Microsoft Cybersecurity Architect(SC-100) Training

About Course
The Microsoft Cybersecurity Architect (SC-100) certification validates expertise in designing and implementing secure Microsoft Azure solutions. It covers identity and access management, threat protection, governance, and compliance. Targeted at cybersecurity professionals, architects, and consultants, SC-100 emphasizes integrating security best practices into Azure solutions to mitigate risks and protect organizational assets. Certification holders demonstrate proficiency in configuring security services, implementing secure network architectures, and managing security operations using Azure tools. This certification enhances career opportunities by showcasing advanced skills in cybersecurity architecture, ensuring organizations can confidently adopt Azure while maintaining robust security postures against evolving threats.
Course Content
Module 1: Design a Zero Trust strategy and architecture
-
Slides and Diagrams download
-
How are we approaching this course
-
About this section
-
Zero Trust
-
Security – Integration endpoints
-
Cloud Adoption Framework
-
Security Strategy
-
Security Strategy – Hybrid environments
-
Security logging – tools
-
Let’s start using the tools
-
Security logging – Our next steps
-
Security logging – Building a simple infrastructure
-
About Microsoft Sentinel
-
Lab – Microsoft Sentinel – Setup
-
Lab – Microsoft Sentinel – Data connectors
-
Lab – Microsoft Sentinel – Azure Activity
-
Lab – Microsoft Sentinel – Generating Incidents
-
Lab – Microsoft Sentinel – Generating Incidents – Resources
-
Incidents
-
Lab – Microsoft Sentinel – Virtual Machines – Incidents
-
Lab – Microsoft Sentinel – Virtual Machines – Incidents – Resources
-
Microsoft Sentinel – Workbooks
-
Microsoft Sentinel – Automation
-
Microsoft Sentinel – Note on threat protection
-
NSG Flow logs
-
Note on Multiple Log Analytics workspaces
-
Our next focus – Azure Active Directory
-
Review on Role-based access control
-
Identity Governance – Entitlement Management
-
Review of Application Objects
-
Example on using Application Objects
-
Installing the Postman tool
-
Another example on Application Objects
-
Installing Visual Studio 2022
-
Enterprise Applications
-
Example on Enterprise Applications
-
Review – Azure AD Identity Protection
-
Review – Conditional Access Policies
-
Hybrid Identities – Azure AD Connec
-
Review – Azure AD Privileged Identity Management
-
Azure B2B
-
Azure B2C
-
Which service to choose
-
Azure AD Logs
-
Note on Azure AD Application Proxy
-
Quick Revision
-
Quick note before moving along
Module 2: Evaluate Governance Risk Compliance
Module 3: Design security for infrastructure
Module 4: Design a strategy for data and aplications
Module 5: Practice Section
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.
