Course SC-100: Microsoft Cybersecurity Architect - CTU Training Solutions
Loading...
ONLINE APPLICATION
×

Course SC-100: Microsoft Cybersecurity Architect

You learn how to use critical Microsoft security best practices such as the Cloud Adoption Framework (CAF), Well-Architected Framework (WAF), Microsoft Cybersecurity Reference Architecture (MCRA) to improve an organizations security posture, apply zero trust principles and minimize risk from emerging attacks.
Duration: 1 Day   |   Location : Online
Request A Quote

Virtual Interactive Lecturer-led Teaching (VILT)

Virtual instruction environments are designed to simulate the traditional classroom or learning experience. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Course outline

Module 1: Introduction to Zero Trust and best practice frameworks.

You learn what best practices are and how cybersecurity architects use them as well as some key best practice frameworks for Microsoft cybersecurity capabilities. You also learn about the concept of Zero Trust, and how to get started with Zero Trust in an organization.

Lessons

  • Introduction to best practices
  • Introduction to Zero Trust
  • Zero Trust initiatives
  • Zero Trust technology pillars part
  • Knowledge check – Introduction to Zero Trust and best practice frameworks
  • Summary – Introduction to Zero Trust and best practice frameworks

Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

You’ll learn about the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) and how you can use them to design more secure solutions.

Lessons

  • Define a security strategy
  • Introduction to the Cloud Adoption Framework
  • Cloud Adoption Framework secure methodology
  • Introduction to Azure Landing Zones
  • Design security with Azure Landing Zones
  • Introduction to the Well-Architected Framework
  • The Well-Architected Framework security pillar
  • Knowledge check – Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
  • Summary – Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

You learn about the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) and how you can use them to design more secure solutions.

Lessons

  • Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
  • Design solutions with best practices for capabilities and controls
  • Design solutions with best practices for attack protection
  • Knowledge check – Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
  • Summary – Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark

Module 4: Design a resiliency strategy for common cyberthreats like ransomware

You’ll learn about common cyberthreats like ransomware and what kinds of attack patterns an organization must be prepared for.

Lessons

  • Common cyberthreats and attack patterns
  • Support business resiliency
  • Ransomware protection
  • Configurations for secure backup and restore
  • Security updates
  • Knowledge check – Design a resiliency strategy for common cyberthreats
  • Summary – Design a resiliency strategy for common cyberthreats like ransomware

Module 5: Case study: Design solutions that align with security best practices and priorities

Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity and compliance. You will analyse design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Lessons

  • Introduction
  • Case study description
  • Case study answers
  • Conceptual walkthrough
  • Technical walkthrough
  • Knowledge check
  • Summary
CTU Training Solutions , Updated: August 29th, 2023

Request A Quote

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Open chat
1
Need Help?
Hello
How can we assist you today?