Skill Up Card - Course Bundles

Pricing is per delegate, giving you huge savings over the cost of individual courses.

  • UK = £2,000 + VAT per Skill Up Card
  • Ireland = €2,400 per Skill Up Card
skill up card logo - Nexus Human

SC-100 Microsoft Cybersecurity Architect

4.6 out of 5 rating Last updated 21/11/2024   English

Jump to outline

Your Recommended Dates

Quick Email
12 Aug 25 Book
09:30 - 17:00 Live Online 1,800

Global Schedule

GTR = Guaranteed to Run

27 Jan 25 Book
14:00 - 22:00 Live Online 2,268
28 Apr 25 Book
14:00 - 22:00 Live Online 2,268
Exam Voucher Book Now
Flexible Various 165
Duration

4 Days

24 CPD hours

Description

This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Prerequisites

  • Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.)
  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.
  • 1 - Introduction to Zero Trust and best practice frameworks
    • Zero Trust initiatives
    • Zero Trust technology pillars part 1
    • Zero Trust technology pillars part 2
    2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
    • Define a security strategy
    • Cloud Adoption Framework secure methodology
    • Design security with Azure Landing Zones
    • The Well-Architected Framework security pillar
    3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)
    • Design solutions with best practices for capabilities and controls
    • Design solutions with best practices for attack protection
    4 - Design a resiliency strategy for common cyberthreats like ransomware
    • Common cyberthreats and attack patterns
    • Support business resiliency
    • Ransomware protection
    • Configurations for secure backup and restore
    • Security updates
    5 - Case study: Design solutions that align with security best practices and priorities
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
    6 - Design solutions for regulatory compliance
    • Translate compliance requirements into a security solution
    • Address compliance requirements with Microsoft Purview
    • Address privacy requirements with Microsoft Priva
    • Address security and compliance requirements with Azure policy
    • Evaluate infrastructure compliance with Defender for Cloud
    7 - Design solutions for identity and access management
    • Design cloud, hybrid and multicloud access strategies (including Azure AD)
    • Design a solution for external identities
    • Design modern authentication and authorization strategies
    • Align conditional access and Zero Trust
    • Specify requirements to secure Active Directory Domain Services (AD DS)
    • Design a solution to manage secrets, keys, and certificates
    8 - Design solutions for securing privileged access
    • The enterprise access model
    • Design identity governance solutions
    • Design a solution to secure tenant administration
    • Design a solution for cloud infrastructure entitlement management (CIEM)
    • Design a solution for privileged access workstations and bastion services
    9 - Design solutions for security operations
    • Design security operations capabilities in hybrid and multicloud environments
    • Design centralized logging and auditing
    • Design security information and event management (SIEM) solutions
    • Design solutions for detection and response
    • Design a solution for security orchestration, automation, and response (SOAR)
    • Design security workflows
    • Design threat detection coverage
    10 - Case study: Design security operations, identity and compliance capabilities
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
    11 - Design solutions for securing Microsoft 365
    • Evaluate security posture for collaboration and productivity workloads
    • Design a Microsoft 365 Defender solution
    • Design configurations and operational practices for Microsoft 365
    12 - Design solutions for securing applications
    • Design and implement standards to secure application development
    • Evaluate security posture of existing application portfolios
    • Evaluate application threats with threat modeling
    • Design security lifecycle strategy for applications
    • Secure access for workload identities
    • Design a solution for API management and security
    • Design a solution for secure access to applications
    13 - Design solutions for securing an organization's data
    • Design a solution for data discovery and classification using Microsoft Purview
    • Design a solution for data protection
    • Design data security for Azure workloads
    • Design security for Azure Storage
    • Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
    14 - Case study: Design security solutions for applications and data
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
    15 - Specify requirements for securing SaaS, PaaS, and IaaS services
    • Specify security baselines for SaaS, PaaS, and IaaS services
    • Specify security requirements for web workloads
    • Specify security requirements for containers and container orchestration
    16 - Design solutions for security posture management in hybrid and multicloud environments
    • Evaluate security posture by using Microsoft Cloud Security Benchmark
    • Design integrated posture management and workload protection
    • Evaluate security posture by using Microsoft Defender for Cloud
    • Posture evaluation with Microsoft Defender for Cloud secure score
    • Design cloud workload protection with Microsoft Defender for Cloud
    • Integrate hybrid and multicloud environments with Azure Arc
    • Design a solution for external attack surface management
    17 - Design solutions for securing server and client endpoints
    • Specify server security requirements
    • Specify requirements for mobile devices and clients
    • Specify internet of things (IoT) and embedded device security requirements
    • Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
    • Specify security baselines for server and client endpoints
    • Design a solution for secure remote access
    18 - Design solutions for network security
    • Design solutions for network segmentation
    • Design solutions for traffic filtering with network security groups
    • Design solutions for network posture management
    • Design solutions for network monitoring
    19 - Case study: Design security solutions for infrastructure
    • Case study description
    • Case study answers
    • Conceptual walkthrough
    • Technical walkthrough
    Additional course details:

    Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.

    This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.

    Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.

    While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.

    Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

    FAQ for the SC-100 Microsoft Cybersecurity Architect Course

    Available Delivery Options for the SC-100 Microsoft Cybersecurity Architect training.
    • Live Instructor Led Classroom Online (Live Online)
    • Traditional Instructor Led Classroom (TILT/ILT)
    • Delivery at your offices in London or anywhere in the UK
    • Private dedicated course as works for your staff.
    How many CPD hours does the SC-100 Microsoft Cybersecurity Architect training provide?

    The 4 day. SC-100 Microsoft Cybersecurity Architect training course give you up to 24 CPD hours/structured learning hours. If you need a letter or certificate in a particular format for your association, organisation or professional body please just ask.

    What is the correct audience for the SC-100 Microsoft Cybersecurity Architect training?

    This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.

    Do you provide training for the SC-100 Microsoft Cybersecurity Architect.

    Yes we provide corporate training, dedicated training and closed classes for the SC-100 Microsoft Cybersecurity Architect. This can take place anywhere in UK including, England, Scotland, Cymru (Wales) or Northern Ireland or live online allowing you to have your teams from across UK or further afield to attend a single training event saving travel and delivery expenses.

    What is the duration of the SC-100 Microsoft Cybersecurity Architect program.

    The SC-100 Microsoft Cybersecurity Architect training takes place over 4 day(s), with each day lasting approximately 8 hours including small and lunch breaks to ensure that the delegates get the most out of the day.

    What other terms do people search for when looking for this course?

    Popular related searched include sc100 sc 100.

    Why are Nexus Human the best provider for the SC-100 Microsoft Cybersecurity Architect?
    Nexus Human are recognised as one of the best training companies as they and their trainers have won and hold many awards and titles including having previously won the Small Firms Best Trainer award, national training partner of the year for UK on multiple occasions, having trainers in the global top 30 instructor awards in 2012, 2019 and 2021. Nexus Human has also been nominated for the Tech Excellence awards multiple times. Learning Performance institute (LPI) external training provider sponsor 2024.
    Is there a discount code for the SC-100 Microsoft Cybersecurity Architect training.

    Yes, the discount code PENPAL5 is currently available for the SC-100 Microsoft Cybersecurity Architect training. Other discount codes may also be available but only one discount code or special offer can be used for each booking. This discount code is available for companies and individuals.

    Jump to dates

    Training Insurance Included!

    When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

    What people say about us


    Top