Course SC-100T00: Microsoft Cybersecurity Architect

Course Description

This is an advanced, expert-level course. Although not required to attend, professionals are strongly encouraged to have taken & passed another associate-level certification in the security, compliance & identity portfolio (like AZ-500, SC-200, or SC-300) before attending this class. This training prepares professionals with the expertise to design & evaluate cybersecurity strategies in the following areas: Zero Trust (GRC)Governance Risk Compliance, security operations (SecOps), & data & applications. Students will also learn how to design & architect solutions using zero trust principles & specify security requirements for cloud infrastructure in different service models like (SaaS, PaaS, and IaaS).

Prerequisites

  • Before attending this course, students must have the following:
  • Highly recommended to have attended & passed one of the associate-level certifications in the security, compliance & identity portfolio (such as AZ-500, SC-200, or SC-300)
  • Advanced experience & knowledge in identity & access, platform protection, security operations, securing data & securing applications.
  • Experience with hybrid & cloud implementations.

Target Audience

This training is for experienced cloud security engineers who have taken an earlier certification in the security, compliance & identity portfolio. Specifically, students should have advanced experience & knowledge in a wide range of security engineering areas involving identity & access, platform protection, security operations, securing data, & securing applications. They should also have experience with hybrid & cloud implementations. Beginning professionals should instead take the course SC-900: Microsoft Security, Compliance, & Identity Fundamentals.

Content Outline

  • Develop Integration points in an architecture
  • Develop security requirements based on business goals
  • Translate security requirements into technical capabilities
  • Design security for a resiliency strategy
  • Design security strategy for hybrid & multi-tenant environments
  • Design technical & governance strategies for traffic filtering & segmentation
  • Design a logging & auditing security strategy.
  • Develop security operations for hybrid & multi-cloud environments.
  • Design a strategy for Security Information & Event Management (SIEM) & Security Orchestration, Automation, & Response (SOAR).
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats & mitigations.
  • Recommend an identity store for security.
  • Recommend secure authentication & security authorization strategies.
  • Secure conditional access.
  • Design a strategy for role assignment & delegation.
  • Define Identity governance for access reviews & entitlement management.
  • Make a security strategy for privileged role access to infrastructure.
  • Design a security strategy for privileged access.
  • Interpret compliance requirements & their technical capabilities.
  • Assess infrastructure compliance by using Microsoft Defender for Cloud.
  • Interpret compliance scores & recommend actions to resolve issues or improve security.
  • Design & validate the implementation of Azure Policy.
  • Draft for data residency Requirements.
  • Convert privacy requirements into requirements for security solutions.
  • Assess security postures by using benchmarks.
  • Assess security postures by using Microsoft Defender for Cloud.
  • Assess security postures by using Secure Scores.
  • Assess security hygiene of Cloud Workloads.
  • Design security for an Azure Landing Zone.
  • Interpret technical threat intelligence & recommend risk mitigations.
  • Make security recommendations to reduce threats that have been identified.
  • Plan & implement a security strategy across teams.
  • Establish a strategy & process for the proactive & continuous evolution of a security strategy
  • Design a logging & auditing security strategy.
  • Develop security operations for hybrid & multi-cloud environments.
  • Design a strategy for Security Information & Event Management (SIEM) & Security Orchestration, Automation, & Response (SOAR).
  • Evaluate security workflows.
  • Review security strategies for incident management.
  • Evaluate security operations for technical threat intelligence.
  • Monitor sources for insights on threats & mitigations.
  • Specify security baselines for SaaS, PaaS & IaaS services.
  • Specify security requirements for web, storage, data & IoT workloads.
  • Specify security requirements for containers & container orchestration.
  • Specify priorities for mitigating threats to applications.
  • Specify a security standard for onboarding a new application.
  • Specify a security strategy for applications & APIs.
  • Specify priorities for mitigating threats to data.
  • Design a strategy to identify & protect sensitive data.
  • Specify an encryption standard for data at rest & in motion.
  • Use the (MCRA) Microsoft Cybersecurity Reference Architecture to recommend security best practices
  • Use the Microsoft Cloud Security Benchmarks to recommend security best practices
  • To suggest a plan for modernizing corporate security, use the Zero Trust (RaMP) Rapid Modernization Plan.
  • Recommend a DevSecOps process
  • Recommend a methodology for asset protection
  • Recommend strategies for managing & minimizing risk
  • Recognize different types of ransomware
  • Help an organization mitigate the risk of a ransomware attack by creating a recovery plan
  • Help an organization mitigate the risk of a ransomware attack by limiting the scope of damage
  • Help an organization mitigate the risk of a ransomware attack by hardening key infrastructure elements

FAQs

A Cloud Architect is an IT specialist who develops a company's computing strategy. This strategy incorporates cloud adoption plans, cloud application design, also cloud management & monitoring. Additional responsibilities mainly include support for application architecture & deployment in cloud environments.

Cloud Architect Skills generally include:-

  • Extensive experience with programming languages such as Python, Ruby & Elixir.
  • Background in IT engineering.
  • Strong people skills.
  • Excellent leadership skills.
  • Excellent written & verbal communication.
  • Ability to design & implement cloud infrastructure, platforms & applications.

 They do not need to code, but they should be a former coder in order to have a clear idea of the technical challenges that their architectures must address. Their primary skill is not coding, though, but listening to technical colleagues in order to choose the right solution.

Cloud architecture describes the many parts—such as databases, applications, software capabilities, etc.—that were designed to take advantage of the power of cloud resources to address a variety of business problems. In general, cloud architecture specifies both the components and the connections between them.

If you want to become an azure admin, then you have to start with azure fundamentals. An individual with a professional experience in Azure-specific job roles can easily aim at improving their skills with official certification. However, you could also be included in other scenarios.

To attend the training session, you should have operational Desktops or Laptops with the required specifications, along with a good internet connection to access the labs.

We would always recommend you attend the live session to practice & clarify the doubts instantly & get more value from your investment. However, if, due to some contingency if you have to skip the class, Radiant Techlearning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption & NOT for distribution or any commercial use.

Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant's h&-on-practice. 

Participants can easily access these labs over Cloud with the help of a remote desktop connection. 

Radiant virtual labs provide you the flexibility to learn from anywhere in the world & in any time zone. 

 

The learners will be enthralled as we engage them the real-world & industry Oriented projects during the training program. These projects will improve your skills & knowledge & you will gain a better experience. These real-time projects will help you a lot in your future tasks & assignments.

Send a Message.


  • Enroll
    • Learning Format: ILT
    • Duration: 80 Hours
    • Training Level : Beginner
    • Jan 29th : 8:00 - 10:00 AM (Weekend Batch)
    • Price : INR 25000
    • Learning Format: VILT
    • Duration: 50 Hours
    • Training Level : Beginner
    • Validity Period : 3 Months
    • Price : INR 6000
    • Learning Format: Blended Learning (Highly Interactive Self-Paced Courses +Practice Lab+VILT+Career Assistance)
    • Duration: 160 Hours 50 Hours Self-paced courses+80 Hours of Boot Camp+20 Hours of Interview Assisstance
    • Training Level : Beginner
    • Validity Period : 6 Months
    • Jan 29th : 8:00 - 10:00 AM (Weekend Batch)
    • Price : INR 6000

    This is id #d