Microsoft Cybersecurity Architect SC100 Course Outline
Module 1: Introduction to Zero Trust and Best Practice Frameworks
- Introduction to Zero Trust
- Zero Trust Initiatives
- Zero Trust Technology Pillars Part 1
- Zero Trust Technology Pillars Part 2
Module 2: Design Solutions that Align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
- Define a Security Strategy
- Introduction to the Cloud Adoption Framework
- Cloud Adoption Framework Secure Methodology
- Introduction to Azure Landing Zones
- Design Security with Azure Landing Zones
- Introduction to the Well-Architected Framework
- Well-Architected Framework Security Pillar
Module 3: Design Solutions that Align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB)
- Introduction to Microsoft Cybersecurity Reference Architecture and Cloud Security Benchmark
- Design solutions with Best Practices for Capabilities and Controls
- Design solutions with Best Practices for Attack Protection
Module 4: Design a Resiliency Strategy for Common Cyberthreats Like Ransomware
- Common Cyberthreats and Attack Patterns
- Support Business Resiliency
- Ransomware Protection
- Configurations for Secure Backup and Restore
- Security Updates
Module 5: Case study: Design solutions that align with security best practices and priorities
- Introduction
- Case Study Description
- Case Study Answers
- Conceptual Walkthrough
- Technical Walkthrough
Module 6: Design Solutions for Regulatory Compliance
- Introduction to Regulatory Compliance
- Translate Compliance Requirements into a Security Solution
- Address Compliance Requirements with Microsoft Purview
- Address Privacy Requirements with Microsoft Priva
- Address Security and Compliance Requirements with Azure Policy
- Evaluate Infrastructure Compliance with Defender for Cloud
Module 7: Design Solutions for Identity and Access Management
- Introduction to Identity and Access Management
- Design Cloud, Hybrid and Multicloud Access Strategies
- Design a Solution for External Identities
- Design modern Authentication and Authorisation Strategies
- Align Conditional access and Zero Trust
- Specify Requirements to Secure Active Directory Domain Services
- Design a Solution to Manage Secrets, Keys, and Certificates
Module 8: Design Solutions for Securing Privileged Access
- Introduction to Privileged Access
- enterprise Access Model
- Design Identity Governance Solutions
- Design a Solution to Secure Tenant Administration
- Design a Solution for Cloud Infrastructure Entitlement Management
- Design a Solution for Privileged Access Workstations and Bastion Services
Module 9: Design Solutions for Security Operations
- Introduction to Security Operations (SecOps)
- Design Security Operations Capabilities in Hybrid and Multicloud Environments
- Design Centralised Logging and Auditing
- Design Security Information and Event Management (SIEM) Solutions
- Design Solutions for Detection and Response
- Design a Solution for Security Orchestration, Automation, and Response (SOAR)
- Design Security Workflows
- Design Threat Detection Coverage
Module 10: Case study: Design Security Operations, Identity and Compliance Capabilities
- Introduction
- Case Study Description
- Case Study Answers
- Conceptual Walkthrough
- Technical Walkthrough
Module 11: Design Solutions for Securing Microsoft 365
- Introduction to Security for Exchange, Sharepoint, OneDrive and Teams
- Evaluate Security Posture for Collaboration and Productivity Workloads
- Design a Microsoft 365 Defender Solution
- Design Configurations and Operational Practices for Microsoft 365
Module 12: Design solutions for Securing Applications
- Introduction to Application Security
- Design and Implement Standards to Secure Application Development
- Evaluate Security Posture of Existing Application Portfolios
- Evaluate Application Threats with Threat Modeling
- Design Security Lifecycle Strategy for Applications
- Secure Access for Workload Identities
- Design a Solution for API Management and Security
- Design a Solution for Secure Access to Applications
Module 13: Design Solutions for Securing an Organisation's Data
- Introduction to Data Security
- Design a Solution for Data Discovery and Classification Using Microsoft Purview
- Design a Solution for Data Protection
- Design Data Security for Azure Workloads
- Design Security for Azure Storage
- Design a Security Solution with Microsoft Defender for SQL and Microsoft Defender for Storage
Module 14: Case study: Design Security Solutions for Applications and Data
- Introduction
- Case Study Description
- Case Study Answers
- Conceptual Walkthrough
- Technical Walkthrough
Module 15: Specify Requirements for Securing SaaS, PaaS, and IaaS Services
- Introduction to Security for SaaS, PaaS, and IaaS
- Specify Security Baselines for SaaS, PaaS, and IaaS Services
- Specify Security Requirements for Web Workloads
- Specify Security Requirements for Containers and Container Orchestration
Module 16: Design Solutions for Security Posture Management in Hybrid and Multicloud Environments
- Introduction to Hybrid and Multicloud Posture Management
- Evaluate Security Posture by Using Microsoft Cloud Security Benchmark
- Design Integrated Posture Management and Workload Protection
- Evaluate Security Posture by Using Microsoft Defender for Cloud
- Posture Evaluation with Microsoft Defender for Cloud Secure Score
- Design Cloud Workload Protection with Microsoft Defender for Cloud
- Integrate Hybrid and Multicloud Environments with Azure Arc
- Design a Solution for External Attack Surface Management
Module 17: Design Solutions for Securing Server and Client Endpoints
- Introduction to Endpoint Security
- Specify Server Security Requirements
- Specify Requirements for Mobile Devices and Clients
- Specify Internet of Things (IoT) and Embedded Device Security Requirements
- Secure Operational Technology (OT) and Industrial Control Systems (ICS) with Microsoft Defender for IoT
- Specify Security Baselines for Server and Client Endpoints
- Design a Solution for Secure Remote Access
Module 18: Design Solutions for Network Security
- Introduction
- Design Solutions for Network Segmentation
- Design Solutions for Traffic Filtering with Network Security Groups
- Design Solutions for Network Posture Management
- Design Solutions for Network Monitoring
Module 19: Case Study: Design Security Solutions for Infrastructure
- Introduction
- Case Study Description
- Case Study Answers
- Conceptual Walkthrough
- Technical Walkthrough