Course outline
Module 1: Introduction to Zero Trust and best practice frameworks.
You learn what best practices are and how cybersecurity architects use them as well as some key best practice frameworks for Microsoft cybersecurity capabilities. You also learn about the concept of Zero Trust, and how to get started with Zero Trust in an organization.
Lessons
- Introduction to best practices
- Introduction to Zero Trust
- Zero Trust initiatives
- Zero Trust technology pillars part
- Knowledge check – Introduction to Zero Trust and best practice frameworks
- Summary – Introduction to Zero Trust and best practice frameworks
Module 2: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
You’ll learn about the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) and how you can use them to design more secure solutions.
Lessons
- Define a security strategy
- Introduction to the Cloud Adoption Framework
- Cloud Adoption Framework secure methodology
- Introduction to Azure Landing Zones
- Design security with Azure Landing Zones
- Introduction to the Well-Architected Framework
- The Well-Architected Framework security pillar
- Knowledge check – Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Summary – Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
Module 3: Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
You learn about the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) and how you can use them to design more secure solutions.
Lessons
- Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark
- Design solutions with best practices for capabilities and controls
- Design solutions with best practices for attack protection
- Knowledge check – Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
- Summary – Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
Module 4: Design a resiliency strategy for common cyberthreats like ransomware
You’ll learn about common cyberthreats like ransomware and what kinds of attack patterns an organization must be prepared for.
Lessons
- Common cyberthreats and attack patterns
- Support business resiliency
- Ransomware protection
- Configurations for secure backup and restore
- Security updates
- Knowledge check – Design a resiliency strategy for common cyberthreats
- Summary – Design a resiliency strategy for common cyberthreats like ransomware
Module 5: Case study: Design solutions that align with security best practices and priorities
Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity and compliance. You will analyse design requirements, answer conceptual and technical questions and design a solution to meet the business needs.
Lessons
- Introduction
- Case study description
- Case study answers
- Conceptual walkthrough
- Technical walkthrough
- Knowledge check
- Summary