SC-100T00 Microsoft Cybersecurity Architect

Price
$2,495.00 USD

Duration
4 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Add Exam Voucher
Click Here for
Purchasing Options

Course Overview

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Who Should Attend?

This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

If you have questions about Learning Credits, please contact your Account Manager.

Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at https://www.newhorizons.com/eligible.

If you have questions about our Corporate Tech Pass, please contact your Account Manager.

Course Prerequisites

  • Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.)
  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.
  • Agenda

    1 - Introduction to Zero Trust and best practice frameworks

    • Zero Trust initiatives
    • Zero Trust technology pillars part 1
    • Zero Trust technology pillars part 2

    2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

    • Define a security strategy
    • Cloud Adoption Framework secure methodology
    • Design security with Azure Landing Zones
    • The Well-Architected Framework security pillar

    3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

    • Design solutions with best practices for capabilities and controls
    • Design solutions with best practices for attack protection

    4 - Design a resiliency strategy for common cyberthreats like ransomware

    • Common cyberthreats and attack patterns
    • Support business resiliency
    • Ransomware protection
    • Configurations for secure backup and restore
    • Security updates

    5 - Case study: Design solutions that align with security best practices and priorities

    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough

    6 - Design solutions for regulatory compliance

    • Translate compliance requirements into a security solution
    • Address compliance requirements with Microsoft Purview
    • Address privacy requirements with Microsoft Priva
    • Address security and compliance requirements with Azure policy
    • Evaluate infrastructure compliance with Defender for Cloud

    7 - Design solutions for identity and access management

    • Design cloud, hybrid and multicloud access strategies (including Microsoft Entra ID)
    • Design a solution for external identities
    • Design modern authentication and authorization strategies
    • Align conditional access and Zero Trust
    • Specify requirements to secure Active Directory Domain Services (AD DS)
    • Design a solution to manage secrets, keys, and certificates

    8 - Design solutions for securing privileged access

    • The enterprise access model
    • Design identity governance solutions
    • Design a solution to secure tenant administration
    • Design a solution for cloud infrastructure entitlement management (CIEM)
    • Design a solution for privileged access workstations and bastion services

    9 - Design solutions for security operations

    • Design security operations capabilities in hybrid and multicloud environments
    • Design centralized logging and auditing
    • Design security information and event management (SIEM) solutions
    • Design solutions for detection and response
    • Design a solution for security orchestration, automation, and response (SOAR)
    • Design security workflows
    • Design threat detection coverage

    10 - Case study: Design security operations, identity and compliance capabilities

    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough

    11 - Design solutions for securing Microsoft 365

    • Evaluate security posture for collaboration and productivity workloads
    • Design a Microsoft Defender XDR solution
    • Design configurations and operational practices for Microsoft 365

    12 - Design solutions for securing applications

    • Design and implement standards to secure application development
    • Evaluate security posture of existing application portfolios
    • Evaluate application threats with threat modeling
    • Design security lifecycle strategy for applications
    • Secure access for workload identities
    • Design a solution for API management and security
    • Design a solution for secure access to applications

    13 - Design solutions for securing an organization's data

    • Design a solution for data discovery and classification using Microsoft Purview
    • Design a solution for data protection
    • Design data security for Azure workloads
    • Design security for Azure Storage
    • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage

    14 - Case study: Design security solutions for applications and data

    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough

    15 - Specify requirements for securing SaaS, PaaS, and IaaS services

    • Specify security baselines for SaaS, PaaS, and IaaS services
    • Specify security requirements for web workloads
    • Specify security requirements for containers and container orchestration

    16 - Design solutions for security posture management in hybrid and multicloud environments

    • Evaluate security posture by using Microsoft Cloud Security Benchmark
    • Design integrated posture management and workload protection
    • Evaluate security posture by using Microsoft Defender for Cloud
    • Posture evaluation with Microsoft Defender for Cloud secure score
    • Design cloud workload protection with Microsoft Defender for Cloud
    • Integrate hybrid and multicloud environments with Azure Arc
    • Design a solution for external attack surface management

    17 - Design solutions for securing server and client endpoints

    • Specify server security requirements
    • Specify requirements for mobile devices and clients
    • Specify internet of things (IoT) and embedded device security requirements
    • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
    • Specify security baselines for server and client endpoints
    • Design a solution for secure remote access

    18 - Design solutions for network security

    • Design solutions for network segmentation
    • Design solutions for traffic filtering with network security groups
    • Design solutions for network posture management
    • Design solutions for network monitoring

    19 - Case study: Design security solutions for infrastructure

    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
     

    Upcoming Class Dates and Times

    Jan 27, 28, 29, 30
    8:00 AM - 4:00 PM
    ENROLL $2,495.00 USD
    Apr 28, 29, 30, May 1
    8:00 AM - 4:00 PM
    ENROLL $2,495.00 USD
     



    Do You Have Additional Questions? Please Contact Us Below.

    contact us contact us 
     
    Contact Us about Starting Your Business Training Strategy with New Horizons