Microsoft Cybersecurity Architect(SC-100) Training

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The Microsoft Cybersecurity Architect (SC-100) certification validates expertise in designing and implementing secure Microsoft Azure solutions. It covers identity and access management, threat protection, governance, and compliance. Targeted at cybersecurity professionals, architects, and consultants, SC-100 emphasizes integrating security best practices into Azure solutions to mitigate risks and protect organizational assets. Certification holders demonstrate proficiency in configuring security services, implementing secure network architectures, and managing security operations using Azure tools. This certification enhances career opportunities by showcasing advanced skills in cybersecurity architecture, ensuring organizations can confidently adopt Azure while maintaining robust security postures against evolving threats.

What Will You Learn?

  • 1. In-Demand Skills
  • 2. Career Advancement
  • 3. Efficient CRM Management
  • 4. Data Security
  • 5. Workflow Automation
  • 6. Reporting Insights
  • 7. Job OpportunitiesHours On Demanded Videos

Course Content

Module 1: Design a Zero Trust strategy and architecture

  • Slides and Diagrams download
  • How are we approaching this course
  • About this section
  • Zero Trust
  • Security – Integration endpoints
  • Cloud Adoption Framework
  • Security Strategy
  • Security Strategy – Hybrid environments
  • Security logging – tools
  • Let’s start using the tools
  • Security logging – Our next steps
  • Security logging – Building a simple infrastructure
  • About Microsoft Sentinel
  • Lab – Microsoft Sentinel – Setup
  • Lab – Microsoft Sentinel – Data connectors
  • Lab – Microsoft Sentinel – Azure Activity
  • Lab – Microsoft Sentinel – Generating Incidents
  • Lab – Microsoft Sentinel – Generating Incidents – Resources
  • Incidents
  • Lab – Microsoft Sentinel – Virtual Machines – Incidents
  • Lab – Microsoft Sentinel – Virtual Machines – Incidents – Resources
  • Microsoft Sentinel – Workbooks
  • Microsoft Sentinel – Automation
  • Microsoft Sentinel – Note on threat protection
  • NSG Flow logs
  • Note on Multiple Log Analytics workspaces
  • Our next focus – Azure Active Directory
  • Review on Role-based access control
  • Identity Governance – Entitlement Management
  • Review of Application Objects
  • Example on using Application Objects
  • Installing the Postman tool
  • Another example on Application Objects
  • Installing Visual Studio 2022
  • Enterprise Applications
  • Example on Enterprise Applications
  • Review – Azure AD Identity Protection
  • Review – Conditional Access Policies
  • Hybrid Identities – Azure AD Connec
  • Review – Azure AD Privileged Identity Management
  • Azure B2B
  • Azure B2C
  • Which service to choose
  • Azure AD Logs
  • Note on Azure AD Application Proxy
  • Quick Revision
  • Quick note before moving along

Module 2: Evaluate Governance Risk Compliance

Module 3: Design security for infrastructure

Module 4: Design a strategy for data and aplications

Module 5: Practice Section

Earn a certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Want to receive push notifications for all major on-site activities?