Microsoft Official Course (MOC)
Course
Course SC-100T00: Microsoft Cybersecurity Architect (SC-100) EN
(4 days)
About this Course:
Course Goals/Skills Gained:
- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications
Course Format:
Присъствен (Classroom) Курс в Учебната ни зала или В Офис на Клиент | Онлайн (Online/Virtual) Курс във виртуална зала с инструктор |
Course Language Option
Български (Bulgarian) | Английски (English) |
You can choose the language in which the training will be conducted – Bulgarian or English. All our instructors are fluent in English.
Student Guides:
The training materials are available in electronic format. They can be used online / offline on any device. Lifetime access.
Lab Environment:
Each student has their own lab environment where the exercises are conducted, part of the course. You do not need to install software on a computer or special hardware requirements. Participants in a face-to-face format in our Training Center have an individual computer during the training.
At Course Completion:
Lifetime Access - Video Archive 24/7 | Certificate of Course Completion |
Lifetime access to a video archive with recording of each individual lecture. Official internationally recognized certificate for completed training course.
Course Duration:
-
5 working days (09:00 – 17:00) or 40 hours of training (theory and practice)
Payment
An application for an invoice is accepted at the time of enrollment in the respective course. An invoice is issued within 7 days of confirming the payment.
Upcoming Courses
For more information, use the contact form. We will contact you to confirm the dates.
This Course Prepares you for the following exam:
-
-
SC-100: Microsoft Cybersecurity Architect
-
Course Curriculum
-
Module 1: Build an overall security strategy and architecture
Learn how to build an overall security strategy and architecture.
- Introduction
- Zero Trust overview
- Develop Integration points in an architecture
- Develop security requirements based on business goals
- Translate security requirements into technical capabilities
- Design security for a resiliency strategy
- Design a security strategy for hybrid and multi-tenant environments
- Design technical and governance strategies for traffic filtering and segmentation
- Understand security for protocols
- Exercise: Build an overall security strategy and architecture
- Knowledge check
-
Module 2: Design a security operations strategy
Learn how to design a security operations strategy.
- Introduction
- Understand security operations frameworks, processes, and procedures
- Design a logging and auditing security strategy
- Develop security operations for hybrid and multi-cloud environments
- Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
- Evaluate security workflows
- Review security strategies for incident management
- Evaluate security operations strategy for sharing technical threat intelligence
- Monitor sources for insights on threats and mitigations
-
Module 3: Design an identity security strategy
Learn how to design an identity security strategy.
- Introduction
- Secure access to cloud resources
- Recommend an identity store for security
- Recommend secure authentication and security authorization strategies
- Secure conditional access
- Design a strategy for role assignment and delegation
- Define Identity governance for access reviews and entitlement management
- Design a security strategy for privileged role access to infrastructure
- Design a security strategy for privileged activities
- Understand security for protocols
-
Module 4: Evaluate a regulatory compliance strategy
Learn how to evaluate a regulatory compliance strategy.
- Introduction
- Interpret compliance requirements and their technical capabilities
- Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- Interpret compliance scores and recommend actions to resolve issues or improve security
- Design and validate implementation of Azure Policy
- Design for data residency Requirements
- Translate privacy requirements into requirements for security solutions
-
Module 5: Evaluate security posture and recommend technical strategies to manage risk
Learn how to evaluate security posture and recommend technical strategies to manage risk.
- Introduction
- Evaluate security postures by using benchmarks
- Evaluate security postures by using Secure Scores
- Evaluate security hygiene of Cloud Workloads
- Evaluate security postures by using Microsoft Defender for Cloud
- Design security for an Azure Landing Zone
- Interpret technical threat intelligence and recommend risk mitigations
- Recommend security capabilities or controls to mitigate identified risks
-
Module 6: Understand architecture best practices and how they are changing with the Cloud
Learn about architecture best practices and how they are changing with the Cloud.
-
Module 7: Design a strategy for securing server and client endpoints
Learn how to design a strategy for securing server and client endpoints.
- Introduction
- Specify security baselines for server and client endpoints
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify requirements for securing Active Directory Domain Services
- Design a strategy to manage secrets, keys, and certificates
- Design a strategy for secure remote access
- Understand security operations frameworks, processes, and procedures
- Understand deep forensics procedures by resource type
-
Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services
Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.
- Introduction
- Specify security baselines for PaaS services
- Specify security baselines for IaaS services
- Specify security baselines for SaaS services
- Specify security requirements for IoT workloads
- Specify security requirements for data workloads
- Specify security requirements for web workloads
- Specify security requirements for storage workloads
- Specify security requirements for containers
- Specify security requirements for container orchestration
-
Module 9: Specify security requirements for applications
Learn how to specify security requirements for applications.
-
Module 10: Design a strategy for securing data
Learn how to design a strategy for securing data.
Target audiences
- IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.