Microsoft cybersecurity architects have subject matter expertise in designing and evolving the cybersecurity strategy to protect an organization’s mission and business processes across all aspects of the enterprise architecture. They design a Zero Trust strategy and architecture, including security strategies for data, applications, access management, identity, and infrastructure. They also evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies.
Cybersecurity architects continuously collaborate with leaders and practitioners in IT security, privacy, and other roles across an organization to plan and implement a cybersecurity strategy that meets the business needs of an organization.
If this is your skill set, then the expert-level Microsoft Certified: Cybersecurity Architect Expert certification is the credential you need!
Advance your Microsoft SCI expertise with the all new Microsoft Certified: Cybersecurity Architect Expert certification.
This SC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.
Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
Apart from public, instructor-led classes, we also offer private in-house trainings for organizations based on their needs. Call us at +852 2116 3328 or email us at [email protected] for more details.
Learn how to build an overall security strategy and architecture with zero trust in mind.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to design a cybersecurity strategy for security operations (SecOps).
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to design a cybersecurity strategy for identity management.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to evaluate a cybersecurity strategy for regulatory compliance.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to evaluate an organization’s security posture and recommend technical strategies to manage risk.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn best practices for cybersecurity architecture and how they have been affected by cloud computing.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to design a cybersecurity strategy to secure server and client endpoints.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to design a cybersecurity strategy which will secure cloud services in the SaaS, PaaS and IaaS service models.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to specify cybersecurity requirements for applications.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
Learn how to design a cybersecurity strategy to secure data.
Learning objectives
Upon completion of this module, the learner will be able to:
Prerequisites
IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.
Before attending this course, students must have: