SC-100: Microsoft Cybersecurity Architect



Kursarrangør: SG Partner AS
Sted: Nettkurs / Nettstudie
Hele landet
Type:Bedriftsinternt / Større grupper
Nettkurs og nettstudie
Studie / yrkesutdanning
Undervisningstid: Ta kontakt for informasjon
Varighet: 4 dager
Pris: 24.000
Neste kurs: 29.04.2024 | Vis alle kursdatoer

We offer virtual course in Microsoft Cybersecurity Architect. This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.

Course overview:
Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Course objectives:
• Design a Zero Trust strategy and architecture
• Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
• Design security for infrastructure
• Design a strategy for data and applications

Course content:
Module 1 - Build an overall security strategy and architecture:
Learn how to build an overall security strategy and architecture.

Lessons:
• Introduction
• Zero Trust overview
• Develop Integration points in an architecture
• Develop security requirements based on business goals
• Translate security requirements into technical capabilities
• Design security for a resiliency strategy
• Design a security strategy for hybrid and multi-tenant environments
• Design technical and governance strategies for traffic filtering and segmentation
• Understand security for protocols
• Exercise: Build an overall security strategy and architecture
• Knowledge check
• Summary

After completing module 1, students will be able to:
• Develop Integration points in an architecture
• Develop security requirements based on business goals
• Translate security requirements into technical capabilities
• Design security for a resiliency strategy
• Design security strategy for hybrid and multi-tenant environments
• Design technical and governance strategies for traffic filtering and segmentation

Module 2 - Design a security operations strategy:
Learn how to design a security operations strategy.

Lessons:
• Introduction
• Understand security operations frameworks, processes, and procedures
• Design a logging and auditing security strategy
• Develop security operations for hybrid and multi-cloud environments
• Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration,
• Evaluate security workflows
• Review security strategies for incident management
• Evaluate security operations strategy for sharing technical threat intelligence
• Monitor sources for insights on threats and mitigations

After completing module 2, students will be able to:
• Design a logging and auditing security strategy
• Develop security operations for hybrid and multi-cloud environments
• Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A
• Evaluate security workflows
• Review security strategies for incident management
• Evaluate security operations for technical threat intelligence
• Monitor sources for insights on threats and mitigations

Module 3 - Design an identity security strategy:
Learn how to design an identity security strategy.

Lessons:
• Introduction
• Secure access to cloud resources
• Recommend an identity store for security
• Recommend secure authentication and security authorization strategies
• Secure conditional access
• Design a strategy for role assignment and delegation
• Define Identity governance for access reviews and entitlement management
• Design a security strategy for privileged role access to infrastructure
• Design a security strategy for privileged activities
• Understand security for protocols

After completing module 3, students will be able to:
• Recommend an identity store for security
• Recommend secure authentication and security authorization strategies
• Secure conditional access
• Design a strategy for role assignment and delegation
• Define Identity governance for access reviews and entitlement management
• Design a security strategy for privileged role access to infrastructure
• Design a security strategy for privileged access

Module 4 - Evaluate a regulatory compliance strategy:
Learn how to evaluate a regulatory compliance strategy.

Lessons:
• Introduction
• Interpret compliance requirements and their technical capabilities
• Evaluate infrastructure compliance by using Microsoft Defender for Cloud
• Interpret compliance scores and recommend actions to resolve issues or improve security
• Design and validate implementation of Azure Policy
• Design for data residency Requirements
• Translate privacy requirements into requirements for security solutions

After completing module 4, students will be able to:
• Interpret compliance requirements and their technical capabilities
• Evaluate infrastructure compliance by using Microsoft Defender for Cloud
• Interpret compliance scores and recommend actions to resolve issues or improve security
• Design and validate implementation of Azure Policy
• Design for data residency requirements
• Translate privacy requirements into requirements for security solutions

Module 5 - Evaluate security posture and recommend technical strategies to manage risk:
Learn how to evaluate security posture and recommend technical strategies to manage risk.

Lessons:
• Introduction
• Evaluate security postures by using benchmarks
• Evaluate security postures by using Microsoft Defender for Cloud
• Evaluate security postures by using Secure Scores
• Evaluate security hygiene of Cloud Workloads
• Design security for an Azure Landing Zone
• Interpret technical threat intelligence and recommend risk mitigations
• Recommend security capabilities or controls to mitigate identified risks

After completing module 5, students will be able to:
• Evaluate security postures by using benchmarks
• Evaluate security postures by using Microsoft Defender for Cloud
• Evaluate security postures by using Secure Scores
• Evaluate security hygiene of Cloud Workloads
• Design security for an Azure Landing Zone
• Interpret technical threat intelligence and recommend risk mitigations
• Recommend security capabilities or controls to mitigate identified risks

Module 6 - Understand architecture best practices and how they are changing with the Cloud:
Learn about architecture best practices and how they are changing with the Cloud.

Lessons:
• Introduction
• Plan and implement a security strategy across teams
• Establish a strategy and process for proactive and continuous evolution of a security strategy
• Understand network protocols and best practices for network segmentation and traffic filtering

After completing module 6, students will be able to:
• Describe best practices for network segmentation and traffic filtering
• Plan and implement a security strategy across teams
• Establish a strategy and process for proactive and continuous evaluation of security strategy

Module 7 - Design a strategy for securing server and client endpoints:
Learn how to design a strategy for securing server and client endpoints.

Lessons:
• Introduction
• Specify security baselines for server and client endpoints
• Specify security requirements for servers
• Specify security requirements for mobile devices and clients
• Specify requirements for securing Active Directory Domain Services
• Design a strategy to manage secrets, keys, and certificates
• Design a strategy for secure remote access
• Understand security operations frameworks, processes, and procedures
• Understand deep forensics procedures by resource type

After completing module 7, students will be able to:
• Specify security baselines for server and client endpoints
• Specify security requirements for servers
• Specify security requirements for mobile devices and clients
• Specify requirements for securing Active Directory Domain Services
• Design a strategy to manage secrets, keys, and certificates
• Design a strategy for secure remote access
• Understand security operations frameworks, processes, and procedures
• Understand deep forensics procedures by resource type

Module 8 - Design a strategy for securing PaaS, IaaS, and SaaS services:
Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.

Lessons:
• Introduction
• Specify security baselines for PaaS services
• Specify security baselines for IaaS services
• Specify security baselines for SaaS services
• Specify security requirements for IoT workloads
• Specify security requirements for data workloads
• Specify security requirements for web workloads
• Specify security requirements for storage workloads
• Specify security requirements for containers
• Specify security requirements for container orchestration

After completing module 8, students will be able to:
• Specify security baselines for PaaS, SaaS and IaaS services
• Specify security requirements for IoT, data, storage, and web workloads
• Specify security requirements for containers and container orchestration

Module 9 - Specify security requirements for applications:
Learn how to specify security requirements for applications.

Lessons:
• Introduction
• Understand application threat modeling
• Specify priorities for mitigating threats to applications
• Specify a security standard for onboarding a new application
• Specify a security strategy for applications and APIs

After completing module 9, students will be able to:
• Specify priorities for mitigating threats to applications
• Specify a security standard for onboarding a new application
• Specify a security strategy for applications and APIs

Module 10 - Design a strategy for securing data:
Learn how to design a strategy for securing data.

Lessons:
• Introduction
• Prioritize mitigating threats to data
• Design a strategy to identify and protect sensitive data
• Specify an encryption standard for data at rest and in motion

After completing module 10, students will be able to:
• Prioritize mitigating threats to data
• Design a strategy to identify and protect sensitive data
• Specify an encryption standard for data at rest and in motion

Target audience:
IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.

Prerequisites:
• Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
• Experience with hybrid and cloud implementations

Recommended prerequisites:
• M-SC300 - Microsoft Identity and Access Administrator
• M-SC400 - Microsoft Information Protection Administrator