Microsoft Cybersecurity Architect | SC-100
Pre-requisites
Course Overview
Learning Outcomes
By the end of this course, participants will be able to:
Table of Contents
Toggle- Design and implement comprehensive cybersecurity strategies for Microsoft environments.
- Architect secure solutions using Zero Trust principles.
- Develop strategies for governance, compliance, and information protection.
- Manage security operations with advanced tools like Microsoft Sentinel.
- Collaborate across teams to integrate security strategies with organizational goals.
Upcoming Classes
- Sunday
03:00 PM – 05:00 PM
- Thursday
03:00 PM – 05:00 PM | 07:00 AM – 09:00 AM
Benefits
Career Opportunities
Course Outline
- Introduction to Security Governance and Strategy
- Understanding cybersecurity strategy and governance principles.
- Aligning security strategies with organizational objectives.
- Roles and responsibilities of a cybersecurity architect.
- Security Design Principles
- Designing security architectures aligned with industry standards.
- Risk management, compliance, and regulatory requirements.
- Security baselines and frameworks like NIST, ISO/IEC 27001.
- Security Program and Policy Design
- Developing security policies, standards, and guidelines.
- Implementing and enforcing security policies.
- Measuring and managing security governance effectiveness.
- Threat Protection Overview
- Identifying threats and vulnerabilities in cloud environments.
- Building threat models and risk assessments.
- Designing threat detection solutions using Microsoft technologies.
- Microsoft Security Tools
- Microsoft Defender, Azure Security Center, and Sentinel overview.
- Implementing security controls to detect and respond to threats.
- Using Kusto Query Language (KQL) for threat detection in Sentinel.
- Incident Response and Security Operations
- Designing incident response plans and playbooks.
- Implementing and optimizing Security Operations Centers (SOCs).
- Automating security operations using Azure Automation and playbooks
- Azure Active Directory (Azure AD)
- Designing Azure AD architectures for identity and access management.
- Implementing Multi-Factor Authentication (MFA) and Conditional Access.
- Role-Based Access Control (RBAC) and assigning permissions securely.
- Microsoft 365 Identity Protection
- Configuring Microsoft 365 Security for identity protection.
- Monitoring and remediating access-related risks.
- Threat analytics and detection with Microsoft 365 Defender.
- Implementing Zero Trust Security
- Designing Zero Trust security models for access and authentication.
- Leveraging Azure AD and Microsoft 365 services to enforce Zero Trust principles
- Designing for Endpoint Security
- Security architecture for Microsoft Defender for Endpoint.
- Endpoint detection and response (EDR) strategies.
- Configuring advanced threat protection mechanisms.
- Designing for Cloud Security
- Designing Azure Security Center architectures.
- Configuring Azure Security policies and threat protection.
- Security posture management and continuous monitoring in Azure.
- Designing Security for Microsoft 365 Environments
- Security design for Microsoft 365 workloads.
- Implementing secure email, collaboration, and identity protection.
- Designing security architecture for Teams, SharePoint, and OneDrive
- Monitoring and Analyzing Security Data
- Using Microsoft Sentinel for security data analysis.
- Creating and managing analytics rules and workbooks.
- Building threat hunting queries using KQL.
- Incident Response and Remediation
- Designing incident response playbooks in Microsoft Sentinel.
- Automating incident response workflows.
- Integrating third-party tools with Sentinel for better response.
- Disaster Recovery and Business Continuity Planning
- Designing disaster recovery strategies using Azure Site Recovery.
- Implementing incident recovery plans and failover strategies.
- Securing data backups and disaster recovery readiness
- Microsoft 365 Security Overview
- Security design for Microsoft 365 compliance and governance.
- Implementing compliance solutions for data governance.
- Configuring Microsoft Information Protection solutions (MIP).
- Implementing Security Compliance Solutions
- Security configuration for Microsoft Intune.
- Data loss prevention (DLP) policies in Microsoft 365.
- Security reporting and monitoring in Microsoft 365 Defender.
- Security Operations in Microsoft 365
- Managing security threats in Exchange Online, Teams, and SharePoint.
- Incident management and security monitoring.
- Securing collaboration workloads and information protection
- Mock Tests and Scenario-Based Exercises
- Hands-on tasks aligned with SC-100 exam objectives.
- Building security architectures and designing incident response workflows.
- Capstone Project
- Implementing a cybersecurity architecture using Azure, Microsoft 365, and Sentinel.
- Demonstrating comprehensive security design and implementation.
Course Inquiry
Need to Train Your Team?
IT Security's Unique Offering
Career Guidance
Flexible mode of training
Life Time Support
FAQs
IT professionals involved in managing and supporting cloud environments or looking to transition to a career in cloud computing.
Yes, at least two to three years of experience in cybersecurity, including architecture and security roles, is recommended.
Yes, this course aligns with SC-100 exam objectives and includes hands-on labs and practice tests to enhance exam readiness.
Yes, IT Security Nepal offers both in-person and virtual instructor-led training. Learn more about our training methods.
We provide guidance for a reattempt and resources to strengthen areas of improvement.
Our team assists with resume building, interview preparation, and job placement support in cloud-related roles.