Booking options
£2,380
+ VAT£2,380
+ VATDelivered Online
All levels
Duration
4 Days
24 CPD hours
This course is intended for
This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals.
This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Prerequisites
Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.)
Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
Experience with hybrid and cloud implementations.
Zero Trust initiatives
Zero Trust technology pillars part 1
Zero Trust technology pillars part 2
Define a security strategy
Cloud Adoption Framework secure methodology
Design security with Azure Landing Zones
The Well-Architected Framework security pillar
Design solutions with best practices for capabilities and controls
Design solutions with best practices for attack protection
Common cyberthreats and attack patterns
Support business resiliency
Ransomware protection
Configurations for secure backup and restore
Security updates
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Translate compliance requirements into a security solution
Address compliance requirements with Microsoft Purview
Address privacy requirements with Microsoft Priva
Address security and compliance requirements with Azure policy
Evaluate infrastructure compliance with Defender for Cloud
Design cloud, hybrid and multicloud access strategies (including Azure AD)
Design a solution for external identities
Design modern authentication and authorization strategies
Align conditional access and Zero Trust
Specify requirements to secure Active Directory Domain Services (AD DS)
Design a solution to manage secrets, keys, and certificates
The enterprise access model
Design identity governance solutions
Design a solution to secure tenant administration
Design a solution for cloud infrastructure entitlement management (CIEM)
Design a solution for privileged access workstations and bastion services
Design security operations capabilities in hybrid and multicloud environments
Design centralized logging and auditing
Design security information and event management (SIEM) solutions
Design solutions for detection and response
Design a solution for security orchestration, automation, and response (SOAR)
Design security workflows
Design threat detection coverage
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Evaluate security posture for collaboration and productivity workloads
Design a Microsoft 365 Defender solution
Design configurations and operational practices for Microsoft 365
Design and implement standards to secure application development
Evaluate security posture of existing application portfolios
Evaluate application threats with threat modeling
Design security lifecycle strategy for applications
Secure access for workload identities
Design a solution for API management and security
Design a solution for secure access to applications
Design a solution for data discovery and classification using Microsoft Purview
Design a solution for data protection
Design data security for Azure workloads
Design security for Azure Storage
Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Specify security baselines for SaaS, PaaS, and IaaS services
Specify security requirements for web workloads
Specify security requirements for containers and container orchestration
Evaluate security posture by using Microsoft Cloud Security Benchmark
Design integrated posture management and workload protection
Evaluate security posture by using Microsoft Defender for Cloud
Posture evaluation with Microsoft Defender for Cloud secure score
Design cloud workload protection with Microsoft Defender for Cloud
Integrate hybrid and multicloud environments with Azure Arc
Design a solution for external attack surface management
Specify server security requirements
Specify requirements for mobile devices and clients
Specify internet of things (IoT) and embedded device security requirements
Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
Specify security baselines for server and client endpoints
Design a solution for secure remote access
Design solutions for network segmentation
Design solutions for traffic filtering with network security groups
Design solutions for network posture management
Design solutions for network monitoring
Case study description
Case study answers
Conceptual walkthrough
Technical walkthrough
Additional course details:
Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.
This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.
Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.
While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.
Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....