Microsoft Cybersecurity Architect (SC-100)

Course 8671

  • Duration: 4 days
  • Language: English
  • Level: Advanced

This is an advanced, expert-level course. This Microsoft Cybersecurity Architect (SC-100) course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Although not required to attend, students are strongly encouraged to have taken and passed another associate-level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. 

Microsoft Cybersecurity Architect Course Delivery Methods

  • In-Person

  • Online

Microsoft Cybersecurity Architect Course Information

In this course, you will learn how to:

  • Design a Zero Trust strategy and architecture.
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies.
  • Design security for infrastructure.
  • Design a strategy for data and applications.

Prerequisites

Before attending this SC-100 course, students must have:

  • Highly recommended to have attended and passed one of the associate-level certifications in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300).
  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.

Exam Information

This course can help you prepare for the following Microsoft role-based certification exam — Microsoft Exam SC-100: Microsoft Cybersecurity Architect.

Microsoft Cybersecurity Architect Course Outline

You learn what best practices are and how cybersecurity architects use them, as well as some fundamental best practice frameworks for Microsoft cybersecurity capabilities. You also learn about Zero Trust and how to start with Zero Trust in an organization.

By the end of this module, you'll be able to:

  • Understand how to use best practices as a cybersecurity architect.
  • Understand the concept of Zero Trust and how it can be used to modernize an organization's cybersecurity.
  • Understand when to use different best practice frameworks like MCRA, CAF and WAF.

    You'll learn about the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) and how you can use them to design more secure solutions.

    Upon completion of this module, the learner will be able to:

    • Understand the Cloud Adoption Framework and how it can accelerate and secure an organization's move to the cloud.
    • Understand the Well-Architected Framework and how it can be used to design solutions in the cloud that adhere to sound design principles, including security.

      You learn about the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB) and how you can use them to design more secure solutions.

      By the end of this module, you will be able to:

      • Understand how to use Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB) to design more secure solutions.

        You'll learn about common cyber threats like ransomware and what attack patterns an organization must be prepared for.

        By the end of this module, you'll be able to:

        • Understand common cyber threats like ransomware.
        • Understand how to support business resiliency.
        • Design configurations for secure backup and restore.
        • Design solutions for managing security updates.

          Apply your cybersecurity architect skills to a real business scenario in security operations, identity and compliance. You will analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

          You learn:

          • How to analyze business requirements
          • How to match technical capabilities to meet those needs
          • How to design cohesive solutions that incorporate all of the required functions

            You'll learn how to interpret and translate regulatory requirements into technical solutions. You'll also learn how to use capabilities found in Microsoft Purview, Microsoft Priva, and Defender for Cloud for compliance.

            Upon completion of this module, the learner will be able to:

            • Translate compliance requirements into a security solution
            • Address compliance requirements with Microsoft Purview
            • Design a solution to address privacy requirements with Microsoft Priva
            • Design Azure Policy solutions to address security and compliance requirements
            • Evaluate infrastructure compliance by using Microsoft Defender for Cloud

              You learn about various strategies for managing identities and resource access, including hybrid and multi-cloud scenarios, external identities, and conditional access.

              By the end of this module, you will be able to:

              • Design cloud, hybrid and multi-cloud access strategies
              • Design a solution for Azure Active Directory (Azure AD), part of Microsoft Entra
              • Design a solution for external identities
              • Design modern authentication and authorization strategies
              • Specify requirements to secure Active Directory Domain Services
              • Design a solution to manage secrets, keys, and certificates

                You learn advanced techniques for designing solutions that manage privileged access effectively.

                By the end of this module, you will be able to:

                • Understand privileged access and the Enterprise Access Model
                • Design identity governance solutions
                • Design a solution for securing the administration of cloud tenants
                • Design for cloud infrastructure entitlement management

                  You learn techniques to design security operations capabilities, including logging, auditing, Security Event Management (SIEM), Security Orchestration and Automated Response (SOAR), and security workflows.

                  By the end of this module, you will be able to:

                  • Design security operations capabilities in hybrid and multi-cloud environments
                  • Design centralized logging and auditing
                  • Design Security Event Management (SIEM) solutions
                  • Design a solution for detection and response that includes Extended Detection and Response (XDR)
                  • Design a solution for security orchestration, automation and response (SOAR)
                  • Design security workflows
                  • Design and evaluate threat detection with the MITRE ATT&CK framework

                    Apply your cybersecurity architect skills to a real business scenario in security operations, identity and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

                    You learn:

                    • How to analyze business requirements
                    • How to match technical capabilities to meet those needs
                    • How to design cohesive solutions that incorporate all of the required functions

                      You learn how to design security solutions for Exchange, Sharepoint, OneDrive and Teams.

                      By the end of this module, you will be able to:

                      • Evaluate security posture for collaboration and productivity workloads
                      • Design a Microsoft 365 Defender solution
                      • Design configurations and operational practices for Microsoft 365

                        You learn how to secure applications, APIs and the development process using techniques like posture management, threat modeling, and secure access for workload identities.

                        By the end of this module, you're able to:

                        • Evaluate the security posture of existing application portfolios
                        • Evaluate threats to business-critical applications by using threat modeling
                        • Design and implement a complete lifecycle strategy for application security
                        • Design and implement standards and practices for securing the application development process
                        • Design a solution for workload identity to authenticate and access Azure cloud resources
                        • Design a solution for API management and security
                        • Design a solution for secure access to applications

                          You learn about designing solutions that secure an organization's data using capabilities like Microsoft Purview, Defender for SQL, and Defender for Storage.

                          By the end of this module, you will be able to:

                          • Design a solution for data discovery and classification using Microsoft Purview
                          • Specify priorities for mitigating threats to data
                          • Design a solution for protection of data at rest, data in motion, and data in use
                          • Design a security solution for data in Azure workloads
                          • Design a security solution for data in Azure Storage
                          • Design a security solution that includes Microsoft Defender for SQL and Microsoft Defender for Storage

                            Apply your cybersecurity architect skills to a real business scenario in securing applications and data. You will analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

                            You learn:

                            • How to analyze business requirements
                            • How to match technical capabilities to meet those needs
                            • How to design cohesive solutions that incorporate all of the required functions

                              You learn to analyze security requirements for different cloud offerings (SaaS, PaaS, and IaaS), IoT workloads, web workloads and containers.

                              By the end of this module, you will be able to:

                              • Specify security baselines for SaaS, PaaS, and IaaS services
                              • Specify security requirements for IoT workloads
                              • Specify security requirements for web workloads
                              • Specify security requirements for containers and container orchestration

                                You learn how to design security posture management solutions that integrate into hybrid and multi-cloud scenarios using Microsoft Defender for Cloud, Azure Arc and Microsoft Cloud Security Benchmark (MCSB) capabilities.

                                By the end of this module, you're able to:

                                • Evaluate security posture by using Microsoft Cloud Security Benchmark, Microsoft Defender for Cloud, and Secure Scores
                                • Design integrated security posture management and workload protection solutions in hybrid and multi-cloud environments
                                • Design cloud workload protection solutions that use Microsoft Defender for Cloud

                                  You learn how to analyze the security requirements for different endpoints, including servers, clients, IoT, OT, mobile, and embedded devices. These requirements will consider different platforms and operating systems and set standards for endpoint protection, hardening and configuration.

                                  By the end of this module, you will be able to:

                                  • Specify security requirements for servers
                                  • Specify security requirements for mobile devices and clients
                                  • Specify security requirements for IoT devices and embedded systems
                                  • Design a solution for securing operational technology (OT) and industrial control systems (ICS) using Microsoft Defender for IoT.
                                  • Specify security baselines for server and client endpoints
                                  • Design a solution for secure remote access

                                    You learn to design secure network solutions using segmentation, traffic filtering, network monitoring and posture management techniques.

                                    By the end of this module, you will be able to:

                                    • Design solutions for network segmentation
                                    • Design solutions for filtering traffic with network security groups
                                    • Design solutions for network posture measurement
                                    • Design solutions for network monitoring

                                      Apply your cybersecurity architect skills to a real business scenario in infrastructure security. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

                                      You learn:

                                      • How to analyze business requirements
                                      • How to match technical capabilities to meet those needs
                                      • How to design cohesive solutions that incorporate all of the required functions

                                      Need Help Finding The Right Training Solution?

                                      Our training advisors are here for you.

                                      Microsoft Cybersecurity Architect (SC-100) FAQs

                                      Yes, this class helps an attendee prepare for the Microsoft Exam SC-100: Microsoft Cybersecurity Architect.

                                      This certification could be a great fit if you have significant experience in a wide range of security engineering areas including identity and access, platform protection, security operations, securing data and securing applications. You should also have experience with hybrid and cloud implementations.

                                      Microsoft cybersecurity architects have subject matter expertise in designing and evolving the cybersecurity strategy to protect an organization’s mission and business processes across all aspects of the enterprise architecture.

                                      They design a Zero Trust strategy and architecture, including security strategies for data, applications, access management, identity, and infrastructure. They also evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies. 

                                      Cybersecurity architects continuously collaborate with leaders and practitioners in IT security, privacy, and other roles across an organization to plan and implement a cybersecurity strategy that meets the business needs of an organization.

                                      Candidates for this exam should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.

                                      Chat With Us