This is an advanced expert-level course. While it is not mandatory to participate, students are strongly encouraged to have completed and passed another associate-level certification in the security, compliance, and identity portfolio (e.g., AZ-500, SC-200, or SC-300) before attending this class. This course prepares students with expertise in designing and evaluating cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), Security Operations (SecOps), and data and applications. Students will also learn to design solution architectures using Zero Trust principles and to specify security requirements for cloud infrastructure across different service models (SaaS, PaaS, IaaS) |
Audience | This course is intended for experienced cloud security engineers who have completed a previous certification in the security, compliance, and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, data security, and application security. They should also be familiar with hybrid and cloud implementations. Beginner students should instead take the SC-900 course: Microsoft Security, Compliance, and Identity Fundamentals. |
Prerequisites | - Conceptual knowledge of security strategies, requirements, Zero Trust architecture, and management of hybrid environments
- Practical experience with Zero Trust strategies, applying security policies, and developing security requirements based on business objectives
|
Objectives | After completing this course, students will be able to: - Design a Zero Trust strategy and architecture: Learn to create secure environments based on Zero Trust principles.
- Secure the infrastructure: Develop strategies to protect IT infrastructures against threats.
- Secure data and applications: Develop plans to protect data and applications in various cloud environments.
- Recommend security best practices and priorities: Identify and advise on best practices to enhance security.
- Evaluate governance, risk, and compliance (GRC) strategies: Analyze and manage risks, ensure regulatory compliance, and govern security policies.
- Security operations (SecOps): Implement and manage security operations to protect infrastructures and data
|
Contents | - Zero Trust: Learning the principles of Zero Trust and applying them in the design of security solutions.
- Governance, Risk, and Compliance (GRC): Evaluating and managing risks, ensuring regulatory compliance, and governing security policies.
- Security Operations (SecOps): Implementing and managing security operations to protect infrastructures and data.
- Securing data and applications: Designing strategies to secure data and applications in various cloud environments (SaaS, PaaS, IaaS).
- Case study: Designing solutions that align with security best practices and priorities.
|
|