Microsoft Cybersecurity Architect (SC-100)

Course Summary
This Microsoft Cybersecurity Architect (SC-100) CertPREP course prepares you for the Microsoft Exam SC-100 which includes designing a Zero Trust strategy and architecture; evaluating Governance Risk Compliance (GR) technical strategies and security operations strategies; designing security for infrastructure; and designing a strategy for data and applications.
The goal of this course is to provide you with all the tools you need to prepare for the SC-100 Microsoft Cybersecurity Architect exam — including text explanations, video demos, lab activities, self-assessment questions, and a practice exam— to increase your chances of passing the exam on your first try.
Methodology:
180-day access to:
- Lessons
- Video learning
- MeasureUp Practice Test for Microsoft SC-100. Practice Mode with remediation and Certification mode to simulate the test day experience.
Duration:
Approximately 2-3 Days / 18 hours of primary content. Each learner will learn at their own pace.
Audience:
Students with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection security operations, securing data, and securing applications.
Prerequisites:
- 3-5 years of experience in a wide range or security engineering areas
- Experience with hybrid and cloud implementations
Course Outcome:
Upon successful completion of this course, students should be able to:
- Build an overall security strategy an architecture.
- Design a security operations strategy.
- Design an identity security strategy.
- Design a regulatory compliance strategy.
- Evaluate security posture and recommend technical strategies to manage risk.
- Design a strategy for securing server and client endpoints.
- Design a strategy for securing SaaS, PaaS, and IaaS services.
- Specify security requirements for applications.
- Design a strategy for securing data.
- Microsoft Cybersecurity Reference Architectures and Microsoft cloud security benchmark best practices.
- Recommend a secure methodology by using the Cloud Adoption Framework (CAF).
- Recommend a ransomware strategy by using Microsoft Security Best Practices.
Course Outline:
Lesson 1: Build an overall security strategy and architecture (2 hours and 48 minutes).
- Skill 1.1: Identify the integration points in an architecture by using Microsoft Cybersecurity Reference Architectures (MCRA)
- Skill 1.2: Translate business goals into security requirements
- Skill 1.3: Translate security requirements into technical capabilities, including security services, security products and security processes
- Skill 1.4: Design security for a resiliency strategy
- Skill 1.6: Develop a technical governance strategy for security.
- Summary
- Case Study
- Quiz
Lesson 2: Design a security operations strategy
- Skill 2.1: Design a logging and auditing strategy to support security operations.
- Skill 2.2: Develop security operations to support a hybrid or multi-cloud environment.
- Skill 2.3: Design a strategy for SIEM and SOAR.
- Skill 2.4: Evaluate security workflows.
- Skill 2.5: Evaluate a security operations strategy for the incident management lifecycle.
- Skill 2.6: Evaluate a security operations strategy for sharing technical threat intelligence
- Summary
- Case Study
- Quiz
Lesson 3: Design an identity security strategy.
- Skill 3.1: Design a strategy for access to cloud resources
- Skill 3.2: Recommend an identity store (tenants, B2B, B2C, and hybrid) .
- Skill 3.3: Recommend an authentication strategy.
- Skill 3.4: Recommend an authorization strategy.
- Skill 3.5: Design a strategy for conditional access.
- Skill 3.6: Design a strategy for role assignment and delegation.
- Skill 3.7: Design security strategy for privileged-role access to infrastructure, including identity-based firewall rules and Azure PIM.
- Skill 3.8: Design security strategy for privileged activities, including PAM, entitlement management, and cloud tenant administration.
- Summary
- Case Study
- Quiz
Lesson 4: Design a regulatory compliance strategy .
- Skill 4.1: Interpret compliance requirements and translate specific technical capabilities (new or existing) .
- Skill 4.2: Evaluate infrastructure compliance by using Microsoft Defender for Cloud .
- Skill 4.3: Interpret compliance scores and recommend actions to resolve issues or improve security.
- Skill 4.4: Design implementation of Azure Policy .
- Skill 4.5: Design for data residency requirements .
- Skill 4.6: Translate privacy requirements into requirements for security solutions.
- Summary
- Case Study
- Quiz
Lesson 5: Evaluate security posture and recommend technical strategies to manage risk (4 hours and 48 minutes).
- Skill 5.1: Evaluate security posture by using benchmarks (including Azure Security benchmarks for Microsoft Cloud security benchmark, ISO 27001, etc.
- Skill 5.2: Evaluate security posture by using Microsoft Defender for Cloud .
- Skill 5.3: Evaluate security posture by using Secure Scores.
- Skill 5.4: Evaluate security posture of cloud workloads .
- Skill 5.5: Design security for an Azure Landing Zone.
- Skill 5.6: Interpret technical threat intelligence and recommend risk mitigations.
- Skill 5.7: Recommend security capabilities or controls to mitigate identified risks.
- Summary
- Case Study
- Quiz
Lesson 6: Design a strategy for securing server and client endpoints.
- Skill 6.1: Specify security baselines for server and client endpoints
- Skill 6.2: Specify security requirements for servers, including multiple platforms and operating systems
- Skill 6.3: Specify security requirements for mobile devices and clients, including endpoint protection, hardening, and configurations .
- Skill 6.4: Specify requirements to secure Active Directory Domain Services.
- Skill 6.5: Design a strategy to manage secrets, keys, and certificates.
- Skill 6.6: Design a strategy for secure remote access .
- Summary
- Case Study
- Quiz
Lesson 7: Design a strategy for securing SaaS, PaaS, and IaaS services.
- Skill 7.1: Specify security baselines for SaaS, PaaS, and IaaS services.
- Skill 7.2: Specify security requirements for IoT workloads.
- Skill 7.3: Specify security requirements for data workloads, including SQL, Azure SQL Database, Azure Synapse, and Azure Cosmos DB.
- Skill 7.4: Specify security requirements for web workloads, including Azure App Service.
- Skill 7.5: Specify security requirements for storage workloads, including Azure Storage.
- Skill 7.6: Specify security requirements for containers.
- Skill 7.7: Specify security requirements for container orchestration .
- Summary
- Case Study
- Quiz
Lesson 8: Specify security requirements for applications.
- Skill 8.1: Specify priorities for mitigating threats to applications .
- Skill 8.2: Specify a security standard for onboarding a new application.
- Skill 8.3: Specify a security strategy for applications and APIs
- Summary
- Case Study
- Quiz
Lesson 9: Design a strategy for securing data
- Skill 9.1: Specify priorities for mitigating threats to data
- Skill 9.2: Design a strategy to identify and protect sensitive data
- Skill 9.3: Specify an encryption standard for data at rest and in motion Encrypt at rest.
- Summary
- Case Study
- Quiz
Lesson 10: Microsoft Cybersecurity Reference Architectures and Microsoft cloud security benchmark best practices.
- Skill 10.1: Recommend best practices for cybersecurity capabilities and controls.
- Skill 10.2: Recommend best practices for protecting from insider and external attacks.
- Skill 10.3: Recommend best practices for Zero Trust security
- Skill 10.4: Recommend best practices for the Zero Trust Rapid Modernization Plan
- Summary
- Case Study
- Quiz
Lesson 11: Recommend a secure methodology by using the Cloud Adoption Framework (CAF)
- Skill 11.1: Recommend a DevSecOps process
- Skill 11.2: Recommend a methodology for asset protection
- Skill 11.3: Recommend strategies for managing and minimizing risk
- Summary
- Case Study
- Quiz
Lesson 12: Recommend a ransomware strategy by using Microsoft Security Best Practices
- Skill 12.1: Plan for ransomware protection and extortion-based attacks
- Skill 12.2: Protect assets from ransomware attacks
- Skill 12.3: Recommend Microsoft ransomware best practices
- Summary
- Case Study
- Qu
Leave Us A Message
RU Academy
Level 7, Oasis Wing, Brunfield Oasis Tower 3 No.2, Jalan PJU 1A/7A, Oasis Square, Oasis Damansara, Petaling Jaya 47301, Selangor
WhatsApp : +6018-2010943
