SC-100 Microsoft Cybersecurity Architect Certification Training Course
SC-100 Microsoft Cybersecurity Architect Certification Training Course
The Microsoft SC 100 Microsoft Cybersecurity Architect is an instructor-led, hands-on certification training course. This course covers the development and design of solutions using zero-trust principles and defines security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
It also covers the background to develop and evaluate cybersecurity strategies in the following areas: security operations (SecOps) Zero trust, and Governance Risk Compliance (GRC). Candidates can achieve the Microsoft Certified: Cybersecurity Architect Expert certification after SC-100T00: Microsoft Cybersecurity Architect exam.
Experience with hybrid and cloud implementations will be a plus
SC-100: Microsoft Cybersecurity Architect
Logitrain course material for Microsoft – SC-100T00: Microsoft Cybersecurity Architect provided
- Design a Zero Trust strategy and architecture
- Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
- Design security for infrastructure
- Design a strategy for data and applications
IT Professionals having knowledge of hybrid and cloud implementations.
- Zero Trust overview
- Develop Integration points in an architecture
- Develop security requirements based on business goals
- Translate security requirements into technical capabilities
- Design security for a resiliency strategy
- Design a security strategy for hybrid and multi-tenant environments
- Design technical and governance strategies for traffic filtering and segmentation
- Understand security for protocols
- Understand security operations frameworks, processes, and procedures
- Design a logging and auditing security strategy
- Develop security operations for hybrid and multi-cloud environments
- Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
- Evaluate security workflows
- Review security strategies for incident management
- Evaluate security operations strategy for sharing technical threat intelligence
- Monitor sources for insights on threats and mitigations
- Secure access to cloud resources
- Recommend an identity store for security
- Recommend secure authentication and security authorization strategies
- Secure conditional access
- Design a strategy for role assignment and delegation
- Define Identity governance for access reviews and entitlement management
- Design a security strategy for privileged role access to infrastructure
- Design a security strategy for privileged activities
- Understand security for protocols
- Interpret compliance requirements and their technical capabilities
- Evaluate infrastructure compliance by using Microsoft Defender for Cloud
- Interpret compliance scores and recommend actions to resolve issues or improve security
- Design and validate the implementation of Azure Policy
- Design for data residency Requirements
- Evaluate security postures by using benchmarks
- Evaluate security postures by using Microsoft Defender for Cloud
- Evaluate security postures by using Secure Scores
- Evaluate security hygiene of Cloud Workloads
- Design security for an Azure Landing Zone
- Interpret technical threat intelligence and recommend risk mitigations
- Recommend security capabilities or controls to mitigate identified risks
- Plan and implement a security strategy across teams
- Establish a strategy and process for the proactive and continuous evolution of a security strategy
- Understand network protocols and best practices for network segmentation and traffic filtering
- Specify security baselines for server and client endpoints
- Specify security requirements for servers
- Specify security requirements for mobile devices and clients
- Specify requirements for securing Active Directory Domain Services
- Design a strategy to manage secrets, keys, and certificates
- Design a strategy for secure remote access
- Understand security operations frameworks, processes, and procedures
- Understand deep forensics procedures by resource type
- Specify security baselines for PaaS services
- Specify security baselines for IaaS services
- Specify security baselines for SaaS services
- Specify security requirements for IoT workloads
- Specify security requirements for data workloads
- Specify security requirements for web workloads
- Specify security requirements for storage workloads
- Specify security requirements for containers
- Specify security requirements for container orchestration
- Understand application threat modelling
- Specify priorities for mitigating threats to applications
- Specify a security standard for onboarding a new application
- Specify a security strategy for applications and APIs
- Prioritize mitigating threats to data
- Design a strategy to identify and protect sensitive data
- Specify an encryption standard for data at rest and in motion
Take the certification exam within 3 months of course / module completion
Take the official vendor certification exam at the Logitrain training center
Course material in hardcopy is included. Full-time classroom courses include meals
Mock test is included in the full-time courses to assist with your preparation
Our trainers are highly skilled with expertise and extensive hands-on experience
Relax, we will beat competitor’s advertised price in Australia. Our course has no extra costs
Location | Type | Duration | Price | Dates | |
---|---|---|---|---|---|
Location | Type | Duration | Price | Dates |
The supply of this course/package/program is governed by our terms and conditions. Please read them carefully before enrolling, as enrolment is conditional on acceptance of these terms and conditions. Courses run subject to registrations.
Find out why we are the leading choice to help boost your career in Australia
Approachable and knowledgeable; comfortable surroundings. Logitrain does make IT training easier |
I recently followed the ITIL Foundation course at Logitrain. The training, materials and facilities were excellent and I would not hesitate to train with Logitrain again.
Thanks for a great week! Really enjoyed and feel I picked up a lot. Great Trainer! Will definitely look at further studies here.
Well-presented and able to convey immense knowledge to class. All queries were responded to promptly.
Excellent teaching method, easy to understand.
Logitrain provided a valuable insight into ITIL and enabled me to excel and advance my knowledge through a simple and well organised series of sessions.
Great place to study for certification, knowledgeable persons, excellent customer service. Ready to answer queries on the spot, very helpful.
The trainer was very patient and gave everybody the opportunity to participate.
The trainer explained everything very well. Logitrain was very helpful for me in getting a better overall understanding of CCNA. I previously had studied it 2 years earlier but required revision
Over 1000 organisations have relied on Logitrain to be their trusted training partner.
Don’t Wait. Fill the form for a free no-obligation information session with our course specialists.