn how to design and implement secure infrastructure and applications
  • To master the application of security controls and threat protection
  • To gain proficiency in identity and access management solutions
  • To develop skills in data protection and encryption strategies

After completing this course, delegates will receive a Microsoft Cybersecurity Architect Certification. This certification validates the delegate's expertise in designing and implementing security solutions. This credential is a testament to the holder's ability to play a pivotal role in protecting their organisation against cyber threats, enhancing their employability and career prospects in cybersecurity.

Show moredowndown

What’s included in this Microsoft Cybersecurity Architect SC100 Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Microsoft Cybersecurity Architect SC100 Certificate
  • Digital Delegate Pack

Show moredowndown

Why choose us

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Microsoft Cybersecurity Architect SC100. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's Microsoft Cybersecurity Architect SC100, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Experience the most sought-after learning style with The Knowledge Academy's Microsoft Cybersecurity Architect SC100. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Microsoft Cybersecurity Architect SC100 sessions.

best_trainers

Highly experienced trainers

Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment

value_for_money

Great value for money

Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value

Streamline large-scale training requirements with The Knowledge Academy’s In-house/Onsite Microsoft Cybersecurity Architect SC100 at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our Microsoft Cybersecurity Architect SC100 offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

Microsoft Cybersecurity Architect SC100 FAQs

The Microsoft Cybersecurity Architect SC-100 Certification validates expertise in designing and evolving an organisation's cybersecurity strategy, aligning with business needs and compliance requirements.
This course is valuable for professionals aiming to enhance their cybersecurity skills and understanding, particularly for designing and implementing security solutions across Microsoft platforms. It aids career advancement.
This training enhances cybersecurity skills, prepares for certification, improves job prospects in security architecture, and provides comprehensive knowledge of security solutions and policies.
There are no formal prerequisites for attending this training. However, the SC-100 exam is for cybersecurity experts. Advanced knowledge in identity, platform protection, security operations, and securing data and applications is recommended.
In this training course, delegates will have 4-day intensive training with our experienced instructors and a digital delegate pack consisting of important notes related to this course.
This course is a 4-day training course during which delegates participate in intensive learning sessions that cover various course topics.
This course provides skills in designing and evolving cybersecurity strategies, managing risk, securing hybrid environments, governing data protection, and responding to security incidents efficiently.
After completing this training, opportunities include roles as a Cybersecurity Architect, Security Consultant, Compliance Analyst, and roles focused on threat protection and security solutions design.
The Knowledge Academy in the United Kingdom stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking this course.
The price for Microsoft Cybersecurity Architect SC100 certification in the United Kingdom starts from £2395
The Knowledge Academy is the Leading global training provider for Microsoft Cybersecurity Architect SC100.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Microsoft Security Engineer Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on 01344203999 and speak to our training experts, we should be able to help you with your requirements.

cross

Unlock Exceptional Learning at Unbeatable Prices!

Special Discounts

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.