SC-100T00: Microsoft Cybersecurity Architect (04761)

Kursdetails

Kurs SC-100T00: Microsoft Cybersecurity Architect
Zeitraum 11.08.2025 — 14.08.2025
Status geplant
Kursart Offenes Training
Freie Plätze
Preis 2.535,00 €
Für mich buchen Für andere buchen

Was werden Sie in diesem Training erlernen?

Agenda

Introduction to Zero Trust and best practice frameworks

Introduction to best practices

Introduction to Zero Trust

Zero Trust initiatives

Zero Trust technology pillars part

Zero Trust technology pillars part 2

Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

Define a security strategy

Introduction to the Cloud Adoption Framework

Cloud Adoption Framework secure methodology

Introduction to Azure Landing Zones

Design security with Azure Landing Zones

Introduction to the Well-Architected Framework

The Well-Architected Framework security pillar

Knowledge check - Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

Introduction to Microsoft Cybersecurity Reference Architecture and cloud security benchmark

Design solutions with best practices for capabilities and controls

Design solutions with best practices for attack protection

Design a resiliency strategy for common cyberthreats like ransomware

Common cyberthreats and attack patterns

Support business resiliency

Ransomware protection

Configurations for secure backup and restore

Security updates

Case study: Design solutions that align with security best practices and priorities

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Design solutions for regulatory compliance

Introduction to regulatory compliance

Translate compliance requirements into a security solution

Address compliance requirements with Microsoft Purview

Address privacy requirements with Microsoft Priva

Address security and compliance requirements with Azure policy

Evaluate infrastructure compliance with Defender for Cloud

Design solutions for identity and access management

Introduction to Identity and Access Management

Design cloud, hybrid and multicloud access strategies (including Azure AD)

Design a solution for external identities

Design modern authentication and authorization strategies

Align conditional access and Zero Trust

Specify requirements to secure Active Directory Domain Services (AD DS)

Design a solution to manage secrets, keys, and certificates

Design solutions for securing privileged access

The enterprise access model

Design identity governance solutions

Design a solution to secure tenant administration

Design a solution for cloud infrastructure entitlement management (CIEM)

Design a solution for privileged access workstations and bastion services

Design solutions for security operations

Introduction to Security operations (SecOps)

Design security operations capabilities in hybrid and multicloud environments

Design centralized logging and auditing

Design security information and event management (SIEM) solutions

Design solutions for detection and response

Design a solution for security orchestration, automation, and response (SOAR)

Design security workflows

Design threat detection coverage

Case study: Design security operations, identity and compliance capabilities

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Design solutions for securing Microsoft 365

Introduction to security for Exchange, Sharepoint, OneDrive and Teams

Evaluate security posture for collaboration and productivity workloads

Design a Microsoft 365 Defender solution

Design configurations and operational practices for Microsoft 365

Design solutions for securing applications

Introduction to application security

Design and implement standards to secure application development

Evaluate security posture of existing application portfolios

Design security lifecycle strategy for applications

Secure access for workload identities

Design a solution for API management and security

Design a solution for secure access to applications

Design solutions for securing an organization's data

Introduction to data security

Design a solution for data discovery and classification using Microsoft Purview

Design a solution for data protection

Design data security for Azure workloads

Design security for Azure Storage

Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage

Case study: Design security solutions for applications and data

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Specify requirements for securing SaaS, PaaS, and IaaS services

Introduction to security for SaaS, PaaS, and IaaS

Specify security baselines for SaaS, PaaS, and IaaS services

Specify security requirements for web workloads

Specify security requirements for containers and container orchestration

Design solutions for security posture management in hybrid and multicloud environments

Introduction to hybrid and multicloud posture management

Evaluate security posture by using Microsoft Cloud Security Benchmark

Design integrated posture management and workload protection

Evaluate security posture by using Microsoft Defender for Cloud

Posture evaluation with Microsoft Defender for Cloud secure score

Design cloud workload protection with Microsoft Defender for Cloud

Integrate hybrid and multicloud environments with Azure Arc

Design a solution for external attack surface management

Knowledge check - Design solutions for security posture management in hybrid and multicloud environments

Design solutions for securing server and client endpoints

Introduction to endpoint security

Specify server security requirements

Specify requirements for mobile devices and clients

Specify internet of things (IoT) and embedded device security requirements

Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT

Specify security baselines for server and client endpoints

Design a solution for secure remote access

Design solutions for network security

Design solutions for network segmentation

Design solutions for traffic filtering with network security groups

Design solutions for network posture management

Design solutions for network monitoring

Knowledge check - Design solutions for network security

Case study: Design security solutions for infrastructure

Case study description

Case study answers

Conceptual walkthrough

Technical walkthrough

Kurszeiten

Wochentag Uhrzeit
Montag 09:00 - 17:00
Dienstag 09:00 - 17:00
Mittwoch 09:00 - 17:00
Donnerstag 09:00 - 17:00

Veranstaltungsort

Online

Powered by SEMCO®