Microsoft Cybersecurity Architect (SC-100T00) - Training Courses | Afi U.

Microsoft Cybersecurity Architect (SC-100T00)

Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies. Design a Zero Trust strategy and architecture.
Microsoft Partner

Upcoming sessions

No date suits you?

Notify me when a session is added.

  • Duration: 4 days
  • Regular price: $2,595
  • Preferential price: $2,204tip icon

Course outline

Duration : 4 days

© AFI par Edgenda inc.

This is an advanced expert-level course. While it is not mandatory to participate, students are strongly encouraged to have completed and passed another associate-level certification in the security, compliance, and identity portfolio (e.g., AZ-500, SC-200, or SC-300) before attending this class. This course prepares students with expertise in designing and evaluating cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), Security Operations (SecOps), and data and applications. Students will also learn to design solution architectures using Zero Trust principles and to specify security requirements for cloud infrastructure across different service models (SaaS, PaaS, IaaS)

Audience

This course is intended for experienced cloud security engineers who have completed a previous certification in the security, compliance, and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, data security, and application security. They should also be familiar with hybrid and cloud implementations. Beginner students should instead take the SC-900 course: Microsoft Security, Compliance, and Identity Fundamentals.

Prerequisites

  • Conceptual knowledge of security strategies, requirements, Zero Trust architecture, and management of hybrid environments
  • Practical experience with Zero Trust strategies, applying security policies, and developing security requirements based on business objectives

Objectives

After completing this course, students will be able to:

  • Design a Zero Trust strategy and architecture: Learn to create secure environments based on Zero Trust principles.
  • Secure the infrastructure: Develop strategies to protect IT infrastructures against threats.
  • Secure data and applications: Develop plans to protect data and applications in various cloud environments.
  • Recommend security best practices and priorities: Identify and advise on best practices to enhance security.
  • Evaluate governance, risk, and compliance (GRC) strategies: Analyze and manage risks, ensure regulatory compliance, and govern security policies.
  • Security operations (SecOps): Implement and manage security operations to protect infrastructures and data

Contents

  • Zero Trust: Learning the principles of Zero Trust and applying them in the design of security solutions.
  • Governance, Risk, and Compliance (GRC): Evaluating and managing risks, ensuring regulatory compliance, and governing security policies.
  • Security Operations (SecOps): Implementing and managing security operations to protect infrastructures and data.
  • Securing data and applications: Designing strategies to secure data and applications in various cloud environments (SaaS, PaaS, IaaS).
  • Case study: Designing solutions that align with security best practices and priorities.

Surround yourself with the best

Charles Bourgon
Trainer